Call Us Today 888-507-9921

Blog

Backup that BitLocker Key, Please!

If you’ve purchased a Windows computer anytime since about 2017, your hard drive is very likely encrypted with Microsoft’s BitLocker whether you know ...

Reduce the Risk When Your Mobile Device Goes Missing?

              Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes files, personal financials, apps, passwords, pictures, videos, and so much more. ...

Outlook and the Great Gmail Rebellion of 2022

Alas, poor Outlook, Gmail has officially bolted and is actively preventing Outlook from connecting, condemning it as a “Less ...

Two Factor Authentication and how NOT to set it up!

As many of you know, I’m currently a Microsoft Office Apps and Services MVP.  My “Specialty” is and has been Microsoft Outlook.  As such, ...

Are you making one of Top 5 Cybersecurity Mistakes?

60% of small and mid-sized companies that have a data breach end up closing their doors within six months because they can’t afford the costs. The costs of falling victim to a cyberattack can include loss of business, downtime/productivity losses, ...

MFA? Don’t forget about your password!

So, you’ve seen all the warnings and decided to heed them.  You’ve added Multifactor Authentication to your accounts, set them up in your Authenticator ...

13 Strategies To Make Your Cybersecurity Failproof

Skilled hackers can easily access your system and steal precious business information. Upgrading your cybersecurity can help address this problem. Taking ...

Friendly Neighborhood Cybersecurity Dude

It has been a busy few weeks in the Microsoft world!  Windows 11 is due out early next month, ...

The Do’s and Don'ts about Passwords You need to Know!

The team at Roland Schorr & Tower takes security very seriously and has put together a list of best practices around Passwords that you can use to increase your overall security. Security ...

Strong Passwords

One of the most important ways to ensure that your online interactions are safe and secure is to create, use, and protect ...

News

Sensitive Information on Thousands of Companies Was Leaked

Posted by Tony Sollars On
Sensitive Information on Thousands of Companies Was Leaked

Sensitive information leaks can give cybercriminals access to bank account information, passwords, and other important data. Many companies, government agencies, and schools had to handle a dangerous situation. Learn more about this ...

Read More

Using Data Analytics to Drive Business Growth

Posted by Tony Sollars On
Using Data Analytics to Drive Business Growth

In this day and age, collecting information has become super easy. Thanks to tech advances, businesses gather information from almost anything. The challenge is making sense of all the data. How ...

Read More

Blog

New Outlook (Outlook PRE) Act II

Posted by Hal Hostetler On
New Outlook (Outlook PRE) Act II

I did an article on this subject just a few months ago, but with increased availability, the new app can ...

Read More

Top 3 Reasons to Back Up Your SaaS Data

Posted by Tony Sollars On
Top 3 Reasons to Back Up Your SaaS Data

Microsoft 365 and Google Workspace are being adopted by businesses at an enormous rate. However, their popularity makes them attractive targets for cybercriminals. Introduction One of the most business-friendly innovations in recent years has been the rapid growth of cloud applications like Microsoft 365 ...

Read More

Social Media


RST TECH TIPS

Join our Tech Tips list to get Tips & Info about using your technology and keeping secure.