The logo for regional technology solutions has a green gear in the middle.
Call 903-218-6400

Safety Tips, News, & Announcements

By Regional Technology Solutions 07 Mar, 2024
The solar eclipse is fast approaching, so get ready to experience this rare event where the moon covers the sun, creating a breathtaking sight. ETCOG Regional Technology Solutions (RTS) has played an important role in enhancing your experience by determining if you are within the path of totality. The solar eclipse, marked by the alignment of the sun, moon, and Earth, resulting in the temporary obscuration of the sun's light. During this occurrence, the moon casts a shadow on Earth, offering observers a unique glimpse of the sun's corona and a twilight during daylight hours. Remarkably, half of ETCOG's 14-county region finds itself within the path of totality, positioning East Texas as a prime location for eclipse enthusiasts. This event on Monday, April 8 marks the first total eclipse visible to East Texas since 1878. To make sure you make the most of this rare occurrence, RTS has built an eclipse map that allows you to pinpoint your location within the path of totality. You can access the map to view your location by visiting go.etcog.org/2024eclipse . Beyond the eclipse map, RTS specialized in the creation of interactive solutions, ranging from customized apps to digital maps, and prints. These services are offered to city, county, and partners, showcasing ETCOG's commitment to solving local solutions and a low cost. For more local information → www.visittyler.com/solar-eclipse
Overview photo of laptop keyboard
By Regional Technology Solutions 30 Jan, 2024
The digital realm is evident in our daily lives, impacting personal, professional, and educational areas. Kids nowadays master touch screens before they can articulate sentences, diving into various digital realms. However, this pervasive online presence raises serious security concerns and cyber threats. This concern showcases the importance of Safer Internet Day, a global movement urging everyone to pitch in for a safer online world. What is Safer Internet Day? Taking place in early February, Safer Internet Day is a worldwide event. The official host in the U.S. is ConnectSafely, a Silicon Valley non-profit. Its mission - making the internet a safer, more positive space by spreading awareness about responsible and respectful tech use. Why is it important? In 2021, over 90% of people in developed countries were internet users, making them targets for cybercrimes like identity theft, financial scams, and malware. The Federal Trade Commission (FTC) reported 3.2 million identity theft cases in 2019, mostly linked to online activities, resulting in hefty financial hits. Safer Internet Day is about sounding the alarm on these threats, offering resources and intel. Tips to navigate the internet safely: Safer Internet Day is the perfect time to give your online habits a once-over. Here are some tips for staying safe: Education is Power: Stress the need to keep Personally Identifiable Information (PII) private within the organization. Establish clear online guidelines, including approved websites and applications. Reinforce the significance of creating strong, unique passwords and discouraging password sharing. Stay sharp to spot threats: Promote media literacy within the organization to identify fake news and potential scams. Heighten awareness of phishing attempts and provide guidance on avoiding them. Foster open communication channels, particularly within the organization's digital landscape. Get ahead of the game: Review and discuss the applications used within the organization, addressing any safety concerns. Strengthen digital defenses with antivirus software, parental controls, and VPN technology. Advocate for the implementation of multi-factor authentication (MFA) and regular software updates. Monitor online transactions to ensure they occur on secure platforms. Defending the Digital Turf The internet exposes everyone to cyber threats, from scams to severe data breaches. Organizations can collectively create a more secure online haven for everyone by increasing defenses and adopting safe procedures and practices. If your organization needs assistance building a plan for secure online practices, our dedicated team is here to help. We understand the dynamic nature of cyber threats and can provide tailored solutions to safeguard your organization's digital assets. Contact us today, and let's collaborate to ensure a safer and more resilient digital future for your organization.
