Blog

02 08, 2017

3 Guidelines to Keep Your Kids Safe Online

{By Restech |} August 02, 2017 | online safety, child online safety | 0 Comments

As an adult, it's a struggle to stay secure online - creating strong passwords, maintaining a basic knowledge of malicious online content, and knowing what to post and what not to post on social[...]

13 07, 2017

Cybersecurity Word Search

{By Restech |} July 13, 2017 | cybersecurity | 0 Comments

How many words can you find?  Watch the video below to see the answers.

12 07, 2017

3 Tips to Keep Your Phone Safe

We all love our mobile devices dearly. Without our phones, we'd be lost, roaming the world with no sense of direction (mostly because we'd have no maps). But for some reason, it's still incredibly[...]

03 07, 2017

Smoked Gouda Cheese Grits with Brisket & Poached Egg

{By Restech |} July 03, 2017 | Breakfast | 0 Comments

We love a good meal and Restech Vice President/Co-Owner makes some creative and tasty dishes for the entire staff every Friday for breakfast.

27 06, 2017

Global Ransomware Attack Alert: PETYA

{By Restech |} June 27, 2017 | ransomware, cybersecurity | 0 Comments

A new cyberattack is spreading in Europe, Russia and the U.S. affecting major banks, metro systems, and large corporations around the world. Similar to the recent WannaCry attack, it is a [...]

23 06, 2017

Bill's Chipotle Gouda & Gruyere with Ham Breakfast Casserole

{By Restech |} June 23, 2017 | breakfast casserole | 0 Comments

Are you ready for some fun breakfast recipes?

22 06, 2017

3 Tips to Prevent Identity Theft

{By Restech |} June 22, 2017 | identity theft | 0 Comments

With data breaches happening every day, it's best to take measures to protect your personal and business information as much as possible.

12 06, 2017

4 Cybersecurity Tips to Keep Your Business Safe

{By Restech |} June 12, 2017 | ransomware, cybersecurity | 0 Comments

On May 12, the "Wannacry" ransomware attack began and was soon making headlines around the world. It exploited a vulnerability in Microsoft Windows, then encrypted the hard drives of infected PCs[...]

30 05, 2017

Can Your Password Stand Up to a Data Breach?

At this point, it seems like companies ask you to change your password frequently, because something got hacked. In fact, in June of 2016, Fortune Magazine said, "It's almost fashionable to become[...]

23 05, 2017

Can You Spot the Potentially Dangerous File?

{By Restech |} May 23, 2017 | cybersecurity | 0 Comments

Most of us know that opening unknown files is a dangerous behavior, but how do you spot malicious files?

Imagine a co-worker sends you a picture they want you to see and it's a .jpg file. You open[...]