RTS Header Image

Email not displaying correctly? View in Browser
View our current and past issues here.

You are receiving this weekly information because you are either a client of ResTech Solutions, we met at a networking event/group, interacted on social media, or you opted into receiving our emails.

It includes tech tips, resources, schedule updates, blog posts, and threat intel information.

If you no longer wish to receive this information, click Unsubscribe at the bottom of the page. "Marking Spam" will prevent others from getting this information.

Welcome to our weekly newsletter. Our goal with this newsletter is to bring you the latest information we have to share related to IT, cybersecurity, & business while reducing the number of emails we send.

2025 Week 42

UPCOMING SCHEDULE CHANGES

Below are upcoming changes to our regular schedule.

  • No upcoming schedule changes

UPCOMING EVENTS

Below are upcoming events we are hosting or sponsoring.

  • October 22 Live Event Workshop: Hire Your First AI Employee - Register at https://cgt.sh/events

MSP Titans of the Industry Finalist

We are honored to announce that David Levine/ResTech Solutions has been named a finalist for the second year in a row for the MSP Titans of the Industry awards for 2025 in the Legal Services category. This recognition highlights our commitment to excellence, innovation, and leadership within the Managed Service Provider (MSP) industry.

The MSP Titans of the Industry Awards celebrate the top performers in the MSP sector, recognizing those who have made significant contributions to the field through exceptional service, innovative solutions, and impactful business growth. Being selected as a finalist is a testament to our dedication to delivering outstanding results for our clients and advancing the MSP industry.

CYBERSECURTIY TIP

This can happen at work OR at your home
Wait until you hear this story about what a secretary did

A secretary unknowingly gave a con artist access to her law firm’s server room when a total stranger showed up in a Comcast Cable shirt and said he was there to audit their cable modem.

The guy, part of a now-extinct criminal ring, had bought the shirt off eBay. He used this to gain access to several businesses by going inside the office and noting the configuration details and passwords for their firewalls and cable modems. In some cases, he actually built a secure VPN private backdoor he later used to steal data.

If someone dressed in a utility-provider uniform showed up at your office, would you let them in? Everyone assumes that hacking is performed by a guy in a hoodie working from an undisclosed basement in Russia. That’s not always the case.

When someone shows up at your office for anything, train your team to ask for identification. Ask who in your organization they have spoken to about the service they are performing and be “gracefully suspicious,” as they say in the South.

If the person requesting access to your server room or your computers provides an ID, that isn’t enough. Look up the phone number for the organization they say they’re representing and contact them directly. Do not use the phone number on the ID card or a phone number provided by the person on-site.

Keep company policies about how visitors are allowed in the building, if such policies exist. If those kinds of policies don’t exist, work to define them. We can help, if needed – but this is a real problem your office needs to address.

Have questions about cybersecurity or some other IT-related issues? Access our calendar here https://rts.sh/discovery to book a quick, 10-minute call.

RESOURCE

How Prepared Is Your Business Against Cyberthreats?

Use Our eBook to Learn Practical Steps That Can Keep Your Business Safe

Modern cyberthreats are relentless, and the cost of ignoring them can be severe. But with the right guidance, you can strengthen your defenses and lower the risk.

We've created a practical eBook, “The Cybersecurity Extinction Prevention Guide,” that walks you through the key best practices needed to protect your business. It's written to help you understand the risks and make informed improvements.

Set aside a few minutes to read it and give your organization the protection it deserves.

Get your copy now!

OUR LATEST BLOG POST

The scary truth about AI in the wrong hands

AI isn’t just powering chatbots and productivity tools, it’s also giving hackers a scary new set of tricks.

From deepfake videos that can fool your staff to AI-crafted phishing e-mails that look more convincing than ever, these new attacks are harder to spot and more dangerous for small businesses.

This week's blog breaks down what’s really worth worrying about when it comes to AI. Plus, you’ll find out how to protect your business before these threats do real damage.

Read the full blog here.

And if you’d rather not lose sleep over AI, let’s talk. A quick discovery call could be the difference between being spooked by new threats or staying ahead of them.

THREAT INTEL SOURCES

Below are some sources to reference for recent threat intelligence information. These sources will help you stay up to date on the latest threats that can impact the security of your business.

Cybersecurity & Infrastructure Security Agency (CISA)

Official Alerts & Statements - FBI

NSA Cybersecurity Advisories & Guidance

CyberProof Threat Alerts

YOUR BUSINESS DESERVES RELIABLE IT

Connect with ResTech today.

BOOK YOUR COMPLEMENTARY CONSULTATION

Thank you,
David

ResTech Solutions

David Levine, MBA
Founder & CEO
ResTech Solutions, LLC

ResTech Blocks the Hacks to Prevent the Attacks! - We are Your Technology Lifesaver

Phone: (713) 936-6855
Toll-Free: (866) 673-7832
Email: [email protected]
Website: https://restech.solutions 

RTS Facebook Page
RTS LinkedIn Page
RTS YouTube Channel

Copyright ©️ 2025 ResTech Solutions, All rights reserved.