IT News and Coffee
Cybersecurity Concept – PROTECTION
While prevention is the first step in keeping attackers out, you must also ensure that sensitive or valuable data held within your network is properly protected. To continue with the home security metaphor, this is where internal security measures come in, like a safe...
Cybersecurity Concept – PREVENTION
Did you know that many newsworthy breaches are preventable? In fact, over 90% of security breaches last year could have been prevented with varying levels of cybersecurity solutions. When securing your home, you probably start with the basics: a fence around your...
Cybersecurity – What is it?
Cybersecurity in an of itself is not simple to define and can mean different things to different people. Everyone has a different aspect as to what cybersecurity is or should be based on their own experiences and/or research. You may think that cybersecurity is only...
CFO’s: Will You Continue Using An Internal IT Team in a Post COVID-19 World?
No matter when the COVID-19 pandemic will end, as a CFO you need to start planning for it now – a primary concern will be to what extent you continue with remote work, and whether that will call for a different model of IT support. It may take some time for the world...
Are you HIPAA-compliant? 4 Things to Look Into
Medical records are extremely private and their exposure could lead to negative consequences such as social stigma and job discrimination. The Health Insurance Portability and Accountability Act (HIPAA) protects this information and grants patients the right to view...
What is Cybersecurity?
Surprisingly, such a simple word has a very complex set of definitions. Depending who you ask (or which link you click when you google it) you may learn that cybersecurity is network security, or that cybersecurity is about protecting data, or cybersecurity is...
3 Critical Cyber Security Protections EVERY Business Must Have In Place
Three years ago, you might have had state-of-the-art security protecting your business and network. You had the latest malware protection, highly rated firewalls and a great data backup plan. Maybe you even had a handbook on how to address cyberthreats. You were set....
Endpoint Next-Gen Firewall
We're proactively responding to the opportunity COVID presents to attackers globally and the challenges it is creating. Two of the biggest impacts that we have identified as a direct result of the massive work from home initiatives are: A lack of firewall visibility...
Time To Change Your Settings
If you have Windows 10 (which you should by now), you may be aware of the invasive settings that come with this operating system. I’m normally not paranoid, but I think you should know that the settings are not exactly in your favor! Do you feel like your online...
A Closer Look at Fileless Malware
To avoid detection by anti-malware programs, cybercriminals are increasingly abusing legitimate software tools and programs installed on computers to initiate attacks. They use fileless malware to infiltrate trusted applications and issue executables that blend in...
Location
El Paso, Texas
(915) 881-3422
info@rgtech-elp.com