Graphic with hexagons with lock graphic in the middle overlayed on photo of typing on keyboard
By The Security Awareness Company 22 Aug, 2023
In the rapidly evolving landscape of the digital world, the threat of cyberattacks is an ever-present concern. Cybercriminals have various tools and techniques to infiltrate systems, compromise data, and disrupt the lives of individuals and organizations alike. One common thread that runs through many of these attacks is their ability to exploit human behavior and technological vulnerabilities. Here are the most prevalent methods used by malicious actors to spread infections and explore preventive measures to bolster your digital defenses. Attack Method: Phishing Phishing is the oldest trick in the cybercriminal playbook and continues to be remarkably effective. This technique involves sending deceptive emails or messages that appear legitimate, enticing recipients to click on malicious links or download infected attachments. These messages often invoke a sense of urgency or fear, pushing individuals to act hastily without thinking. Attackers may also utilize misspelled words and unexpected file attachments to manipulate users into lowering their guard. Prevention Technique: Always be cautious when encountering unsolicited emails, especially those demanding immediate action or containing unusual attachments. Hover your cursor over links to preview the URL before clicking, and verify the sender's email address. When in doubt, contact the supposed sender through a separate channel to confirm the message's authenticity. Attack Method: USB Drives and Cables Harnessing human curiosity as a weapon, cybercriminals often plant infected USB drives and cables in public spaces, exploiting the innate desire to discover what's hidden within. This practice, known as USB baiting, preys on unsuspecting victims who plug in these devices without considering the potential risks. Prevention Technique: Exercise extreme caution when encountering unattended USB devices or cables. Avoid connecting unknown devices to your system, as they might contain malware programmed to infect your device upon connection. If you encounter such devices, report them to the appropriate authorities or IT department for proper handling. Attack Method: Malicious Mobile Apps The proliferation of smartphones and mobile apps has opened up a new avenue for cyberattacks. Despite stringent vetting processes employed by major app stores, malicious apps sometimes sneak through. These apps can compromise your personal data, steal sensitive information, or even grant unauthorized access to your bank accounts. Prevention Technique: Prioritize apps from reputable developers with a proven track record. Carefully review app permissions before installation, ensuring they align with the app's intended functionality. Avoid sideloading apps from unofficial sources, as these can pose significant security risks. On work-issued devices, always adhere to company policies regarding app downloads. Attack Method: Software Vulnerabilities Cybercriminals are perpetually on the lookout for weaknesses in software systems. Once identified, these vulnerabilities can be exploited to breach security controls and gain unauthorized system access. Regularly updating software is crucial, as developers issue patches and updates to address these vulnerabilities and enhance security. Prevention Technique: Keep your devices updated by promptly installing software updates. In a corporate environment, adhere to company policies concerning software management. Regularly monitor official sources for security advisories and updates related to the software you use, and apply them in a timely manner.  In the digital age, cybersecurity vigilance is paramount. By understanding cybercriminals' tactics to spread malicious infections, you can take proactive steps to protect your personal information, devices, and systems. Employing a combination of skepticism, caution, and adherence to security best practices will help you navigate the complex landscape of cybersecurity threats and safeguard your digital presence.
aerial photo of neighborhood
By East Texas Council of Governments 26 Jul, 2023
Geographic information systems (GIS) are powerful tools that can be used to visualize, analyze, and manage spatial data. They have a wide range of applications in city and county jurisdictions, including: Planning and development: GIS can be used to map and manage zoning, land use, transportation, and other infrastructure data to help with planning and development decisions. For example, GIS can be used to identify areas that are suitable for new development or to assess the impact of a proposed development on traffic patterns. Utility and Asset management: GIS can be used to map and track assets, such as water and sewer utilities, roads, bridges, and buildings. This information can be used to manage assets more effectively and to identify assets that need maintenance or repair. Emergency management: GIS can be used to map emergency response resources, such as fire stations, hospitals, and shelters. This information can be used to plan for and respond to emergencies more effectively. Public safety: GIS can be used to map crime data, traffic accidents, and other public safety data. This information can be used to identify crime hot spots, target enforcement efforts, and plan for public safety improvements. Environmental management: GIS can be used to map environmental data, such as air quality, water quality, and land use. This information can be used to assess the impact of human activity on the environment and to develop and implement environmental policies. These are just a few of the ways that GIS can be used in city and county jurisdictions. As GIS technology continues to evolve, we can expect to see even more innovative applications of GIS in the years to come. How to Get Started with GIS If you're interested in using GIS in your community but don't have the staff time, expertise, or software, ETCOG can help! Our Regional Technology Solutions team offers affordable GIS services. To learn more, visit our GIS Services page .
