Call Us Today 888-507-9921

Blog

Outlook and the Great Gmail Rebellion of 2022

Alas, poor Outlook, Gmail has officially bolted and is actively preventing Outlook from connecting, condemning it as a “Less ...

Two Factor Authentication and how NOT to set it up!

As many of you know, I’m currently a Microsoft Office Apps and Services MVP.  My “Specialty” is and has been Microsoft Outlook.  As such, ...

Are you making one of Top 5 Cybersecurity Mistakes?

60% of small and mid-sized companies that have a data breach end up closing their doors within six months because they can’t afford the costs. The costs of falling victim to a cyberattack can include loss of business, downtime/productivity losses, ...

MFA? Don’t forget about your password!

So, you’ve seen all the warnings and decided to heed them.  You’ve added Multifactor Authentication to your accounts, set them up in your Authenticator ...

13 Strategies To Make Your Cybersecurity Failproof

Skilled hackers can easily access your system and steal precious business information. Upgrading your cybersecurity can help address this problem. Taking ...

Friendly Neighborhood Cybersecurity Dude

It has been a busy few weeks in the Microsoft world!  Windows 11 is due out early next month, ...

The Do’s and Don'ts about Passwords You need to Know!

The team at Roland Schorr & Tower takes security very seriously and has put together a list of best practices around Passwords that you can use to increase your overall security. Security ...

Strong Passwords

One of the most important ways to ensure that your online interactions are safe and secure is to create, use, and protect ...

Protecting yourself from tech support scams

Tech support scams are an industry-wide issue where the bad guys use scare tactics to trick you into unnecessary technical support services that supposedly ...

Four Holiday Phishing Scams To Avoid

It’s that special time of year, chestnuts roasting by an open fire and Jack Frost nipping at your nose; the holiday season is upon ...

News

Beware New Windows Vulnerability With Remote Search Window Access

Posted by Tony Sollars On
Beware New Windows Vulnerability With Remote Search Window Access

You may not know the name Matthew Hickey, but you should thank him for a recent discovery that could save you a lot of grief. Hickey is the co-founder of a company ...

Read More

Some Carrier Embedded Android Apps May Have Security Vulnerabilities

Posted by Tony Sollars On
Some Carrier Embedded Android Apps May Have Security Vulnerabilities

Recently, Microsoft reported high severity security vulnerabilities in multiple apps offered by large international mobile service providers.  What makes this especially noteworthy is the fact that these vulnerabilities aren't app specific, but ...

Read More

Blog

Outlook and the Great Gmail Rebellion of 2022

Posted by Hal Hostetler On
Outlook and the Great Gmail Rebellion of 2022

Alas, poor Outlook, Gmail has officially bolted and is actively preventing Outlook from connecting, condemning it as a “Less ...

Read More

Two Factor Authentication and how NOT to set it up!

Posted by Hal Hostetler On
Two Factor Authentication and how NOT to set it up!

As many of you know, I’m currently a Microsoft Office Apps and Services MVP.  My “Specialty” is and has been Microsoft Outlook.  As such, ...

Read More

Social Media


RST TECH TIPS

Join our Tech Tips list to get Tips & Info about using your technology and keeping secure.