<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>ETCOG Regional Technology Solutions Safety Tips &amp; News</title>
    <link>https://www.regionaltechnologysolutions.com</link>
    <description>Stay up to date on news from ETCOG Regional Technology Solutions. Visit our blog for safety tips, news, and announcements.</description>
    <atom:link href="https://www.regionaltechnologysolutions.com/feed/rss2" type="application/rss+xml" rel="self" />
    <image>
      <title>ETCOG Regional Technology Solutions Safety Tips &amp; News</title>
      <url>https://irp-cdn.multiscreensite.com/a5adfd0a/dms3rep/multi/RTS%2BGreen%2BCog.png</url>
      <link>https://www.regionaltechnologysolutions.com</link>
    </image>
    <item>
      <title>Pinpoint your location on the 2024 solar eclipse viewing map</title>
      <link>https://www.regionaltechnologysolutions.com/pinpoint-your-location-on-the-2024-solar-eclipse-viewing-map</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The solar eclipse is fast approaching, so get ready to experience this rare event where the moon covers the sun, creating a breathtaking sight. ETCOG Regional Technology Solutions (RTS) has played an important role in enhancing your experience by determining if you are within the path of totality.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The solar eclipse, marked by the alignment of the sun, moon, and Earth, resulting in the temporary obscuration of the sun's light. During this occurrence, the moon casts a shadow on Earth, offering observers a unique glimpse of the sun's corona and a twilight during daylight hours.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Remarkably, half of ETCOG's 14-county region finds itself within the path of totality, positioning East Texas as a prime location for eclipse enthusiasts. This event on Monday, April 8 marks the first total eclipse visible to East Texas since 1878.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            To make sure you make the most of this rare occurrence, RTS has built an eclipse map that allows you to pinpoint your location within the path of totality. You can access the map to view your location by visiting
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://go.etcog.org/2024eclipse" target="_blank"&gt;&#xD;
      
           go.etcog.org/2024eclipse
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Beyond the eclipse map, RTS specialized in the creation of interactive solutions, ranging from customized apps to digital maps, and prints. These services  are offered to city, county, and partners, showcasing ETCOG's commitment to solving local solutions and a low cost.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            For more local information →
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://visittyler.com/solar-eclipse/"&gt;&#xD;
      
           www.visittyler.com/solar-eclipse
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-9896216.jpeg" length="70015" type="image/jpeg" />
      <pubDate>Thu, 07 Mar 2024 18:27:23 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/pinpoint-your-location-on-the-2024-solar-eclipse-viewing-map</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-9896216.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-9896216.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Best Practices for Safer Internet Day</title>
      <link>https://www.regionaltechnologysolutions.com/best-practices-for-safer-internet-day</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The digital realm is evident in our daily lives, impacting personal, professional, and educational areas. Kids nowadays master touch screens before they can articulate sentences, diving into various digital realms. However, this pervasive online presence raises serious security concerns and cyber threats. This concern showcases the importance of Safer Internet Day, a global movement urging everyone to pitch in for a safer online world. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is Safer Internet Day?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Taking place in early February, Safer Internet Day is a worldwide event. The official host in the U.S. is ConnectSafely, a Silicon Valley non-profit. Its mission - making the internet a safer, more positive space by spreading awareness about responsible and respectful tech use.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why is it important?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In 2021, over 90% of people in developed countries were internet users, making them targets for cybercrimes like identity theft, financial scams, and malware. The Federal Trade Commission (FTC) reported 3.2 million identity theft cases in 2019, mostly linked to online activities, resulting in hefty financial hits. Safer Internet Day is about sounding the alarm on these threats, offering resources and intel.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Tips to navigate the internet safely:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Safer Internet Day is the perfect time to give your online habits a once-over. Here are some tips for staying safe:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Education is Power:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Stress the need to keep Personally Identifiable Information (PII) private within the organization.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Establish clear online guidelines, including approved websites and applications.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Reinforce the significance of creating strong, unique passwords and discouraging password sharing.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Stay sharp to spot threats:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Promote media literacy within the organization to identify fake news and potential scams.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Heighten awareness of phishing attempts and provide guidance on avoiding them.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Foster open communication channels, particularly within the organization's digital landscape.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Get ahead of the game:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Review and discuss the applications used within the organization, addressing any safety concerns.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Strengthen digital defenses with antivirus software, parental controls, and VPN technology.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Advocate for the implementation of multi-factor authentication (MFA) and regular software updates.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Monitor online transactions to ensure they occur on secure platforms.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Defending the Digital Turf
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The internet exposes everyone to cyber threats, from scams to severe data breaches. Organizations can collectively create a more secure online haven for everyone by increasing defenses and adopting safe procedures and practices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If your organization needs assistance building a plan for secure online practices, our dedicated team is here to help. We understand the dynamic nature of cyber threats and can provide tailored solutions to safeguard your organization's digital assets. Contact us today, and let's collaborate to ensure a safer and more resilient digital future for your organization.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-218863.jpeg" length="277391" type="image/jpeg" />
      <pubDate>Tue, 30 Jan 2024 15:10:32 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/best-practices-for-safer-internet-day</guid>
      <g-custom:tags type="string">Safer Internet Day</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-218863.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-218863.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Discover Methods Used by Malicious Actors to Spread Infections</title>
      <link>https://www.regionaltechnologysolutions.com/discover-methods-used-by-malicious-actors-to-spread-infections</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In the rapidly evolving landscape of the digital world, the threat of cyberattacks is an ever-present concern. Cybercriminals have various tools and techniques to infiltrate systems, compromise data, and disrupt the lives of individuals and organizations alike. One common thread that runs through many of these attacks is their ability to exploit human behavior and technological vulnerabilities. Here are the most prevalent methods used by malicious actors to spread infections and explore preventive measures to bolster your digital defenses.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Attack Method: Phishing
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Phishing is the oldest trick in the cybercriminal playbook and continues to be remarkably effective. This technique involves sending deceptive emails or messages that appear legitimate, enticing recipients to click on malicious links or download infected attachments. These messages often invoke a sense of urgency or fear, pushing individuals to act hastily without thinking. Attackers may also utilize misspelled words and unexpected file attachments to manipulate users into lowering their guard.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Prevention Technique:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Always be cautious when encountering unsolicited emails, especially those demanding immediate action or containing unusual attachments. Hover your cursor over links to preview the URL before clicking, and verify the sender's email address. When in doubt, contact the supposed sender through a separate channel to confirm the message's authenticity.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Attack Method: USB Drives and Cables
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Harnessing human curiosity as a weapon, cybercriminals often plant infected USB drives and cables in public spaces, exploiting the innate desire to discover what's hidden within. This practice, known as USB baiting, preys on unsuspecting victims who plug in these devices without considering the potential risks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Prevention Technique:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Exercise extreme caution when encountering unattended USB devices or cables. Avoid connecting unknown devices to your system, as they might contain malware programmed to infect your device upon connection. If you encounter such devices, report them to the appropriate authorities or IT department for proper handling.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Attack Method: Malicious Mobile Apps
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The proliferation of smartphones and mobile apps has opened up a new avenue for cyberattacks. Despite stringent vetting processes employed by major app stores, malicious apps sometimes sneak through. These apps can compromise your personal data, steal sensitive information, or even grant unauthorized access to your bank accounts.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Prevention Technique:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Prioritize apps from reputable developers with a proven track record. Carefully review app permissions before installation, ensuring they align with the app's intended functionality. Avoid sideloading apps from unofficial sources, as these can pose significant security risks. On work-issued devices, always adhere to company policies regarding app downloads.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Attack Method: Software Vulnerabilities
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybercriminals are perpetually on the lookout for weaknesses in software systems. Once identified, these vulnerabilities can be exploited to breach security controls and gain unauthorized system access. Regularly updating software is crucial, as developers issue patches and updates to address these vulnerabilities and enhance security.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Prevention Technique:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Keep your devices updated by promptly installing software updates. In a corporate environment, adhere to company policies concerning software management. Regularly monitor official sources for security advisories and updates related to the software you use, and apply them in a timely manner.
            &#xD;
        &lt;span&gt;&#xD;
          
