Blog

09 11, 2016

5 Tips for Data Breach Victims

{By Restech |} November 09, 2016 | Data Breach | 0 Comments

No one likes a hacked account.  Am I right?  A hacked account can result in financial loss, identity theft, or just a whole lot of wasted time.  None of which is fun.  But unfortunately, you don’t[...]

22 09, 2016

Apple Store Phishing Attack

{By Restech |} September 22, 2016 | Blog | 0 Comments

 

18 07, 2016

4 Ways to Improve Email Security

{By Restech |} July 18, 2016 | Blog | 0 Comments

One of the first things most people do every day is check email. With the amount of email we get, it’s usually easy to tell which ones are spam, but hackers are making it more difficult to spot[...]

30 06, 2016

Can Your Data Survive a Kidnapping?

{By Restech |} June 30, 2016 | Blog | 0 Comments

How would you feel if someone hijacked everything on your computer and held it for ransom? 

26 05, 2016

A Brief Guide to Encryption

{By Restech |} May 26, 2016 | Blog | 0 Comments

Over the last few months, the public has been sitting on the sidelines watching as the debate on encryption unfolds. It’s an emotionally charged subject that has the public divided.

13 04, 2016

5 Things to Remember About Mobile Device Security

{By Restech |} April 13, 2016 | Blog | 0 Comments

 

12 04, 2016

The Trick to Creating Easy-To-Remember Passwords

{By Restech |} April 12, 2016 | Blog | 0 Comments

The general public tends to view passwords as nothing more than a nuisance, “You want a number AND a capital letter? Geeze, pretty soon you’ll be asking for a special character.” In all honesty, if[...]