Call Us Today 888-507-9921

Blog

Backup that BitLocker Key, Please!

If you’ve purchased a Windows computer anytime since about 2017, your hard drive is very likely encrypted with Microsoft’s BitLocker whether you know ...

Reduce the Risk When Your Mobile Device Goes Missing?

              Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes files, personal financials, apps, passwords, pictures, videos, and so much more. ...

Outlook and the Great Gmail Rebellion of 2022

Alas, poor Outlook, Gmail has officially bolted and is actively preventing Outlook from connecting, condemning it as a “Less ...

Two Factor Authentication and how NOT to set it up!

As many of you know, I’m currently a Microsoft Office Apps and Services MVP.  My “Specialty” is and has been Microsoft Outlook.  As such, ...

Are you making one of Top 5 Cybersecurity Mistakes?

60% of small and mid-sized companies that have a data breach end up closing their doors within six months because they can’t afford the costs. The costs of falling victim to a cyberattack can include loss of business, downtime/productivity losses, ...

MFA? Don’t forget about your password!

So, you’ve seen all the warnings and decided to heed them.  You’ve added Multifactor Authentication to your accounts, set them up in your Authenticator ...

13 Strategies To Make Your Cybersecurity Failproof

Skilled hackers can easily access your system and steal precious business information. Upgrading your cybersecurity can help address this problem. Taking ...

Friendly Neighborhood Cybersecurity Dude

It has been a busy few weeks in the Microsoft world!  Windows 11 is due out early next month, ...

The Do’s and Don'ts about Passwords You need to Know!

The team at Roland Schorr & Tower takes security very seriously and has put together a list of best practices around Passwords that you can use to increase your overall security. Security ...

Strong Passwords

One of the most important ways to ensure that your online interactions are safe and secure is to create, use, and protect ...

News

Chick-fil-A Confirms Credential Stuffing Attack

Posted by Tony Sollars On
Chick-fil-A Confirms Credential Stuffing Attack

Credential stuffing is one of the many forms of cyberattacks on the rise. It's a low-risk, low-cost automated method. It uses bots to access username-password combinations from past data breaches. It then ...

Read More

US Government: Royal Ransomware Targets Critical Infrastructure

Posted by Tony Sollars On
US Government: Royal Ransomware Targets Critical Infrastructure

The United States government is alerting organizations about the Royal ransomware operation. The Federal Bureau of Investigation (FBI) and the Cybersecurity & Infrastructure Security Agency (CISA) said in a joint advisory that ...

Read More

Blog

ChatGPT on ChatGPT

Posted by Hal Hostetler On
ChatGPT on ChatGPT

I decided to jump on the bandwagon and do a blog article on ChatGPT; it seems like everyone is discussing its ...

Read More

Surface – The Good, The Bad, and The Ugly

Posted by Hal Hostetler On
Surface – The Good, The Bad, and The Ugly

I’m just about through moving into this shiny, new Surface Laptop Studio that I’ve acquired and, since it’s time ...

Read More

Social Media


RST TECH TIPS

Join our Tech Tips list to get Tips & Info about using your technology and keeping secure.