             ﻿
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In the digital age, cybersecurity vigilance is paramount. By understanding cybercriminals' tactics to spread malicious infections, you can take proactive steps to protect your personal information, devices, and systems. Employing a combination of skepticism, caution, and adherence to security best practices will help you navigate the complex landscape of cybersecurity threats and safeguard your digital presence.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/Duda+-+Photo+Blog+Banner+%282%29.jpg" length="186701" type="image/jpeg" />
      <pubDate>Tue, 22 Aug 2023 15:47:32 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/discover-methods-used-by-malicious-actors-to-spread-infections</guid>
      <g-custom:tags type="string">cybersecurity</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/Duda+-+Photo+Blog+Banner+%282%29.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/Duda+-+Photo+Blog+Banner+%282%29.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How City and County Jurisdictions Can Use GIS in Their Communities</title>
      <link>https://www.regionaltechnologysolutions.com/how-city-and-county-jurisdictions-can-use-gis-in-their-communities</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Geographic information systems (GIS) are powerful tools that can be used to visualize, analyze, and manage spatial data. They have a wide range of applications in city and county jurisdictions, including:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Planning and development:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             GIS can be used to map and manage zoning, land use, transportation, and other infrastructure data to help with planning and development decisions. For example, GIS can be used to identify areas that are suitable for new development or to assess the impact of a proposed development on traffic patterns.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Utility and Asset management:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             GIS can be used to map and track assets, such as water and sewer utilities, roads, bridges, and buildings. This information can be used to manage assets more effectively and to identify assets that need maintenance or repair.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Emergency management:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             GIS can be used to map emergency response resources, such as fire stations, hospitals, and shelters. This information can be used to plan for and respond to emergencies more effectively.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Public safety:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             GIS can be used to map crime data, traffic accidents, and other public safety data. This information can be used to identify crime hot spots, target enforcement efforts, and plan for public safety improvements.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Environmental management:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             GIS can be used to map environmental data, such as air quality, water quality, and land use. This information can be used to assess the impact of human activity on the environment and to develop and implement environmental policies.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           These are just a few of the ways that GIS can be used in city and county jurisdictions. As GIS technology continues to evolve, we can expect to see even more innovative applications of GIS in the years to come.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How to Get Started with GIS
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If you're interested in using GIS in your community but don't have the staff time, expertise, or software, ETCOG can help! Our Regional Technology Solutions team offers affordable GIS services. To learn more, visit our
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/gis-services"&gt;&#xD;
      
           GIS Services page
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-1486785.jpeg" length="490652" type="image/jpeg" />
      <pubDate>Wed, 26 Jul 2023 20:25:55 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/how-city-and-county-jurisdictions-can-use-gis-in-their-communities</guid>
      <g-custom:tags type="string">ETCOG Regional Technology Solutions,East Texas GIS,ETCOG GIS Services</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-1486785.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-1486785.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Artificial Intelligence and the Future of Security</title>
      <link>https://www.regionaltechnologysolutions.com/artificial-intelligence-and-the-future-of-security</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            By the way, everything you’ve read on this page (up until now) was not written by a human, but by an AI chatbot. It was simply asked to define artificial intelligence and explain the related security concerns. If you wanted to, you could ask that same bot to write poetry about cats, explain quantum physics, or basically anything else you can think of. The chatbot is a basic example that barely captures AI’s capabilities.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As it evolves, AI technology will become even more advanced with abilities we never thought possible of machines. This, of course, ushers in all sorts of interesting conversations regarding human intelligence vs. machine intelligence, and what might happen if the latter surpasses the former.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Those conversations make this quote from the 1993 movie Jurassic Park eerily relevant: “Your scientists were so preoccupied with whether they could, they didn’t stop to think if they should.”
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Nonetheless, AI is an active part of our lives. And it’s not hard to imagine cybercriminals leveraging AI to carry out attacks in the near future. As an example, AI models could learn about a real person and then use bots to mimic their actions and language. This would allow criminals to create advanced phishing campaigns that target specific people at a much more effective rate than any human could.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It’s also possible AI will be used to circumvent attacks from criminal hackers. But even as those technologies become more of a reality, advancements in cyberdefenses will always lag behind advancements in cyberattacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Everything you’ve read on this page (up until now) was written by a human, but below was written by an AI chatbot. It was simply asked to define artificial intelligence and explain the related security concerns. If you wanted to, you could ask that same bot to write poetry about cats, explain quantum physics, or basically anything else you can think of. The chatbot is a basic example that barely captures AI’s capabilities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
          Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think and learn like humans. AI can be divided into several different types, including:
         &#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Rule-based systems, which follow a set of predetermined rules to reach a conclusion
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Expert systems, which use a knowledge base to make decisions
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Neural networks, which are modeled after the human brain and can learn from data
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Natural language processing, which enables machines to understand and interpret human language
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
          AI technology has been developed in various areas such as image recognition, self-driving cars, personal assistants, and so on. There are several security concerns regarding AI technology. Here are a couple of examples:
         &#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Data poisoning:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             In some cases, attackers may try to inject malicious data into the training dataset to “poison” the model and cause it to make incorrect decisions.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Physical safety:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Some AI applications, such as self-driving cars or industrial robots, may pose physical safety risks if they malfunction or are compromised by an attacker
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/pexels-photo-6153738-ee5533ba.jpeg" length="90023" type="image/jpeg" />
      <pubDate>Fri, 14 Jul 2023 19:12:48 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/artificial-intelligence-and-the-future-of-security</guid>
      <g-custom:tags type="string">Artificial Intelligence,AI</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-6153738.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/pexels-photo-6153738-ee5533ba.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>RTS Team Explores Cyber Defense at TAC Technology Conference</title>
      <link>https://www.regionaltechnologysolutions.com/rts-team-explores-cyber-defense-at-tac-technology-conference</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In the dynamic landscape of technology and cybersecurity, county, city, and regional officials and staff face numerous challenges in delivering efficient and secure services to their communities. To bridge the gap between technology, cybersecurity, and county service, the Regional Technology Solutions (RTS) Team embarked on an empowering journey by attending the Texas Association of Counties (TAC) Technology Conference. With a robust and member-shaped agenda, this conference aimed to equip individuals with critical information and strategies regardless of their technical comfort levels. The body content of your post goes here.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           "At the Texas Association of Counties Technology Conference, I had the privilege of representing ETCOG, and it was truly an enriching experience. Engaging with seasoned professionals in the technology industry through insightful presentations provided me with valuable knowledge," said IT Systems Administrator Dylan Savage. "Moreover, networking with fellow county representatives across Texas shed light on the distinctive technological challenges they encounter. This exposure enables us to shape innovative solutions for the counties we represent, fostering progress and growth."
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The TAC Technology Conference offered an array of transformative sessions, empowering county and city staff with critical information and strategies.  Participants delved into the intricacies of legally required website postings, gaining insights on ensuring compliance and accessibility for county and city services. They explored innovative approaches to managing data storage and backups, safeguarding valuable county information from loss or unauthorized access. Sessions on records management provided techniques for streamlining efficiency and accessibility, while addressing the challenges of maintaining transparency in county operations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Budgeting for technology projects was a key topic, enabling attendees to maximize the value and impact of county investments in technology and cybersecurity. Finally, sessions on developing technology policies provided guidance on creating a secure and innovative environment while adhering to best practices and legal requirements.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           "During our interactions with county IT and non-IT staff, we acquired invaluable knowledge that will greatly enhance our support for ETCOG and Workforce," said IT Network Administrator Brian Brown. "As representatives of ETCOG, understanding the challenges faced by IT officials in Texas provides a profound perspective on the significance of our work. Witnessing the endeavors of other COGs and the counties they serve, I feel immense pride in the accomplishments of ETCOG and the extensive assistance we provide to meet the needs of our local counties."
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The RTS Team's participation in the TAC Technology Conference provided them with knowledge, tools, and strategies to bridge the gap between technology and cybersecurity. By actively engaging in various sessions, they gained insights into crucial topics such as website compliance, data management, cybersecurity incident response, and technology policy development. Equipped with this newfound expertise, the RTS Team is poised to drive innovation, enhance county services, and safeguard critical information, ultimately bridging the gap between technology, cybersecurity, and city and county service for the benefit of the East Texas community.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            To learn more about how RTS can help your organization safeguard against cyber attacks and promote safe practices, visit →
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/it-services"&gt;&#xD;
      
           www.regionaltechnologysolutions.com/it-services
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/347442666_288105533645896_1952317267675953913_n.jpg" length="258170" type="image/jpeg" />
      <pubDate>Tue, 30 May 2023 14:50:31 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/rts-team-explores-cyber-defense-at-tac-technology-conference</guid>
      <g-custom:tags type="string">ETCOG RTS,Texas Association of Counties,Conference</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/347442666_288105533645896_1952317267675953913_n.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/347442666_288105533645896_1952317267675953913_n.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Identity Management Day Celebrated on April 11</title>
      <link>https://www.regionaltechnologysolutions.com/identity-management-day-celebrated-on-april-11</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Launched in 2021, the mission of Identity Management Day is to educate business leaders and IT decision makers on the importance of identity management and key components including governance, identity-centric security best practices, processes, and technology, with a special focus on the dangers of not properly securing identities and access credentials. In addition, the National Cybersecurity Alliance will provide guidance for consumers, to ensure that their online identities are protected through security awareness, best practices and readily-available technologies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Research by the IDSA reveals that 79% of organizations have experienced an identity-related security breach in the last two years, and 99% believe their identity-related breaches were preventable. According to the 2020 Verizon Data Breach Investigations Report, as many as 81% of hacking-related breaches leverage weak, stolen, or otherwise compromised passwords.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As part of Identity Management Day, the National Cybersecurity Alliance and the IDSA, will provide guidance for stakeholders at all levels, to ensure that identities of employees, machines, applications, and partners are protected through security awareness, best practices and readily-available technologies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Learn more about Identity Management Day at →
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.idsalliance.org/event/identity-management-day-2023"&gt;&#xD;
      
           www.idsalliance.org/event/identity-management-day-2023
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg" length="265831" type="image/jpeg" />
      <pubDate>Tue, 04 Apr 2023 18:20:05 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/identity-management-day-celebrated-on-april-11</guid>
      <g-custom:tags type="string">cyber security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>New Code Enforcement Mapping Module</title>
      <link>https://www.regionaltechnologysolutions.com/new-code-enforcement-mapping-module</link>
      <description>ETCOG announces a new project partnered with the City of Wills Point to build a code enforcement module for their Geographic Information Systems (GIS) platform. Wills Point has been participating in ETCOG's GIS program for many years, which allows them to contract with ETCOG for low-cost GIS services and platform administration. The new code enforcement module will be used by Wills Point internally by enforcement officers, building officials, and zoning administrators to collect and monitor violations and related inspection information.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a href="https://willspointtx.org/" target="_blank"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/MicrosoftTeams-image.png" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Simplifying violation tracking and workflow
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.etcog.org" target="_blank"&gt;&#xD;
      
           ETCOG
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            announces a new project partnered with the City of Wills Point to build a code enforcement module for their Geographic Information Systems (GIS) platform. Wills Point has been participating in ETCOG's GIS program for many years, which allows them to contract with ETCOG for low-cost GIS services and platform administration. The new code enforcement module will be used by Wills Point internally by enforcement officers, building officials, and zoning administrators to collect and monitor violations and related inspection information.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           "The module allows staff to put a point on a map at the location of a code violation," said ETCOG's GIS Manager, Michelle Cahal. "It follows the work process stages of that violation, noting when the violation has been found, when the department sends a letter out, if a ticket has been issued, whether the issue has been abated, and when the process is complete. It adds the information on a dashboard, and the city can edit the view and sort the violations in various ways to measure responsiveness."
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Pam Pearson, the City Administrator for Wills Point, shared with Michelle, "I added a violation to the map and was so excited when I accessed the spreadsheet, and it automatically added it! Thank you again for all the time you have put into this project. I think it will be well received by many communities in ETCOG's area."
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            For information on ETCOG's GIS program and other technical services, contact
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:michelle.cahal@etcog.org" target="_blank"&gt;&#xD;
      
           Michelle Cahal
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            at 903-218-6434.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/CarthageUtility1-505ba443.jpg" length="2888170" type="image/png" />
      <pubDate>Tue, 01 Nov 2022 15:42:41 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/new-code-enforcement-mapping-module</guid>
      <g-custom:tags type="string">ETCOG RTS,regional technology solutions,east texas council of governments,etcog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/CarthageUtility1-505ba443.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/CarthageUtility1-505ba443.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Multifactor authentication: Your second line of defense against online hackers</title>
      <link>https://www.regionaltechnologysolutions.com/multifactor-authentication-your-second-line-of-defense-against-online-hackers</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           So what is MFA?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            It is an additional layer of security that protects your accounts with more than just a single password. When logging in from a new device or location, or following a password reset, users will be asked for two things: a password and a security code, often sent to the account owner's cellphone or landline. MFA acts a second line of defense.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           So why use MFA?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            In a word, security. Microsoft reports that there are over 300 million fraudulent sign-in attempts to its cloud services every day. In addition, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cisa.gov/blog/2022/05/05/walk-way-enable-mfa" target="_blank"&gt;&#xD;
      
           hackers don't take vacations
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , the federal Cybersecurity &amp;amp; Infrastructure Security Agency (CISA) says. Their tactics are constantly evolving, and one-third of Americans were victims of cybercrime last year, CISA says.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Does MFA really work?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            Microsoft says that implementing MFA can block 99.9% of attacks on your accounts. Hackers are getting better at phishing and harvesting passwords to gain 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cisa.gov/news/2022/06/06/CISA-Launches-Morethanapassword" target="_blank"&gt;&#xD;
      
           unauthorized access
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . They take advantage of reused passwords stolen in other breaches, but even so, enforcing MFA is an effective barrier that greatly reduces the likelihood of a break-in. Cybercriminals often 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.zdnet.com/article/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it/" target="_blank"&gt;&#xD;
      
           move on to new targets
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            when they encounter MFA security.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Remember, hackers are like burglars. They are looking for an easy way in. Don't give it to them. Put an extra lock on the door with MFA. Email services provided by TAC CIRA already include MFA. Reach out to TAC CIRA at 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:support@county.org" target="_blank"&gt;&#xD;
      
           support@county.org
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            or by phone at (800) 456-5974 to implement MFA today.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/photo-1517430816045-df4b7de11d1d-591c4f05.jpg" length="2057768" type="image/png" />
      <pubDate>Wed, 12 Oct 2022 17:50:27 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/multifactor-authentication-your-second-line-of-defense-against-online-hackers</guid>
      <g-custom:tags type="string">cybersecurity</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1517430816045-df4b7de11d1d.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/photo-1517430816045-df4b7de11d1d-591c4f05.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>What is the Affordable Connectivity Program?</title>
      <link>https://www.regionaltechnologysolutions.com/what-is-the-affordable-connectivity-program</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Affordable Connectivity Program (ACP) is a 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.fcc.gov/ACP" target="_blank"&gt;&#xD;
      
           Federal Communications Commission (FCC) program
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            that replaces the Emergency Broadband Benefit Program (EBB Program) to help low-income households pay for internet service and connected devices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If your household is 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://acpbenefit.org/do-i-qualify/" target="_blank"&gt;&#xD;
      
           eligible
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , you can receive:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Up to a $30/month discount on your internet service
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Up to a $75/month discount if your household is on qualifying Tribal lands
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A one-time discount of up to $100 for a laptop, tablet, or desktop computer (with a co-payment of more than $10 but less than $50)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Only one monthly service discount and one device discount is allowed per household. To receive the connected device discount, consumers need to enroll in the ACP with a 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.fcc.gov/emergency-broadband-benefit-providers" target="_blank"&gt;&#xD;
      
           participating provider that offers connected devices
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (Note: not all internet company offer device discounts.) The internet company will provide the discount to the consumer.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/pexels-photo-5999068-a3099301.jpeg" length="2976432" type="image/png" />
      <pubDate>Fri, 11 Feb 2022 18:29:14 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/what-is-the-affordable-connectivity-program</guid>
      <g-custom:tags type="string">broadband,internet safety</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5999068.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/pexels-photo-5999068-a3099301.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>ETCOG Assists Jurisdictions with Technology Needs</title>
      <link>https://www.regionaltechnologysolutions.com/etcog-assists-jurisdictions-with-technology-needs</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Did you know ETCOG offers quality IT and GIS services for East Texas jurisdictions and agencies through our Regional Technology Solutions program? Our team has recently partnered with the City of Carthage to build an app that assists with data collection and improvement for their water network and city zoning/planning. Here is a Carthage employee using the app to map a location of utility infrastructure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We're also proud to recently partner with Van Zandt County for new mapping services to capture their redistricting data. Sabine Fire &amp;amp; Rescue also tapped into RTS services recently for upgrading their technology software to assist with communication efforts between stations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ETCOG began offering technology solutions to its members over ten years ago by creating customized GIS mapping services and 9-1-1 address mapping. We have since expanded to serve our member's IT, GIS, and other technology needs at an affordable cost.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/CarthageUtility1-505ba443.jpg" length="2888170" type="image/png" />
      <pubDate>Fri, 04 Feb 2022 20:07:37 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/etcog-assists-jurisdictions-with-technology-needs</guid>
      <g-custom:tags type="string">GIS,rts</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/CarthageUtility1.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/CarthageUtility1-505ba443.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Plan Ahead for Phase Out of 3G Cellular Networks and Service</title>
      <link>https://www.regionaltechnologysolutions.com/plan-ahead-for-phase-out-of-3g-cellular-networks-and-service</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If your mobile phone is more than a few years old, you may need to upgrade your device before your mobile provider shuts down its 3G network, to avoid losing service. For more information on your mobile providers’ plans for 3G retirement and how you can prepare, contact your provider directly.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h6&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            What is happening?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h6&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Mobile carriers are shutting down their 3G networks, which rely on older technology, to make room for more advanced network services, including 5G. As a result, many older cell phones will be unable to make or receive calls and texts, including calls to 911, or use data services. This will affect 3G mobile phones and certain older 4G mobile phones that do not support Voice over LTE (VoLTE or HD Voice).
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Learn more about other connected devices, such as medical devices and home security systems that may be impacted below.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h6&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            When is it happening?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h6&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As early as January 1, 2022, though plans and timing to phase out 3G services will vary by company and may change. Consult your mobile provider’s website for the most up-to-date information.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;a href="https://www.att.com/support/article/wireless/KM1324171/" target="_blank"&gt;&#xD;
        
            AT&amp;amp;T
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             announced that it will finish shutting down its 3G network by February 2022.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;a href="https://www.verizon.com/support/knowledge-base-218813/" target="_blank"&gt;&#xD;
        
            Verizon
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             announced that will finish shutting down its 3G network by December 31, 2022.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;a href="https://www.t-mobile.com/support/coverage/t-mobile-network-evolution" target="_blank"&gt;&#xD;
        
            T-Mobile
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             announced that it will finish shutting down Sprint's 3G CDMA network by March 31, 2022 and Sprint's 4G LTE network by June 30, 2022. It also announced it will shut down T-Mobile's 3G UMTS network by July 1, 2022, but has not yet announced a shutdown date for its 2G network.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If your mobile carrier is not listed here, you may still be affected. Many carriers, such as Cricket, Boost, Straight Talk, and several Lifeline mobile service providers, utilize AT&amp;amp;T’s, Verizon’s, and T-Mobile’s networks.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Note: These are dates for completing the shutdowns. Carriers may begin retiring parts of their networks sooner.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h6&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            What do I need to do?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h6&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Contact your mobile provider or consult your provider’s website for more information about their 3G retirement plan and whether your phone, or other connected device, may be affected. It is important to plan now so that you don’t lose connectivity, including the ability to call 911.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Some carrier websites provide lists of devices that will no longer be supported after 3G networks are shut down. You may need to upgrade to a newer device to ensure that you can stay connected, and carriers may be offering discounted or free upgrades to help consumers who need to upgrade their phones.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Some devices may only require a software update to enable VoLTE (HD Voice) or other advanced services. If you purchased your phone independent of a mobile provider, you should be able to check whether your device is 4G LTE (with VoLTE or HD Voice) enabled by checking your phone’s settings or user manual, or by searching your phone’s model number on the internet, to determine whether you need to purchase a new device or install a software update.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h6&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Does this just impact phones?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h6&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            No, other devices, such as certain medical devices, tablets, smart watches, vehicle SOS services, home security systems, and other connected products may be using 3G network services. And don't forget about devices that use cellular connectivity as a back-up when a wired internet connection goes down. If the device is not labeled, contact the monitoring company or other service provider to confirm how the device connects and whether your device may be impacted.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h6&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Why are 3G networks being phased out?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h6&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As mobile carriers seek to upgrade their networks to use the latest technologies, they periodically shut down older services, such as 3G, to free up spectrum and infrastructure to support new services, such as 5G. Similar transitions have happened before. For example, some mobile carriers shut down their 2G networks when they upgraded their networks to support 4G services. Mobile carriers have the flexibility to choose the types of technologies and services they deploy, including when they decommission older services in favor of newer services to meet consumer demands.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h6&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Need Other Help Staying Connected?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h6&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As mentioned above, your mobile service provider may be offering special deals on new devices, including some deals that might include a free cell phone.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In addition, although they do not cover the cost of new devices, other FCC programs may be able to assist eligible consumers with the cost of phone or internet services:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             The FCC’s Lifeline program may be able to assist eligible consumers in getting connected to phone and internet services. The program provides a discount on phone service for qualifying low-income consumers to ensure that all Americans have the opportunities and security that phone service brings, including being able to connect to jobs, family and emergency services. You can learn more about the Lifeline Program and find out if you may be eligible
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://www.fcc.gov/lifeline-consumers" target="_blank"&gt;&#xD;
        
            here
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             In addition, The FCC’s Emergency Broadband Benefit Program provides a temporary discount of up to $50 per month towards broadband service for eligible households during the COVID-19 pandemic. You can learn more about the Emergency Broadband Benefit Program, what it covers, and find out if you may be eligible
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://www.fcc.gov/broadbandbenefit" target="_blank"&gt;&#xD;
        
            here
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-887751.jpeg" length="146024" type="image/jpeg" />
      <pubDate>Wed, 05 Jan 2022 18:05:13 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/plan-ahead-for-phase-out-of-3g-cellular-networks-and-service</guid>
      <g-custom:tags type="string">cell networks,3G</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-887751.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-887751.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How to Use a Password Manager</title>
      <link>https://www.regionaltechnologysolutions.com/how-to-use-a-password-manager</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There is a reason why you shouldn’t use the same password on multiple sites. This is because there are lists of cracked passwords for sale on the Dark Web, and by using a technique called credential stuffing, bad guys test these previously breached passwords on multiple sites to see if they will unlock another one of your accounts.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Remembering multiple, long passwords may seem like a huge task, but why not consider a password manager?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h6&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            What is a password manager?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h6&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A password manager will take a load off your mind. It helps to create unique and secure passwords for each of your sites while keeping track of what has been used where.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Once you have saved each password to the manager, when you revisit the site, it will auto-populate the details. When it comes to passwords for banking, work access, and other key passwords, it is best to remember these and not save them to your manager.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A password manager will
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Autofill your passwords
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Suggest new passwords
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Manage passwords
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           All you have to remember is one master password (so make it a good one). To do this we suggest rather using a passphrase, so you can use a line from your favorite song or joke.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/Password+Tip.JPG" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1423666639041-f56000c27a9a.jpg" length="194905" type="image/jpeg" />
      <pubDate>Fri, 09 Jul 2021 19:32:18 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/how-to-use-a-password-manager</guid>
      <g-custom:tags type="string">passwords</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1423666639041-f56000c27a9a.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1423666639041-f56000c27a9a.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How ETCOG continued providing vital social services during the pandemic and saved 40% in communication costs</title>
      <link>https://www.regionaltechnologysolutions.com/how-etcog-continued-providing-vital-social-services-during-the-pandemic</link>
      <description>In any given year, ETCOG provides essential services to thousands of people—from job training, to childcare, to transportation, to 9-1-1 and other public safety services. But in 2020, when COVID-19 led to a tremendous spike in unemployment and other social challenges in the region, ETCOG’s services became more important than ever.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           "RingCentral saved us money. When COVID hit, it saved the day. And I can even say that RingCentral helped us save lives."
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This voluntary association of counties, cities, and school districts helps local governments provide social services for seniors, veterans, job seekers, people with disabilities, and other vulnerable residents in the area.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In any given year, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.etcog.org/" target="_blank"&gt;&#xD;
      
           ETCOG
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            provides essential services to thousands of people—from job training, to childcare, to transportation, to 9-1-1 and other public safety services. But in 2020, when COVID-19 led to a tremendous spike in unemployment and other social challenges in the region, ETCOG’s services became more important than ever.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           At the same time, however, the pandemic resulted in most of ETCOG’s employees to transition working from home. Vacating their workforce development centers, facilities to help seniors, and other locations could have disrupted the association’s ability to deliver vital services at the time the public needed them most.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           But fortunately, ETCOG didn’t have that problem—because they had RingCentral.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           An aging phone system not designed for remote work
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When the full impact of the pandemic began to be felt in March of 2020, ETCOG’s IT team knew they had to act quickly to replace their aging phone system with a modern solution that would allow their staff to work anywhere. “We were facing so many communications problems all at once,” recalls Brandon, IT Systems Administrator.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “Our phone system was really a mix of several services across our sites, and none of them made it easy to set up call forwarding or manage call queues with people in different locations,” Brandon says.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Worse, just as the IT team was trying to figure out how to transition employees to remote work, the pandemic triggered a massive spike in calls from the public—for job placement, transportation, meals for seniors, and other urgent services.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Thankfully, Brandon was able to persuade the association’s leadership to fast-track purchasing a new communications solution.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “The procurement process went very quickly, at least for a government agency,” he says. “A key reason was that RingCentral was such a clear winner on each of our key issues: flexibility, ease of use, functionality, and cost.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Continuing to serve… even from home
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With RingCentral’s cloud communications solution, Brandon’s team was able to set up all employees with the ability to make and receive work calls from anywhere, using RingCentral’s desktop and mobile apps.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “RingCentral actually exceeded our goals for remote work capabilities,” he says. “Not only were we able to empower our staff to take calls right from their computers and cell phones, we were even able to give them services they never had before—like the ability to text message from their work numbers.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Helping more people
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As Brandon points out, being able to text through RingCentral helps the team connect more quickly and reliably with the residents they’re trying to help. “Before they call, they send a text telling the person who we are.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Far more of those first calls are getting answered. In fact, sometimes our employees are able to handle the entire case through text—they don’t even need to call.” And as Brandon notes, this means ETCOG can serve more people each day.
           &#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/photo-1599413850028-3fd205fdc0fa-bac843de.jpg" length="1329210" type="image/png" />
      <pubDate>Thu, 03 Jun 2021 15:38:57 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/how-etcog-continued-providing-vital-social-services-during-the-pandemic</guid>
      <g-custom:tags type="string">regional technology solutions,etcog,ringcentral,phone systems,cost saving technology</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1599413850028-3fd205fdc0fa.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a5adfd0a/dms3rep/multi/photo-1599413850028-3fd205fdc0fa-bac843de.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How to Protect your Privacy Online</title>
      <link>https://www.regionaltechnologysolutions.com/how-to-protect-your-privacy-online</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  
         The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and 
         &#xD;
  &lt;span&gt;&#xD;
    
          handle our medical records all online. These activities require you to provide personally identifiable information (PII) such as 
         &#xD;
  &lt;/span&gt;&#xD;
  &lt;span&gt;&#xD;
    
          your name, date of birth, account numbers, passwords, and location information. #BeCyberSmart when sharing personal 
         &#xD;
  &lt;/span&gt;&#xD;
  &lt;span&gt;&#xD;
    
          information online to reduce the risk of becoming a cybercrimes victim.
         &#xD;
  &lt;/span&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Did You Know?
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;ul&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;font&gt;&#xD;
            
              45% of Americans have had their personal information compromised by a data breach in the last five years. 
             &#xD;
          &lt;/font&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;span&gt;&#xD;
            
              70% of Americans feel that their personal information is less secure than it was five years ago2
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
             , up from 49% just 
             &#xD;
          &lt;span&gt;&#xD;
            
              two years ago.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
             72% of Americans believe that most of what they’re doing while online is being tracked by advertisers, technology 
             &#xD;
          &lt;span&gt;&#xD;
            
              firms and other companies.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
             Over half of Americans (52%) say they have decided not to use a product or service because they were worried 
             &#xD;
          &lt;span&gt;&#xD;
            
              about how much personal information was being collected about them.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
      &lt;/ul&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Simple Tips
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;ul&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Double your login protection.
             &#xD;
          &lt;/b&gt;&#xD;
          
             Enable multi-factor authentication (MFA) to ensure that the only person who has 
             &#xD;
          &lt;span&gt;&#xD;
            
              access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              secure token—a small physical device that can hook onto your key ring. Read the Multi-Factor Authentication 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              (MFA) How-to-Guide for more information.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Shake up your password protocol.
             &#xD;
          &lt;/b&gt;&#xD;
          
             Use the longest password or passphrase permissible. Get creative and customize 
             &#xD;
          &lt;span&gt;&#xD;
            
              your standard password for different sites, which can prevent cyber criminals from gaining access to these accounts 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              and protect you in the event of a breach. Use password managers to generate and remember different, complex 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              passwords for each of your accounts. Read the Creating a Password Tip Sheet for more information.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Keep up to date.
             &#xD;
          &lt;/b&gt;&#xD;
          
             Keep your software updated to the latest version available. Maintain your security settings to 
             &#xD;
          &lt;span&gt;&#xD;
            
              keeping your information safe by turning on automatic updates so you don’t have to think about it, and set your 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              security software to run regular scans.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              If You Connect IT, Protect IT.
             &#xD;
          &lt;/b&gt;&#xD;
          
             Whether it’s your computer, smartphone, game device, or other network devices, the 
             &#xD;
          &lt;span&gt;&#xD;
            
              best defense against viruses and malware is to update to the latest security software, web browser, and operating 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software. Read the 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              Phishing Tip Sheet for more information. 
             &#xD;
          &lt;/span&gt;&#xD;
          
              
            &#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Play hard to get with strangers.
             &#xD;
          &lt;/b&gt;&#xD;
          
             Cyber criminals use phishing tactics, hoping to fool their victims. If you’re unsure 
             &#xD;
          &lt;span&gt;&#xD;
            
              who an email is from—even if the details appear accurate— or if the email looks “phishy,” do not respond and do 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              not click on any links or attachments found in that email. When available use the “junk” or “block” option to no 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              longer receive messages from a particular sender.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Never click and tell.
             &#xD;
          &lt;/b&gt;&#xD;
          
             Limit what information you post on social media—from personal addresses to where you like 
             &#xD;
          &lt;span&gt;&#xD;
            
              to grab coffee. What many people don’t realize is that these seemingly random details are all that criminals need to 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              Security numbers, account numbers, and passwords private, as well as specific information about yourself, such as 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              your full name, address, birthday, and even vacation plans. Disable location services that allow anyone to see where 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              you are—and where you aren’t—at any given time. Read the Social Media Cybersecurity Tip Sheet for more 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              information. 
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Keep tabs on your apps.
             &#xD;
          &lt;/b&gt;&#xD;
          
             Most connected appliances, toys, and devices are supported by a mobile application. Your 
             &#xD;
          &lt;span&gt;&#xD;
            
              mobile device could be filled with suspicious apps running in the background or using default permissions you never 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              realized you approved—gathering your personal information without your knowledge while also putting your 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              identity and privacy at risk. Check your app permissions and use the “rule of least privilege” to delete what you 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              don’t need or no longer use. Learn to just say “no” to privilege requests that don’t make sense. Only download apps 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              from trusted vendors and sources. 
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Stay protected while connected.
             &#xD;
          &lt;/b&gt;&#xD;
          
             Before you connect to any public wireless hotspot—such as at an airport, hotel, or 
             &#xD;
          &lt;span&gt;&#xD;
            
              café—be sure to confirm the name of the network and exact login procedures with appropriate staff to ensure that 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              the network is legitimate. If you do use an unsecured public access point, practice good Internet hygiene by 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              avoiding sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              safer alternative to free Wi-Fi. Only use sites that begin with “https://” when online shopping or banking.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
      &lt;/ul&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/a5adfd0a/dms3rep/multi/woman-working-laptop-computer-de0665f9.jpg" length="513091" type="image/png" />
      <pubDate>Mon, 22 Feb 2021 16:58:06 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/how-to-protect-your-privacy-online</guid>
      <g-custom:tags type="string">awareness,cybersecurity</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/dmip/dms3rep/multi/woman-working-laptop-computer.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/a5adfd0a/dms3rep/multi/woman-working-laptop-computer-de0665f9.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How to Avoid Phishing Attacks</title>
      <link>https://www.regionaltechnologysolutions.com/how-to-avoid-phishing-attacks</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  
         Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal 
         &#xD;
  &lt;span&gt;&#xD;
    
          and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their 
         &#xD;
  &lt;/span&gt;&#xD;
  &lt;span&gt;&#xD;
    
          computers, creating vulnerability to attacks. Phishing emails may appear to come from a real financial institution, ecommerce site, government agency, or any other service, business, or individual. The email may also request personal 
         &#xD;
  &lt;/span&gt;&#xD;
  &lt;span&gt;&#xD;
    
          information such as account numbers, passwords, or Social Security numbers. When users respond with the information or 
         &#xD;
  &lt;/span&gt;&#xD;
  &lt;span&gt;&#xD;
    
          click on a link, attackers use it to access users’ accounts.
         &#xD;
  &lt;/span&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             HOW CRIMINALS LURE YOU IN
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
           The following messages from the Federal Trade Commission’s OnGuardOnline are examples of what attackers may email or 
           &#xD;
      &lt;span&gt;&#xD;
        
            text when phishing for sensitive information:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;ul&gt;&#xD;
        &lt;li&gt;&#xD;
          
             “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please 
             &#xD;
          &lt;span&gt;&#xD;
            
              click the link below, and confirm your identity.”
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
             “During our regular verification of accounts, we couldn’t verify your information. Please click here to update and 
             &#xD;
          &lt;span&gt;&#xD;
            
              verify your information.”
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
             “Our records indicate that your account was overcharged. You must call us within 7 days to receive your refund.”
            &#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
             To see examples of actual phishing emails, and steps to take if you believe you received a phishing email, please 
             &#xD;
          &lt;span&gt;&#xD;
            
              visit “
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
      &lt;/ul&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             SIMPLE TIPS:
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;ul&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;font&gt;&#xD;
            &lt;b&gt;&#xD;
              
               Play hard to get with strangers.
              &#xD;
            &lt;/b&gt;&#xD;
          &lt;/font&gt;&#xD;
          
             Links in email and online posts are often the way cybercriminals compromise your 
             &#xD;
          &lt;span&gt;&#xD;
            
              computer. If you’re unsure who an email is from—even if the details appear accurate—do not respond, and do not 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              click on any links or attachments found in that email. Be cautious of generic greetings such as “Hello Bank 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              Customer,” as these are often signs of phishing attempts. If you are concerned about the legitimacy of an email, call 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              the company directly.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            &lt;font&gt;&#xD;
              
               Think before you act.
              &#xD;
            &lt;/font&gt;&#xD;
            &lt;font&gt;&#xD;
            &lt;/font&gt;&#xD;
          &lt;/b&gt;&#xD;
          
             Be wary of communications that implore you to act immediately. Many phishing emails 
             &#xD;
          &lt;span&gt;&#xD;
            
              attempt to create a sense of urgency, causing the recipient to fear their account or information is in jeopardy. If you 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              receive a suspicious email that appears to be from someone you know, reach out to that person directly on a 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              separate secure platform. If the email comes from an organization but still looks “phishy,” reach out to them via 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              customer service to verify the communication.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;font&gt;&#xD;
            &lt;b&gt;&#xD;
              
               Protect your personal information.
              &#xD;
            &lt;/b&gt;&#xD;
          &lt;/font&gt;&#xD;
          
             If people contacting you have key details from your life—your job title, multiple 
             &#xD;
          &lt;span&gt;&#xD;
            
              email addresses, full name, and more that you may have published online somewhere—they can attempt a direct  
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              spear-phishing attack on you. Cyber criminals can also use social engineering with these details to try to manipulate you into skipping 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              normal security protocols.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;font&gt;&#xD;
            &lt;b&gt;&#xD;
              
               Be wary of hyperlinks.
              &#xD;
            &lt;/b&gt;&#xD;
          &lt;/font&gt;&#xD;
          
             Avoid clicking on hyperlinks in emails and hover over links to verify authenticity. Also ensure 
             &#xD;
          &lt;span&gt;&#xD;
            
              that URLs begin with “https.” The “s” indicates encryption is enabled to protect users’ information.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;font&gt;&#xD;
            &lt;b&gt;&#xD;
              
               Double your login protection.
              &#xD;
            &lt;/b&gt;&#xD;
          &lt;/font&gt;&#xD;
          
             Enable multi-factor authentication (MFA) to ensure that the only person who has 
             &#xD;
          &lt;span&gt;&#xD;
            
              access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. 
             &#xD;
          &lt;/span&gt;&#xD;
          
             If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a 
             &#xD;
          &lt;span&gt;&#xD;
            
              secure token—a small physical device that can hook onto your key ring. Read the Multi-Factor Authentication 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              (MFA) How-to-Guide for more information.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;font&gt;&#xD;
            &lt;b&gt;&#xD;
              
               Shake up your password protocol.
              &#xD;
            &lt;/b&gt;&#xD;
          &lt;/font&gt;&#xD;
          
             According to NIST guidance, you should consider using the longest password or 
             &#xD;
          &lt;span&gt;&#xD;
            
              passphrase permissible. Get creative and customize your standard password for different sites, which can prevent 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              cyber criminals from gaining access to these accounts and protect you in the event of a breach. Use password 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              managers to generate and remember different, complex passwords for each of your accounts. Read the Creating a 
             &#xD;
          &lt;/span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              Password Tip Sheet for more information. 
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;font&gt;&#xD;
            &lt;font&gt;&#xD;
              &lt;b&gt;&#xD;
                
                Install and update anti-virus software.
               &#xD;
              &lt;/b&gt;&#xD;
            &lt;/font&gt;&#xD;
          &lt;/font&gt;&#xD;
          
             Make sure all of your computers, Internet of Things devices, phones, and 
             &#xD;
          &lt;span&gt;&#xD;
            
              tablets are equipped with regularly updated antivirus software, firewalls, email filters, and anti-spyware.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
      &lt;/ul&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
           For more information on ways you can safeguard your information, visit the
           &#xD;
      &lt;a href="https://www.nsa.gov/What-We-Do/Cybersecurity/" target="_blank"&gt;&#xD;
        
            National Security Agency’s Cybersecurity 
            &#xD;
        &lt;span&gt;&#xD;
          
             Information page.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/a&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1584438784894-089d6a62b8fa.jpg" length="185901" type="image/jpeg" />
      <pubDate>Mon, 01 Feb 2021 20:01:45 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/how-to-avoid-phishing-attacks</guid>
      <g-custom:tags type="string">phishing,awareness</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1584438784894-089d6a62b8fa.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1584438784894-089d6a62b8fa.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Internet Safety Overview</title>
      <link>https://www.regionaltechnologysolutions.com/internet-safety-overview</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  
         Now more than ever, consumers spend increasing amounts of time on the Internet. With every social media
         &#xD;
  &lt;div&gt;&#xD;
    
          account you sign up for, every picture you post, and status you update, you are sharing information about
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          yourself with the world. How can you be proactive and “Do Your Part. #BeCyberSmart”? Take these simple steps 
          &#xD;
    &lt;span&gt;&#xD;
      
           to connect with confidence and safely navigate the social media world.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Why Should We Care?
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Cars, appliances, fitness trackers and other wearables, lighting, healthcare, home security, and more all contain 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             sensing devices that can talk to another machine and trigger other actions. Examples include devices that direct 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             your car to an open spot in a parking lot; mechanisms that control energy use in your home; and tools that track 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             eating, sleeping, and exercise habits.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             New Internet-connected devices provide a level of convenience in our lives, but they require that we share more 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             information than ever.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             The security of this information, and the security of these devices, is not always guaranteed. Once your device 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             connects to the Internet, you and your device could potentially be vulnerable to all sorts of risks.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             With more connected “things” entering our homes and our workplaces each day, it is important that everyone 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             knows how to secure their digital lives.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Simple Tips
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Shake up your password protocol.
            &#xD;
        &lt;/b&gt;&#xD;
        
            Change your device’s factory security settings from the default password. This is 
            &#xD;
        &lt;span&gt;&#xD;
          
             one of the most important steps to take in the protection of IoT devices. According to NIST guidance, you should 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             consider using the longest password or passphrase permissible. Get creative and create a unique password for your 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             IoT devices. Read the Creating a Password Tip Sheet for more information.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Keep tabs on your apps.
            &#xD;
        &lt;/b&gt;&#xD;
        
            Many connected appliances, toys, and devices are supported by a mobile application. Your 
            &#xD;
        &lt;span&gt;&#xD;
          
             mobile device could be filled with apps running in the background or using default permissions you never realized 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             you approved— gathering your personal information without your knowledge while also putting your identity and 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             privacy at risk. Check your app permissions and learn to just say “no” to privilege requests that don’t make sense. 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Only download apps from trusted vendors and sources.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Secure your network.
            &#xD;
        &lt;/b&gt;&#xD;
        
            Properly secure the wireless network you use to connect Internet-enabled devices. Consider 
            &#xD;
        &lt;span&gt;&#xD;
          
             placing these devices on a separate and dedicated network. For more information on how you can secure your 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             network, view the
             &#xD;
          &lt;a href="https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csi-best-practices-for-keeping-home-network-secure.pdf?v=1" target="_blank"&gt;&#xD;
            
              National Security Agency’s Cybersecurity Information
             &#xD;
          &lt;/a&gt;&#xD;
          
             page.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;b&gt;&#xD;
          
             If You Connect IT, Protect IT.
            &#xD;
        &lt;/b&gt;&#xD;
        
            Whether it’s your computer, smartphone, game device, or other network devices, the 
            &#xD;
        &lt;span&gt;&#xD;
          
             best defense is to stay on top of things by updating to the latest security software, web browser, and operating 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             systems. If you have the option to enable automatic updates to defend against the latest risks, turn it on.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1486312338219-ce68d2c6f44d.jpg" length="183242" type="image/jpeg" />
      <pubDate>Tue, 19 Jan 2021 17:34:52 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/internet-safety-overview</guid>
      <g-custom:tags type="string">cyber security,internet safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1486312338219-ce68d2c6f44d.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1486312338219-ce68d2c6f44d.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Tips to be Cyber Secure at Work</title>
      <link>https://www.regionaltechnologysolutions.com/5-tips-to-be-cyber-secure-at-work</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  
         Businesses face significant financial loss when a cyber attack occurs. In 2019, the U.S. business sector had a 17% increase in 
         &#xD;
  &lt;span&gt;&#xD;
    
          data breaches: 1,473 breaches. Cybercriminals often rely on human error—employees failing to install software patches or 
         &#xD;
  &lt;/span&gt;&#xD;
  &lt;span&gt;&#xD;
    
          clicking on malicious links—to gain access to systems. From the top leadership to the newest employee, cybersecurity 
         &#xD;
  &lt;/span&gt;&#xD;
  &lt;span&gt;&#xD;
    
          requires the vigilance of everyone to keep data, customers, and capital safe and secure.
          &#xD;
    &lt;b&gt;&#xD;
      
           #BeCyberSmart
          &#xD;
    &lt;/b&gt;&#xD;
    
          to connect with 
         &#xD;
  &lt;/span&gt;&#xD;
  &lt;span&gt;&#xD;
    
          confidence and support a culture of cybersecurity at your organization.
         &#xD;
  &lt;/span&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Simple Tips:
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           1. Treat business information as personal information.
          &#xD;
    &lt;/b&gt;&#xD;
    
          Business information typically includes a mix of personal and 
          &#xD;
    &lt;span&gt;&#xD;
      
           proprietary data. While you may think of trade secrets and company credit accounts, it also includes employee 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           personally identifiable information (PII) through tax forms and payroll accounts. Do not share PII with unknown 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           parties or over unsecured networks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           2. Don’t make passwords easy to guess.
          &#xD;
    &lt;/b&gt;&#xD;
    
          As “smart” or data-driven technology evolves, it is important to remember 
          &#xD;
    &lt;span&gt;&#xD;
      
           that security measures only work if used correctly by employees. Smart technology runs on data, meaning devices 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           such as smartphones, laptop computers, wireless printers, and other devices are constantly exchanging data to 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           complete tasks. Take proper security precautions and ensure correct configuration to wireless devices in order to 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           prevent data breaches. For more information about smart technology, see the
           &#xD;
      &lt;a href="https://www.cisa.gov/publication/national-cybersecurity-awareness-month-publications" target="_blank"&gt;&#xD;
        
            Internet of Things Tip Card.
           &#xD;
      &lt;/a&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           3. Be up to date.
          &#xD;
    &lt;/b&gt;&#xD;
    
          Keep your software updated to the latest version available. Maintain your security settings to 
          &#xD;
    &lt;span&gt;&#xD;
      
           keeping your information safe by turning on automatic updates, so you don’t have to think about it, and set your 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           security software to run regular scans.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           4. Social media is part of the fraud toolset.
          &#xD;
    &lt;/b&gt;&#xD;
    
          By searching Google and scanning your organization’s social media sites, 
          &#xD;
    &lt;span&gt;&#xD;
      
           cybercriminals can gather information about your partners and vendors, as well as human resources and financial 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           departments. Employees should avoid oversharing on social media and should not conduct official business, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           exchange payment, or share PII on social media platforms. Read the Social Media
           &#xD;
      &lt;a href="https://www.cisa.gov/publication/national-cybersecurity-awareness-month-publications" target="_blank"&gt;&#xD;
        
            Cybersecurity Tip Sheet
           &#xD;
      &lt;/a&gt;&#xD;
      
           for more 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           information.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           5. It only takes one time.
          &#xD;
    &lt;/b&gt;&#xD;
    
          Data breaches do not typically happen when a cybercriminal has hacked into an
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing 
          &#xD;
    &lt;span&gt;&#xD;
      
           attempt, or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links, and delete 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           suspicious messages immediately. For more information about email and phishing scams, see the
           &#xD;
      &lt;a href="https://www.cisa.gov/publication/national-cybersecurity-awareness-month-publications" target="_blank"&gt;&#xD;
        
            Phishing Tip 
           &#xD;
      &lt;/a&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;a href="https://www.cisa.gov/publication/national-cybersecurity-awareness-month-publications" target="_blank"&gt;&#xD;
        
            Sheet.
           &#xD;
      &lt;/a&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1555949963-ff9fe0c870eb.jpg" length="77468" type="image/jpeg" />
      <pubDate>Wed, 06 Jan 2021 14:49:02 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/5-tips-to-be-cyber-secure-at-work</guid>
      <g-custom:tags type="string">cyber security</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1555949963-ff9fe0c870eb.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1555949963-ff9fe0c870eb.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyber Hygiene Tips for Remote Workers</title>
      <link>https://www.regionaltechnologysolutions.com/cyber-hygiene-tips-for-remote-workers</link>
      <description>Cybersecurity is always a priority. When teleworking or working remotely, additional cybersecurity strategies must be considered.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a5adfd0a/dms3rep/multi/photo-1584703619328-39ea3128e0b5-bf5cb42d.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         Cybersecurity is always a priority.  When teleworking or working remotely, additional cybersecurity strategies must be considered.  
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
           Environment
          
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Teleworking spaces can include your home, or a public or shared space. Please check with your employer to ensure you are working from an approved location. Be sure to follow the same processes and procedures as if you were in your typical physical work location. These include:
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Keep your work-space clean. Do not leave documents unattended or in view of unauthorized people. This includes family members, roommates, friends, other coffee shop or library patrons, etc.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Keep devices locked when unattended. Set your computers and phones to lock when not in use for more than a few minutes.  If your locked screen previews new messages or emails, contact your organization's IT help desk to learn how you can hide them. 
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            When participating in phone conversations or digital meetings, make sure confidential conversations cannot be heard.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Keep your work and personal business separate.  Become familiar with your organization's acceptable use policy to ensure you are not violating laws or policies by conducting personal business on a work device. 
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Do not download sensitive or confidential work documents to your home computer.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            At the end of the workday, log off all work devices and remote work platforms.  
           
                      &#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
            Internet Access
           
                      &#xD;
      &lt;/b&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Contact your organization's IT department to determine how to safely connect to your work networks.  Generally, best practice is to access the Internet only through a trusted network such as your password-protected home Wi-Fi or traditional network cable.  Because of the security risks, if possible, avoid connecting to public Wi-Fi in shared locations.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Consider using work-issued mobile hotspots, smart phone tethering, or private networks that are password-protected.  All other connection points should be treated as insecure.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            To avoid automatic WiFi connections, turn off automatic WiFi connections until you're ready to connect to a secure connection.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Always connect through your organization's Virtual Private Network (VPN) while on unsecured or public Wi-Fi access points.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            In a security event, disconnect from WiFi immediately and contact your IT help desk.
           
                      &#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Network and system administrators may prepare to manage the increased load caused by additional teleworkers by implementing strategies to handle additional traffic, such as split tunneling.   Split tunneling allows the administrators to allow high bandwidth traffic that does not need to be secured to go directly to the internet, rather than to the organization first.  Even if your organization permits split tunneling, you should follow these basic hygiene items:
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Only go to websites that you know are trusted.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Limit high bandwidth activities such as streaming non work-related videos or music.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Don't click on suspicious emails, links, or attachments.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Forward any suspicious emails you receive to your appropriate IT contact.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Only use your work devices for work-related tasks.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Do not share your device or password with anyone. 
           
                      &#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
            Multi-Factor Authentication
           
                      &#xD;
      &lt;/b&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
                      
           Multi Factor Authentication (MFA) requires users to authenticate their username and password with an additional credential such as a code sent via text message or automated phone call, a push notification from a smartphone app, or other method.  MFA helps verify the identity of a person, and as a result helps keep your organization's data safe.  Contact your IT help desk to see if a MFA solution is available for you. 
          
                    &#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          If you have issues, make sure to call your organization's
          
                    &#xD;
    &lt;a href="https://www.regionaltechnologysolutions.com/contact" target="_blank"&gt;&#xD;
      
                      
           IT
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          help desk for assistance.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;a href="https://dir.texas.gov/View-About-DIR/Information-Security/Pages/Content.aspx?id=157" target="_blank"&gt;&#xD;
        
                        
            Courtesy of the Department of Information Resources
           
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1517430816045-df4b7de11d1d.jpg" length="165571" type="image/jpeg" />
      <pubDate>Mon, 06 Apr 2020 18:17:35 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/cyber-hygiene-tips-for-remote-workers</guid>
      <g-custom:tags type="string">cyber,hygiene,remote,workers,telecommuting,regional,technology,solutions,work,from,home covid19,</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1517430816045-df4b7de11d1d.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1517430816045-df4b7de11d1d.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Tips to Protect Yourself from Identity Theft</title>
      <link>https://www.regionaltechnologysolutions.com/tips-to-protect-identity-theft</link>
      <description>ETCOG recently teamed up with TBG Solutions of Tyler to offer the new Cyber Security Awareness training now required through HB 3834. Mark Seguin facilitated the training for ETCOG board/committee members and staff on January 30th. Mark educated attendees on phishing, data protection, social media safety, and other cybersecurity-related topics.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
         The average person will not discover that their identity has been stolen until 14 months after the crime. - TBG Solutions 
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
         ETCOG recently teamed up with TBG Solutions of Tyler to offer the new Cyber Security Awareness training now required through HB 3834. Mark Seguin facilitated the training for ETCOG board/committee members and staff on January 30th. Mark educated attendees on phishing, data protection, social media safety, and other cybersecurity-related topics. Here are some noteworthy tips we wanted to share with our partners on common identity theft tactics:  
         &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Phishing/Vishing/Smishing
          &#xD;
    &lt;/b&gt;&#xD;
    
           
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Phishing is data collection via email. Vishing is done over the phone. Smishing is through text message. If you ever receive a message or phone call asking for information or that just seems fishy do NOT click on links or give information out. Verify with the sender or call back the number the visher is claiming to be calling from. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Data Protection 
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Physical documents that contain credit card numbers, social security numbers, emails, addresses, dates of birth, or other sensitive data need to be shredded. To prevent mail theft, use a PO Box to send and receive mail. Keep all sensitive data stored in a locked safe, ideally. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Plausible Deniability 
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          If you do not have a social media account, you leave the door open for identity thieves to create one for you and smear your reputation. In order to defend against these scandals, you need to have a social media account with at least a picture, your name and email address. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Debit and Credit Cards 
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Credit cards are safer than debit cards, since you don’t have to use your PIN number in the transaction. You should also check your credit and debit statements to make sure you recognize all  charges. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           ID Theft Protection
          &#xD;
    &lt;/b&gt;&#xD;
    
           
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          The question is no longer whether or not you need ID Theft protection; it is which ID Theft protection plan you have. Your plan should meet several criteria: black market chatroom monitoring, full restoration service (done for you, not just advice telling you how to do it), coverage for the entire family (child ID Theft is a major issue), as well as credit, document, and data monitoring. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Sound interesting? Stay tuned for future cyber security training opportunities at ETCOG! 
         &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1544717305-f9c88f2897bc.jpg" length="92677" type="image/jpeg" />
      <pubDate>Fri, 07 Feb 2020 20:51:02 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/tips-to-protect-identity-theft</guid>
      <g-custom:tags type="string">etcog,rts,identity theft,tips,security,cybersecurity,cyber security,social media,passwords,vishing,phishing</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1544717305-f9c88f2897bc.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1544717305-f9c88f2897bc.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Tax Identity Theft Awareness Week Part 2</title>
      <link>https://www.regionaltechnologysolutions.com/tax-identity-theft-part-two</link>
      <description>Last week, we shared the warning signs of online tax scam. Tax-related identity theft occurs when someone uses your stolen personal information, including your Social Security number, to file a tax return claiming a fraudulent refund.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Last week, we shared the warning signs of online tax scam. Tax-related identity theft occurs when someone uses your stolen personal information, including your Social Security number, to file a tax return claiming a fraudulent refund.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Here are some tips to avoid being  victim
            &#xD;
        &lt;/b&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Never Send Sensitive Information in an Email. Information sent through email can be intercepted by criminals. Make sure to consistently check your financial account statements and your credit report for any signs of unauthorized activity.  
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Secure Your Computer. Ensure your computer has the latest security updates installed. Check that your anti-virus and anti-spyware software are running properly and receiving automatic updates from the vendor. If you haven't already done so, install and enable a firewall.  
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Carefully Select the Sites You Visit. Safely searching for tax forms, advice on deductibles, tax preparers, and other similar topics requires great caution. NEVER visit a site by clicking on a link sent in an email, found on someone's blog, or in an advertisement. The websites you land on might look like legitimate sites, but can also be very well-crafted fakes.  
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Be Wise with Wi-Fi. Wi-Fi hotspots are intended to provide convenient access to the internet, however, this convenience can come at a cost. Public Wi-Fi is not secure and is susceptible to eavesdropping by hackers, therefore, never never use public Wi-Fi to file your taxes!  
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Look for Clear Signs. Common scams will tout tax rebates, offer great deals on tax preparation, or offer a free tax calculator tool. If you did not solicit the information, it's likely a scam.  
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Be on the Watch for Fake IRS Scams. The IRS will not contact you via email, text messaging, or your social network, nor does it advertise on websites. Additionally, if an email appears to be from your employer or bank claiming there is an issue that requires you to verify personal information, this is most likely a scam as well. Don’t respond to these types of emails; always contact the entity directly.  
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Always Utilize Strong Passwords. Cybercriminals have developed programs that automate the ability to guess your passwords. To best protect yourself, make your passwords difficult to guess. Passwords should have a minimum of nine characters and include uppercase and lowercase letters, numbers, and symbols.  
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Source:
           &#xD;
      &lt;a href="https://nam03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fr20.rs6.net%2Ftn.jsp%3Ff%3D001v__opuJu_9YSSiTz6K0j00fQGlNEROXdJY5xZbrFjN9y9wjutMbyvvDqgYKXkDV9-tyxRDAgebvq6q4AkHFCt0JaXXjkxCVdu5N69DMrol8mLvd2yS1qTVF2W5hZNpCKoLq0Erq7VcGxODw-ZLxh-lAG93hu7J9Ir-r5550SnuSz0romFq5PjeJebu02Un_BmNR5rtz7LQY3z_JqavCkWA%3D%3D%26c%3DWcoLXgrp0ymWYa_o7LdaoOjGUCHNA5o1ojr83aLc-U09ilV_x-1lfg%3D%3D%26ch%3DSGpG8IkZex-i5JcBWaRAwHpIsYysZjRAvYMUOCDbgz7viJcPAyY8Og%3D%3D&amp;amp;data=02%7C01%7C%7C06dee17f1fe8412c7d7d08d79b87133d%7C083e2bb988d9481986b4667e8aa224f4%7C0%7C0%7C637148876775980287&amp;amp;sdata=oBaswtz%2FAbwa7f2YHkhPIyIp79MuaX7z2yc%2BobNBz08%3D&amp;amp;reserved=0" target="_blank"&gt;&#xD;
        
            cisecurity.org
           &#xD;
      &lt;/a&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1486312338219-ce68d2c6f44d.jpg" length="183242" type="image/jpeg" />
      <pubDate>Mon, 27 Jan 2020 19:10:55 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/tax-identity-theft-part-two</guid>
      <g-custom:tags type="string">tax,identity,theft,awareness,tips,scam,victim,information,security</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1486312338219-ce68d2c6f44d.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1486312338219-ce68d2c6f44d.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Tax Identity Theft Awareness Week Part 1</title>
      <link>https://www.regionaltechnologysolutions.com/tax-identity-theft-part-one1</link>
      <description>Tax season is in full swing, which means criminals will go to great lengths to separate you from your money, your identity, or anything of value that is within their reach. They may offer seemingly legitimate "tax services" that are actually designed to steal your identity and your tax refund. Often times, criminals will lure you in with an offer of larger write-offs or refunds. Such scams might include fake websites and tax forms that look like they belong to the Internal Revenue Service (IRS) in order to trick you into providing your personal information.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Tax season is in full swing, which means criminals will go to great lengths to separate you from your money, your identity, or anything of value that is within their reach. They may offer seemingly legitimate "tax services" that are actually designed to steal your identity and your tax refund. Often times, criminals will lure you in with an offer of larger write-offs or refunds. Such scams might include fake websites and tax forms that look like they belong to the Internal Revenue Service (IRS) in order to trick you into providing your personal information. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        
            Warning Signs of an Online Tax Scam 
           &#xD;
      &lt;/b&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            An email or link requesting personal and/or financial information, such as your name, social security number, bank or credit card account numbers, or any additional security-related information. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Emails containing various forms of threats or consequences if no response is received, such as additional taxes or blocking access to your funds. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Emails from the IRS or federal agencies. The IRS will not contact you via email. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Emails containing exciting offers, tax refunds, incorrect spelling, grammar, or odd phrasing throughout. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Emails discussing "changes to tax laws." These email scams typically include a downloadable document (usually in PDF format) that purports to explain the new tax laws. However, unbeknownst to many, these downloads are almost always populated with malware that, once downloaded, will infect your computer. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1488590528505-98d2b5aba04b.jpg" length="230025" type="image/jpeg" />
      <pubDate>Fri, 24 Jan 2020 19:10:55 GMT</pubDate>
      <guid>https://www.regionaltechnologysolutions.com/tax-identity-theft-part-one1</guid>
      <g-custom:tags type="string">tax,identity,theft,awareness,week,security,updates,scam,alert,tips,to avoid</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1488590528505-98d2b5aba04b.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1488590528505-98d2b5aba04b.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