Robot hand with a blue background
By The Security Awareness Company 14 Jul, 2023
By the way, everything you’ve read on this page (up until now) was not written by a human, but by an AI chatbot. It was simply asked to define artificial intelligence and explain the related security concerns. If you wanted to, you could ask that same bot to write poetry about cats, explain quantum physics, or basically anything else you can think of. The chatbot is a basic example that barely captures AI’s capabilities. As it evolves, AI technology will become even more advanced with abilities we never thought possible of machines. This, of course, ushers in all sorts of interesting conversations regarding human intelligence vs. machine intelligence, and what might happen if the latter surpasses the former. Those conversations make this quote from the 1993 movie Jurassic Park eerily relevant: “Your scientists were so preoccupied with whether they could, they didn’t stop to think if they should.” Nonetheless, AI is an active part of our lives. And it’s not hard to imagine cybercriminals leveraging AI to carry out attacks in the near future. As an example, AI models could learn about a real person and then use bots to mimic their actions and language. This would allow criminals to create advanced phishing campaigns that target specific people at a much more effective rate than any human could. It’s also possible AI will be used to circumvent attacks from criminal hackers. But even as those technologies become more of a reality, advancements in cyberdefenses will always lag behind advancements in cyberattacks. Everything you’ve read on this page (up until now) was written by a human, but below was written by an AI chatbot. It was simply asked to define artificial intelligence and explain the related security concerns. If you wanted to, you could ask that same bot to write poetry about cats, explain quantum physics, or basically anything else you can think of. The chatbot is a basic example that barely captures AI’s capabilities. Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think and learn like humans. AI can be divided into several different types, including: Rule-based systems, which follow a set of predetermined rules to reach a conclusion Expert systems, which use a knowledge base to make decisions Neural networks, which are modeled after the human brain and can learn from data Natural language processing, which enables machines to understand and interpret human language AI technology has been developed in various areas such as image recognition, self-driving cars, personal assistants, and so on. There are several security concerns regarding AI technology. Here are a couple of examples: Data poisoning: In some cases, attackers may try to inject malicious data into the training dataset to “poison” the model and cause it to make incorrect decisions. Physical safety: Some AI applications, such as self-driving cars or industrial robots, may pose physical safety risks if they malfunction or are compromised by an attacker
View of conference main session from back of room.
By Regional Technology Solutions 30 May, 2023
In the dynamic landscape of technology and cybersecurity, county, city, and regional officials and staff face numerous challenges in delivering efficient and secure services to their communities. To bridge the gap between technology, cybersecurity, and county service, the Regional Technology Solutions (RTS) Team embarked on an empowering journey by attending the Texas Association of Counties (TAC) Technology Conference. With a robust and member-shaped agenda, this conference aimed to equip individuals with critical information and strategies regardless of their technical comfort levels. The body content of your post goes here. "At the Texas Association of Counties Technology Conference, I had the privilege of representing ETCOG, and it was truly an enriching experience. Engaging with seasoned professionals in the technology industry through insightful presentations provided me with valuable knowledge," said IT Systems Administrator Dylan Savage. "Moreover, networking with fellow county representatives across Texas shed light on the distinctive technological challenges they encounter. This exposure enables us to shape innovative solutions for the counties we represent, fostering progress and growth." The TAC Technology Conference offered an array of transformative sessions, empowering county and city staff with critical information and strategies. Participants delved into the intricacies of legally required website postings, gaining insights on ensuring compliance and accessibility for county and city services. They explored innovative approaches to managing data storage and backups, safeguarding valuable county information from loss or unauthorized access. Sessions on records management provided techniques for streamlining efficiency and accessibility, while addressing the challenges of maintaining transparency in county operations. Budgeting for technology projects was a key topic, enabling attendees to maximize the value and impact of county investments in technology and cybersecurity. Finally, sessions on developing technology policies provided guidance on creating a secure and innovative environment while adhering to best practices and legal requirements. "During our interactions with county IT and non-IT staff, we acquired invaluable knowledge that will greatly enhance our support for ETCOG and Workforce," said IT Network Administrator Brian Brown. "As representatives of ETCOG, understanding the challenges faced by IT officials in Texas provides a profound perspective on the significance of our