Restech Blog

12 07, 2017

3 Tips to Keep Your Phone Safe

By |2017-07-12T15:09:49-05:00July 12th, 2017|Restech Blog|Comments Off on 3 Tips to Keep Your Phone Safe

We all love our mobile devices dearly. Without our phones, we’d be lost, roaming the world with no sense of direction (mostly because we’d have no maps). But for some reason, it’s still incredibly easy for us to lose track of our phones – on vacation, at the grocery store, in the movie theater, or [...]

27 06, 2017

Global Ransomware Attack Alert: PETYA

By |2017-06-27T21:17:09-05:00June 27th, 2017|Restech Blog|Comments Off on Global Ransomware Attack Alert: PETYA

A new cyberattack is spreading in Europe, Russia and the U.S. affecting major banks, metro systems, and large corporations around the world. Similar to the recent WannaCry attack, it is a ransomware virus that can be launched with the click of a button, and it’s called “PETYA.” Unlike WannaCry, the Petya virus doesn’t just encrypt individual [...]

12 06, 2017

4 Cybersecurity Tips to Keep Your Business Safe

By |2017-06-12T16:16:21-05:00June 12th, 2017|Restech Blog|Comments Off on 4 Cybersecurity Tips to Keep Your Business Safe

On May 12, the “Wannacry” ransomware attack began and was soon making headlines around the world. It exploited a vulnerability in Microsoft Windows, then encrypted the hard drives of infected PCs and demanded money to release the files. The attack infected over 300,000 computers in 150 countries, including telephone utilities, a British National Health System, and [...]

30 05, 2017

Can Your Password Stand Up to a Data Breach?

By |2017-05-30T15:54:59-05:00May 30th, 2017|Restech Blog|Comments Off on Can Your Password Stand Up to a Data Breach?

At this point, it seems like companies ask you to change your password frequently, because something got hacked. In fact, in June of 2016, Fortune Magazine said, “It’s almost fashionable to become the victim of a data breach these days, or at least you’d think so, given the who’s-who list of companies announcing them.” In [...]

23 05, 2017

Can You Spot the Potentially Dangerous File?

By |2017-05-23T17:37:51-05:00May 23rd, 2017|Restech Blog|Comments Off on Can You Spot the Potentially Dangerous File?

Most of us know that opening unknown files is a dangerous behavior, but how do you spot malicious files? Imagine a co-worker sends you a picture they want you to see and it’s a .jpg file. You open it, then your computer starts acting weird all of a sudden. Your anti-virus program tells you that [...]

9 05, 2017

3 Lessons Learned About Managed IT Services

By |2017-05-09T16:44:19-05:00May 9th, 2017|Restech Blog|Comments Off on 3 Lessons Learned About Managed IT Services

1. TRUST BUT VERIFY. Good relationships are built on trust. It works both ways – as a customer, you trust your vendor to provide what is promised. As a vendor, you trust your client will compensate according to your agreement. Of course, there’s more to it but this is the basic foundation – but it [...]

Go to Top