IT News and Coffee

Cybersecurity Concept – PROTECTION

Cybersecurity Concept – PROTECTION

While prevention is the first step in keeping attackers out, you must also ensure that sensitive or valuable data held within your network is properly protected. To continue with the home security metaphor, this is where internal security measures come in, like a safe...

Cybersecurity Concept – PREVENTION

Cybersecurity Concept – PREVENTION

Did you know that many newsworthy breaches are preventable? In fact, over 90% of security breaches last year could have been prevented with varying levels of cybersecurity solutions. When securing your home, you probably start with the basics: a fence around your...

Cybersecurity – What is it?

Cybersecurity – What is it?

Cybersecurity in an of itself is not simple to define and can mean different things to different people. Everyone has a different aspect as to what cybersecurity is or should be based on their own experiences and/or research. You may think that cybersecurity is only...

Are you HIPAA-compliant? 4 Things to Look Into

Are you HIPAA-compliant? 4 Things to Look Into

Medical records are extremely private and their exposure could lead to negative consequences such as social stigma and job discrimination. The Health Insurance Portability and Accountability Act (HIPAA) protects this information and grants patients the right to view...

What is Cybersecurity?

What is Cybersecurity?

Surprisingly, such a simple word has a very complex set of definitions. Depending who you ask (or which link you click when you google it) you may learn that cybersecurity is network security, or that cybersecurity is about protecting data, or cybersecurity is...

Endpoint Next-Gen Firewall

Endpoint Next-Gen Firewall

We're proactively responding to the opportunity COVID presents to attackers globally and the challenges it is creating. Two of the biggest impacts that we have identified as a direct result of the massive work from home initiatives are: A lack of firewall visibility...

Time To Change Your Settings

Time To Change Your Settings

If you have Windows 10 (which you should by now), you may be aware of the invasive settings that come with this operating system.  I’m normally not paranoid, but I think you should know that the settings are not exactly in your favor! Do you feel like your online...

A Closer Look at Fileless Malware

A Closer Look at Fileless Malware

To avoid detection by anti-malware programs, cybercriminals are increasingly abusing legitimate software tools and programs installed on computers to initiate attacks. They use fileless malware to infiltrate trusted applications and issue executables that blend in...

Location

El Paso, Texas
(915) 881-3422

info@rgtech-elp.com