work. Witnessing the endeavors of other COGs and the counties they serve, I feel immense pride in the accomplishments of ETCOG and the extensive assistance we provide to meet the needs of our local counties." The RTS Team's participation in the TAC Technology Conference provided them with knowledge, tools, and strategies to bridge the gap between technology and cybersecurity. By actively engaging in various sessions, they gained insights into crucial topics such as website compliance, data management, cybersecurity incident response, and technology policy development. Equipped with this newfound expertise, the RTS Team is poised to drive innovation, enhance county services, and safeguard critical information, ultimately bridging the gap between technology, cybersecurity, and city and county service for the benefit of the East Texas community. To learn more about how RTS can help your organization safeguard against cyber attacks and promote safe practices, visit → www.regionaltechnologysolutions.com/it-services
White digital mouse hovering over
By National Cybersecurity Alliance 04 Apr, 2023
Launched in 2021, the mission of Identity Management Day is to educate business leaders and IT decision makers on the importance of identity management and key components including governance, identity-centric security best practices, processes, and technology, with a special focus on the dangers of not properly securing identities and access credentials. In addition, the National Cybersecurity Alliance will provide guidance for consumers, to ensure that their online identities are protected through security awareness, best practices and readily-available technologies.  Research by the IDSA reveals that 79% of organizations have experienced an identity-related security breach in the last two years, and 99% believe their identity-related breaches were preventable. According to the 2020 Verizon Data Breach Investigations Report, as many as 81% of hacking-related breaches leverage weak, stolen, or otherwise compromised passwords. As part of Identity Management Day, the National Cybersecurity Alliance and the IDSA, will provide guidance for stakeholders at all levels, to ensure that identities of employees, machines, applications, and partners are protected through security awareness, best practices and readily-available technologies. Learn more about Identity Management Day at → www.idsalliance.org/event/identity-management-day-2023
city staff using device to map location
By ETCOG's GIS Program 01 Nov, 2022
ETCOG announces a new project partnered with the City of Wills Point to build a code enforcement module for their Geographic Information Systems (GIS) platform. Wills Point has been participating in ETCOG's GIS program for many years, which allows them to contract with ETCOG for low-cost GIS services and platform administration. The new code enforcement module will be used by Wills Point internally by enforcement officers, building officials, and zoning administrators to collect and monitor violations and related inspection information.
Aerial photo of individual typing on two laptops
By Texas Association of Counties 12 Oct, 2022
So what is MFA? It is an additional layer of security that protects your accounts with more than just a single password. When logging in from a new device or location, or following a password reset, users will be asked for two things: a password and a security code, often sent to the account owner's cellphone or landline. MFA acts a second line of defense. So why use MFA? In a word, security. Microsoft reports that there are over 300 million fraudulent sign-in attempts to its cloud services every day. In addition, hackers don't take vacations , the federal Cybersecurity & Infrastructure Security Agency (CISA) says. Their tactics are constantly evolving, and one-third of Americans were victims of cybercrime last year, CISA says. Does MFA really work? Microsoft says that implementing MFA can block 99.9% of attacks on your accounts. Hackers are getting better at phishing and harvesting passwords to gain unauthorized access . They take advantage of reused passwords stolen in other breaches, but even so, enforcing MFA is an effective barrier that greatly reduces the likelihood of a break-in. Cybercriminals often move on to new targets when they encounter MFA security. Remember, hackers are like burglars. They are looking for an easy way in. Don't give it to them. Put an extra lock on the door with MFA. Email services provided by TAC CIRA already include MFA. Reach out to TAC CIRA at support@county.org or by phone at (800) 456-5974 to implement MFA today.
Aerial image of two people typing on laptop.
By Regional Technology Solutions 11 Feb, 2022
The Affordable Connectivity Program (ACP) is a Federal Communications Commission (FCC) program that replaces the Emergency Broadband Benefit Program (EBB Program) to help low-income households pay for internet service and connected devices. If your household is eligible , you can receive: Up to a $30/month discount on your internet service Up to a $75/month discount if your household is on qualifying Tribal lands A one-time discount of up to $100 for a laptop, tablet, or desktop computer (with a co-payment of more than $10 but less than $50) Only one monthly service discount and one device discount is allowed per household. To receive the connected device discount, consumers need to enroll in the ACP with a participating provider that offers connected devices (Note: not all internet company offer device discounts.) The internet company will provide the discount to the consumer.
Show More

Stay Connected

Follow us to keep up with our latest news
Share by: