The logo for regional technology solutions has a green gear in the middle.
Call 903-218-6400

How to Protect your Privacy Online

Cybersecurity and Infrastructure Security Agency • February 22, 2021
The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide personally identifiable information (PII) such as your name, date of birth, account numbers, passwords, and location information. #BeCyberSmart when sharing personal information online to reduce the risk of becoming a cybercrimes victim.

Did You Know?
  • 45% of Americans have had their personal information compromised by a data breach in the last five years. 
  • 70% of Americans feel that their personal information is less secure than it was five years ago2
  • , up from 49% just two years ago.
  • 72% of Americans believe that most of what they’re doing while online is being tracked by advertisers, technology firms and other companies.
  • Over half of Americans (52%) say they have decided not to use a product or service because they were worried about how much personal information was being collected about them.

Simple Tips
  • Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring. Read the Multi-Factor Authentication (MFA) How-to-Guide for more information.
  • Shake up your password protocol. Use the longest password or passphrase permissible. Get creative and customize your standard password for different sites, which can prevent cyber criminals from gaining access to these accounts and protect you in the event of a breach. Use password managers to generate and remember different, complex passwords for each of your accounts. Read the Creating a Password Tip Sheet for more information.
  • Keep up to date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it, and set your security software to run regular scans.
  • If You Connect IT, Protect IT. Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software. Read the Phishing Tip Sheet for more information.  
  • Play hard to get with strangers. Cyber criminals use phishing tactics, hoping to fool their victims. If you’re unsure who an email is from—even if the details appear accurate— or if the email looks “phishy,” do not respond and do not click on any links or attachments found in that email. When available use the “junk” or “block” option to no longer receive messages from a particular sender.
  • Never click and tell. Limit what information you post on social media—from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all that criminals need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social Security numbers, account numbers, and passwords private, as well as specific information about yourself, such as your full name, address, birthday, and even vacation plans. Disable location services that allow anyone to see where you are—and where you aren’t—at any given time. Read the Social Media Cybersecurity Tip Sheet for more information. 
  • Keep tabs on your apps. Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of least privilege” to delete what you don’t need or no longer use. Learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources. 
  • Stay protected while connected. Before you connect to any public wireless hotspot—such as at an airport, hotel, or café—be sure to confirm the name of the network and exact login procedures with appropriate staff to ensure that the network is legitimate. If you do use an unsecured public access point, practice good Internet hygiene by avoiding sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi. Only use sites that begin with “https://” when online shopping or banking.
By Regional Technology Solutions March 7, 2024
The solar eclipse is fast approaching, so get ready to experience this rare event where the moon covers the sun, creating a breathtaking sight. ETCOG Regional Technology Solutions (RTS) has played an important role in enhancing your experience by determining if you are within the path of totality. The solar eclipse, marked by the alignment of the sun, moon, and Earth, resulting in the temporary obscuration of the sun's light. During this occurrence, the moon casts a shadow on Earth, offering observers a unique glimpse of the sun's corona and a twilight during daylight hours. Remarkably, half of ETCOG's 14-county region finds itself within the path of totality, positioning East Texas as a prime location for eclipse enthusiasts. This event on Monday, April 8 marks the first total eclipse visible to East Texas since 1878. To make sure you make the most of this rare occurrence, RTS has built an eclipse map that allows you to pinpoint your location within the path of totality. You can access the map to view your location by visiting go.etcog.org/2024eclipse . Beyond the eclipse map, RTS specialized in the creation of interactive solutions, ranging from customized apps to digital maps, and prints. These services are offered to city, county, and partners, showcasing ETCOG's commitment to solving local solutions and a low cost. For more local information → www.visittyler.com/solar-eclipse
Overview photo of laptop keyboard
By Regional Technology Solutions January 30, 2024
The digital realm is evident in our daily lives, impacting personal, professional, and educational areas. Kids nowadays master touch screens before they can articulate sentences, diving into various digital realms. However, this pervasive online presence raises serious security concerns and cyber threats. This concern showcases the importance of Safer Internet Day, a global movement urging everyone to pitch in for a safer online world. What is Safer Internet Day? Taking place in early February, Safer Internet Day is a worldwide event. The official host in the U.S. is ConnectSafely, a Silicon Valley non-profit. Its mission - making the internet a safer, more positive space by spreading awareness about responsible and respectful tech use. Why is it important? In 2021, over 90% of people in developed countries were internet users, making them targets for cybercrimes like identity theft, financial scams, and malware. The Federal Trade Commission (FTC) reported 3.2 million identity theft cases in 2019, mostly linked to online activities, resulting in hefty financial hits. Safer Internet Day is about sounding the alarm on these threats, offering resources and intel. Tips to navigate the internet safely: Safer Internet Day is the perfect time to give your online habits a once-over. Here are some tips for staying safe: Education is Power: Stress the need to keep Personally Identifiable Information (PII) private within the organization. Establish clear online guidelines, including approved websites and applications. Reinforce the significance of creating strong, unique passwords and discouraging password sharing. Stay sharp to spot threats: Promote media literacy within the organization to identify fake news and potential scams. Heighten awareness of phishing attempts and provide guidance on avoiding them. Foster open communication channels, particularly within the organization's digital landscape. Get ahead of the game: Review and discuss the applications used within the organization, addressing any safety concerns. Strengthen digital defenses with antivirus software, parental controls, and VPN technology. Advocate for the implementation of multi-factor authentication (MFA) and regular software updates. Monitor online transactions to ensure they occur on secure platforms. Defending the Digital Turf The internet exposes everyone to cyber threats, from scams to severe data breaches. Organizations can collectively create a more secure online haven for everyone by increasing defenses and adopting safe procedures and practices. If your organization needs assistance building a plan for secure online practices, our dedicated team is here to help. We understand the dynamic nature of cyber threats and can provide tailored solutions to safeguard your organization's digital assets. Contact us today, and let's collaborate to ensure a safer and more resilient digital future for your organization.
Graphic with hexagons with lock graphic in the middle overlayed on photo of typing on keyboard
By The Security Awareness Company August 22, 2023
In the rapidly evolving landscape of the digital world, the threat of cyberattacks is an ever-present concern. Cybercriminals have various tools and techniques to infiltrate systems, compromise data, and disrupt the lives of individuals and organizations alike. One common thread that runs through many of these attacks is their ability to exploit human behavior and technological vulnerabilities. Here are the most prevalent methods used by malicious actors to spread infections and explore preventive measures to bolster your digital defenses. Attack Method: Phishing Phishing is the oldest trick in the cybercriminal playbook and continues to be remarkably effective. This technique involves sending deceptive emails or messages that appear legitimate, enticing recipients to click on malicious links or download infected attachments. These messages often invoke a sense of urgency or fear, pushing individuals to act hastily without thinking. Attackers may also utilize misspelled words and unexpected file attachments to manipulate users into lowering their guard. Prevention Technique: Always be cautious when encountering unsolicited emails, especially those demanding immediate action or containing unusual attachments. Hover your cursor over links to preview the URL before clicking, and verify the sender's email address. When in doubt, contact the supposed sender through a separate channel to confirm the message's authenticity. Attack Method: USB Drives and Cables Harnessing human curiosity as a weapon, cybercriminals often plant infected USB drives and cables in public spaces, exploiting the innate desire to discover what's hidden within. This practice, known as USB baiting, preys on unsuspecting victims who plug in these devices without considering the potential risks. Prevention Technique: Exercise extreme caution when encountering unattended USB devices or cables. Avoid connecting unknown devices to your system, as they might contain malware programmed to infect your device upon connection. If you encounter such devices, report them to the appropriate authorities or IT department for proper handling. Attack Method: Malicious Mobile Apps The proliferation of smartphones and mobile apps has opened up a new avenue for cyberattacks. Despite stringent vetting processes employed by major app stores, malicious apps sometimes sneak through. These apps can compromise your personal data, steal sensitive information, or even grant unauthorized access to your bank accounts. Prevention Technique: Prioritize apps from reputable developers with a proven track record. Carefully review app permissions before installation, ensuring they align with the app's intended functionality. Avoid sideloading apps from unofficial sources, as these can pose significant security risks. On work-issued devices, always adhere to company policies regarding app downloads. Attack Method: Software Vulnerabilities Cybercriminals are perpetually on the lookout for weaknesses in software systems. Once identified, these vulnerabilities can be exploited to breach security controls and gain unauthorized system access. Regularly updating software is crucial, as developers issue patches and updates to address these vulnerabilities and enhance security. Prevention Technique: Keep your devices updated by promptly installing software updates. In a corporate environment, adhere to company policies concerning software management. Regularly monitor official sources for security advisories and updates related to the software you use, and apply them in a timely manner.  In the digital age, cybersecurity vigilance is paramount. By understanding cybercriminals' tactics to spread malicious infections, you can take proactive steps to protect your personal information, devices, and systems. Employing a combination of skepticism, caution, and adherence to security best practices will help you navigate the complex landscape of cybersecurity threats and safeguard your digital presence.
aerial photo of neighborhood
By East Texas Council of Governments July 26, 2023
Geographic information systems (GIS) are powerful tools that can be used to visualize, analyze, and manage spatial data. They have a wide range of applications in city and county jurisdictions, including: Planning and development: GIS can be used to map and manage zoning, land use, transportation, and other infrastructure data to help with planning and development decisions. For example, GIS can be used to identify areas that are suitable for new development or to assess the impact of a proposed development on traffic patterns. Utility and Asset management: GIS can be used to map and track assets, such as water and sewer utilities, roads, bridges, and buildings. This information can be used to manage assets more effectively and to identify assets that need maintenance or repair. Emergency management: GIS can be used to map emergency response resources, such as fire stations, hospitals, and shelters. This information can be used to plan for and respond to emergencies more effectively. Public safety: GIS can be used to map crime data, traffic accidents, and other public safety data. This information can be used to identify crime hot spots, target enforcement efforts, and plan for public safety improvements. Environmental management: GIS can be used to map environmental data, such as air quality, water quality, and land use. This information can be used to assess the impact of human activity on the environment and to develop and implement environmental policies. These are just a few of the ways that GIS can be used in city and county jurisdictions. As GIS technology continues to evolve, we can expect to see even more innovative applications of GIS in the years to come. How to Get Started with GIS If you're interested in using GIS in your community but don't have the staff time, expertise, or software, ETCOG can help! Our Regional Technology Solutions team offers affordable GIS services. To learn more, visit our GIS Services page .
Robot hand with a blue background
By The Security Awareness Company July 14, 2023
By the way, everything you’ve read on this page (up until now) was not written by a human, but by an AI chatbot. It was simply asked to define artificial intelligence and explain the related security concerns. If you wanted to, you could ask that same bot to write poetry about cats, explain quantum physics, or basically anything else you can think of. The chatbot is a basic example that barely captures AI’s capabilities. As it evolves, AI technology will become even more advanced with abilities we never thought possible of machines. This, of course, ushers in all sorts of interesting conversations regarding human intelligence vs. machine intelligence, and what might happen if the latter surpasses the former. Those conversations make this quote from the 1993 movie Jurassic Park eerily relevant: “Your scientists were so preoccupied with whether they could, they didn’t stop to think if they should.” Nonetheless, AI is an active part of our lives. And it’s not hard to imagine cybercriminals leveraging AI to carry out attacks in the near future. As an example, AI models could learn about a real person and then use bots to mimic their actions and language. This would allow criminals to create advanced phishing campaigns that target specific people at a much more effective rate than any human could. It’s also possible AI will be used to circumvent attacks from criminal hackers. But even as those technologies become more of a reality, advancements in cyberdefenses will always lag behind advancements in cyberattacks. Everything you’ve read on this page (up until now) was written by a human, but below was written by an AI chatbot. It was simply asked to define artificial intelligence and explain the related security concerns. If you wanted to, you could ask that same bot to write poetry about cats, explain quantum physics, or basically anything else you can think of. The chatbot is a basic example that barely captures AI’s capabilities. Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think and learn like humans. AI can be divided into several different types, including: Rule-based systems, which follow a set of predetermined rules to reach a conclusion Expert systems, which use a knowledge base to make decisions Neural networks, which are modeled after the human brain and can learn from data Natural language processing, which enables machines to understand and interpret human language AI technology has been developed in various areas such as image recognition, self-driving cars, personal assistants, and so on. There are several security concerns regarding AI technology. Here are a couple of examples: Data poisoning: In some cases, attackers may try to inject malicious data into the training dataset to “poison” the model and cause it to make incorrect decisions. Physical safety: Some AI applications, such as self-driving cars or industrial robots, may pose physical safety risks if they malfunction or are compromised by an attacker
View of conference main session from back of room.
By Regional Technology Solutions May 30, 2023
In the dynamic landscape of technology and cybersecurity, county, city, and regional officials and staff face numerous challenges in delivering efficient and secure services to their communities. To bridge the gap between technology, cybersecurity, and county service, the Regional Technology Solutions (RTS) Team embarked on an empowering journey by attending the Texas Association of Counties (TAC) Technology Conference. With a robust and member-shaped agenda, this conference aimed to equip individuals with critical information and strategies regardless of their technical comfort levels. The body content of your post goes here. "At the Texas Association of Counties Technology Conference, I had the privilege of representing ETCOG, and it was truly an enriching experience. Engaging with seasoned professionals in the technology industry through insightful presentations provided me with valuable knowledge," said IT Systems Administrator Dylan Savage. "Moreover, networking with fellow county representatives across Texas shed light on the distinctive technological challenges they encounter. This exposure enables us to shape innovative solutions for the counties we represent, fostering progress and growth." The TAC Technology Conference offered an array of transformative sessions, empowering county and city staff with critical information and strategies. Participants delved into the intricacies of legally required website postings, gaining insights on ensuring compliance and accessibility for county and city services. They explored innovative approaches to managing data storage and backups, safeguarding valuable county information from loss or unauthorized access. Sessions on records management provided techniques for streamlining efficiency and accessibility, while addressing the challenges of maintaining transparency in county operations. Budgeting for technology projects was a key topic, enabling attendees to maximize the value and impact of county investments in technology and cybersecurity. Finally, sessions on developing technology policies provided guidance on creating a secure and innovative environment while adhering to best practices and legal requirements. "During our interactions with county IT and non-IT staff, we acquired invaluable knowledge that will greatly enhance our support for ETCOG and Workforce," said IT Network Administrator Brian Brown. "As representatives of ETCOG, understanding the challenges faced by IT officials in Texas provides a profound perspective on the significance of our work. Witnessing the endeavors of other COGs and the counties they serve, I feel immense pride in the accomplishments of ETCOG and the extensive assistance we provide to meet the needs of our local counties." The RTS Team's participation in the TAC Technology Conference provided them with knowledge, tools, and strategies to bridge the gap between technology and cybersecurity. By actively engaging in various sessions, they gained insights into crucial topics such as website compliance, data management, cybersecurity incident response, and technology policy development. Equipped with this newfound expertise, the RTS Team is poised to drive innovation, enhance county services, and safeguard critical information, ultimately bridging the gap between technology, cybersecurity, and city and county service for the benefit of the East Texas community. To learn more about how RTS can help your organization safeguard against cyber attacks and promote safe practices, visit → www.regionaltechnologysolutions.com/it-services
White digital mouse hovering over
By National Cybersecurity Alliance April 4, 2023
Launched in 2021, the mission of Identity Management Day is to educate business leaders and IT decision makers on the importance of identity management and key components including governance, identity-centric security best practices, processes, and technology, with a special focus on the dangers of not properly securing identities and access credentials. In addition, the National Cybersecurity Alliance will provide guidance for consumers, to ensure that their online identities are protected through security awareness, best practices and readily-available technologies.  Research by the IDSA reveals that 79% of organizations have experienced an identity-related security breach in the last two years, and 99% believe their identity-related breaches were preventable. According to the 2020 Verizon Data Breach Investigations Report, as many as 81% of hacking-related breaches leverage weak, stolen, or otherwise compromised passwords. As part of Identity Management Day, the National Cybersecurity Alliance and the IDSA, will provide guidance for stakeholders at all levels, to ensure that identities of employees, machines, applications, and partners are protected through security awareness, best practices and readily-available technologies. Learn more about Identity Management Day at → www.idsalliance.org/event/identity-management-day-2023
city staff using device to map location
By ETCOG's GIS Program November 1, 2022
ETCOG announces a new project partnered with the City of Wills Point to build a code enforcement module for their Geographic Information Systems (GIS) platform. Wills Point has been participating in ETCOG's GIS program for many years, which allows them to contract with ETCOG for low-cost GIS services and platform administration. The new code enforcement module will be used by Wills Point internally by enforcement officers, building officials, and zoning administrators to collect and monitor violations and related inspection information.
Aerial photo of individual typing on two laptops
By Texas Association of Counties October 12, 2022
So what is MFA? It is an additional layer of security that protects your accounts with more than just a single password. When logging in from a new device or location, or following a password reset, users will be asked for two things: a password and a security code, often sent to the account owner's cellphone or landline. MFA acts a second line of defense. So why use MFA? In a word, security. Microsoft reports that there are over 300 million fraudulent sign-in attempts to its cloud services every day. In addition, hackers don't take vacations , the federal Cybersecurity & Infrastructure Security Agency (CISA) says. Their tactics are constantly evolving, and one-third of Americans were victims of cybercrime last year, CISA says. Does MFA really work? Microsoft says that implementing MFA can block 99.9% of attacks on your accounts. Hackers are getting better at phishing and harvesting passwords to gain unauthorized access . They take advantage of reused passwords stolen in other breaches, but even so, enforcing MFA is an effective barrier that greatly reduces the likelihood of a break-in. Cybercriminals often move on to new targets when they encounter MFA security. Remember, hackers are like burglars. They are looking for an easy way in. Don't give it to them. Put an extra lock on the door with MFA. Email services provided by TAC CIRA already include MFA. Reach out to TAC CIRA at support@county.org or by phone at (800) 456-5974 to implement MFA today.
Aerial image of two people typing on laptop.
By Regional Technology Solutions February 11, 2022
The Affordable Connectivity Program (ACP) is a Federal Communications Commission (FCC) program that replaces the Emergency Broadband Benefit Program (EBB Program) to help low-income households pay for internet service and connected devices. If your household is eligible , you can receive: Up to a $30/month discount on your internet service Up to a $75/month discount if your household is on qualifying Tribal lands A one-time discount of up to $100 for a laptop, tablet, or desktop computer (with a co-payment of more than $10 but less than $50) Only one monthly service discount and one device discount is allowed per household. To receive the connected device discount, consumers need to enroll in the ACP with a participating provider that offers connected devices (Note: not all internet company offer device discounts.) The internet company will provide the discount to the consumer.
More Posts
Share by: