Welcome to Our Blog
IoT Devices Used As Proxies for Anonymity
The FBI posted a public service announcement warning of the dangers of unprotected IoT devices. The risks posed by insecure consumer IoT devices have long been known — ever since the Mirai botnet DDoS-ed a string of big-name sites back in 2016. But with an estimated...
read moreDangers of Outdated IT Systems in Small-to-Medium Healthcare Organizations
The common mentality of IT in small to medium healthcare organizations is “if it ain’t broke, don’t fix it,” which can cause serious problems down the road. This way of thinking could be harmful but it’s doesn’t stem from bad intentions. Small to medium healthcare...
read moreGoogle Chrome – Insecure HTTP D-Day is Here
Google Chrome users who visit unencrypted websites will be confronted with warnings today. The changes will come for surfers using the latest version of Google Chrome, version 68. Any web page not running HTTPS with a valid TLS certificate will show a "Not secure"...
read moreBasic Security Foundation Elements
It’s no secret that data breaches are an ugly reality for businesses today, however the biggest issue organizations face today is a lack of focus on building and maintaining a basic security foundation. So, what should the foundation provide? The Verizon Data Breach...
read moreHow much should you invest in protecting your data?
Would you put a $ 100 fence around a $ 10,000 horse? Does it make sense to put a $ 10,000 fence around a $ 100 horse? For the right security, you need to know what your horse is worth. The same concepts apply to protecting your data. What is your data worth? Ask...
read moreTypes of Social Engineering Scams
With cyber attacks on the rise, it’s more important than ever to ensure your network is properly protected from these threats. One of the easiest methods to accomplish this is through proper employee cybersecurity training. Below are some of the most common social...
read moreImplementing A Proactive Approach for Securing Your Assets
Another day, and another whirlwind of worrying online posts about a new malware variant that appears to evade your existing solution. Bolstered by scary statistics – with a “sponsored research” disclaimer neatly tucked away in the bottom corner, of course! – you’ll be...
read moreAre You Leaving Your RDP Back Door Open?
What is Remote Desktop Protocol? Also known as RDP, it is a proprietary protocol developed by Microsoft that allows a user to access another computer through a graphical interface, and is a powerful tool for systems administrators. In the wrong hands, RDP can be used...
read moreHyper-Evasive Malware is Becoming the Norm
Total annual malware volumes are up 7x globally over the last five years according to data from AV-Test.org, which means internet users and businesses are witnessing a rising flood of maliciousness in their email and web interactions. That number is being matched by...
read moreCONTACT US
ABOUT RGT
Our vision is to become your one-stop shop for everything IT-related, from network management and cloud solutions to VoIP and network security.
CONTACT INFO
PO Box 963310
El Paso TX 79996
Phone: 915.881.3422
Fax: 915.881.3418
info@rgtech-elp.com