IT News and Coffee
Printers Can Expose Your Business
No matter how careful your team may be, motivated cybercriminals will find ways to evade your defenses and penetrate your business networks. Poorly guarded endpoints, unpatched workstations and servers, and careless mobile users are favored targets. But there’s...
Basics of Effective Security Awareness Training
Did you know that a staggering 90% of successful breaches are caused by human error? This should make it critical for your company to have ongoing Security Awareness Training as part of your company's security strategy. Lack of training in basic cybersecurity...
Do You Know What EDR is and Why It’s Important to SMB Security
By now I'm pretty sure everyone has heard of the term endpoint security. To most people when they hear the word endpoint security they think anti-virus or anti-maleware. Now here's the problem with "basic" or "standard" endpoint security. Basic endpoint security such...
Cybersecurity Concept – PROTECTION
While prevention is the first step in keeping attackers out, you must also ensure that sensitive or valuable data held within your network is properly protected. To continue with the home security metaphor, this is where internal security measures come in, like a safe...
Cybersecurity Concept – PREVENTION
Did you know that many newsworthy breaches are preventable? In fact, over 90% of security breaches last year could have been prevented with varying levels of cybersecurity solutions. When securing your home, you probably start with the basics: a fence around your...
Cybersecurity – What is it?
Cybersecurity in an of itself is not simple to define and can mean different things to different people. Everyone has a different aspect as to what cybersecurity is or should be based on their own experiences and/or research. You may think that cybersecurity is only...
CFO’s: Will You Continue Using An Internal IT Team in a Post COVID-19 World?
No matter when the COVID-19 pandemic will end, as a CFO you need to start planning for it now – a primary concern will be to what extent you continue with remote work, and whether that will call for a different model of IT support. It may take some time for the world...
Are you HIPAA-compliant? 4 Things to Look Into
Medical records are extremely private and their exposure could lead to negative consequences such as social stigma and job discrimination. The Health Insurance Portability and Accountability Act (HIPAA) protects this information and grants patients the right to view...
What is Cybersecurity?
Surprisingly, such a simple word has a very complex set of definitions. Depending who you ask (or which link you click when you google it) you may learn that cybersecurity is network security, or that cybersecurity is about protecting data, or cybersecurity is...
3 Critical Cyber Security Protections EVERY Business Must Have In Place
Three years ago, you might have had state-of-the-art security protecting your business and network. You had the latest malware protection, highly rated firewalls and a great data backup plan. Maybe you even had a handbook on how to address cyberthreats. You were set....
Location
El Paso, Texas
(915) 881-3422
info@rgtech-elp.com