September 2024 Cybersecurity Newsletter

Welcome to our monthly cybersecurity newsletter. Our goal with this newsletter is to bring you some of the latest news in cybersecurity & business. This newsletter will be different from our weekly newsletter, POST. If you would like to see what our weekly newsletter covers, you can review the latest issue and subscribe at https://rts.news.

GALACTIC TRUST & Compliance Certification

We are pleased to announce that ResTech became compliance certified in July 2024. We have furthered our partnership with Galactice Advisors by completing our compliance certification with them, continuing our commitment to help all businesses achieve compliance.

In 2023 we partnered with Galactic Advisors. Galactic Advisors is a third-party cybersecurity firm that partners with IT providers such as ResTech Solutions and focuses on security from third-party assessments to compliance. As part of this partnership, Galactic Advisors regularly audits our internal systems. In early April 2024 we completed the first stage of our security journey and acheived Trust Level 1.

You can learn more about our Trust Level 1 certification and see our last audit date here.

Tech Humor

Billy began to wonder if his new boss was talking about cookies. In reality, it was about prestige…

Cybersecuirty news

September 2024

Business Email Compromise On the Rise

The average loss per Business Email Compromise incident is a hefty $137,000 which underscores the severity of this cybercrime. Could you handle a loss that grand?

Don’t let BEC steal your peace of mind (or your money). Here’s how to protect yourself!

The TikTok Chase Bank Glitch: A Lesson in Cybersecurity

A recent TikTok trend, dubbed the “Chase Bank glitch,” has sent tons of users into debt.

Have you heard of the so-called banking glitch? We’ll break down what it is and why it is backfiring.

How Microsoft Copilot Got Hijacked

The recent ASCII Smuggling attack on Microsoft 365 Copilot demonstrates the increasing complexity of AI-driven cyber threats and the importance of robust security measures to protect sensitive data! Here’s what you need to know about the incident.

Cyber Extortion Is NOT Just a Concern for Your Boss

Common types of cyber extortion include ransomware, distributed denial-of-service (DDoS) attacks, and brute-force data extortion. These are all digital methods for attackers to pry money and sensitive information from the organization under duress!

Find out how to protect your private data inside.

Real Site or Typosquat? Here’s How to Tell

What if you click on the link by mistake, or simply because you don’t stop to more carefully examine the email? Then, we run into another problem: Typosquatting.

What is this threat, and how can we protect our data?

Encryption: The Invisible Shield Protecting Your Data

Encryption, once a complex term reserved for tech experts, has become an integral part of our daily lives.

So what exactly is it, and how does it benefit the average person?

Select Business & Tech Articles

September 2024

Into the Breach: Why Employees Remain the Achilles Heel

Kurt Markley, Security Today

A recent Monster survey highlights a striking trend: 26% of workers would prefer a root canal over working in the office five days a week. To balance this with the need for collaboration, many companies are adopting hybrid models, but trust issues around remote work are emerging. Discover three essential steps organizations should take to address these challenges.

Do You Need a Company Social Media Policy?

Larry Alton, All Business

If your company is on social media, having a policy is crucial to keep everyone accountable. Without one, social media can become more of a distraction than a tool. A good policy sets online behavior expectations and protects against legal risks. Here are four reasons you need a social media policy.

Can a YouTube Video Really Fix Your Wet Phone?

Davide Pierce, The Verge

Millions of viewers are turning to YouTube videos to save their water-damaged phones, but do they actually work? And can you trust the comments? While these videos might offer quick fixes in an emergency, here’s why you shouldn’t rely on them too much.

Feeds Full of Junk? How to Reset Your Social Media Algorithms

Eric Griffith, PC Mag

Almost everything in your social media feed is driven by algorithms, which track your interactions to show more content you’ll engage with. However, they’re not perfect and can fill your feed with unwanted posts. If your feed’s content isn’t interesting anymore, here’s how to reset those algorithms and regain control.

And … Select Video Picks from our Staff

Robots Abroad

China unveiled their latest AI marvel: a humanoid robot.

Hacking Kids

The industry seeks ways to educate children of potential risks.

Doctors & AI

Case studies on AI’s ability to improve clinical trial accuracy.

We are here to help

Do you have questions or concerns about your business’ cybersecurity posture? Does your business need help with cybersecurity?

Leave a Reply