×

Rx Technology
14220 Northbrook Drive
Suite 500
San Antonio, TX 78232
sales@rx-tech.com
Monday–Friday 8am-5pm

Phone: (210) 828-6081

Home
About Us
Testimonials
IT Services
IT Construction
Resources
Contact Us

News

San Antonio, TX

Need I.T. Help?

Contact Us

Scoring Big by Blending Internal IT with Managed IT Services

Scoring Big by Blending Internal IT with Managed IT Services Typically internal IT is built around a core of ideas that your organization focuses on, as well as what network systems mean to them. Some organizations focus on helpdesk more, or they rely on a team of engineers to keep their systems up and running. [...]

What does an IT Support Company do?

What does an IT Support Company do? Choosing an IT support company is one of the most important decisions you can make for your business. With the amount of technology innovation over the last ten years, it’s imperative that organizations focus on their infrastructure improvements not just on business strategies for growth. To remain competitive [...]

Understanding Enterprise Wireless vs. Consumer Grade Deployments

Understanding Enterprise Wireless vs. Consumer Grade Deployments One topic that comes up frequently here at Rx Technology is wireless connectivity. More organizations than ever are looking to ditch the cable in return for monitoring and connecting users over the air. It’s not for everyone, and it’s not a time to go the local electronics boutique [...]

Top 6 Issues for HIPAA Network Compliance

Top 6 Issues for HIPAA Network Compliance Rx Technology works with dozens of medical organizations daily on securing Patient Health Information (PHI). Often when we begin medical staff and administrators don’t understand the complexities of network communication and often fail to comply with all of the requirements. We would be the first to admit that [...]

Seven Benefits of partnering with the right Managed Services Provider

Seven Benefits of partnering with the right Managed Services Provider Managing IT services in the organization can be a real headache. Trying to stay ahead of technology changes while staying within a budget is difficult to manage even if you have internal staff. Day to day support and moving projects forward can be overwhelming even [...]

Ransomware and Protecting Organizational Data

Ransomware and Protecting Organizational Data For the last ten years, we have been fighting an organizational scourge that threatens all levels of the SMB marketplace. This problem is ransomware, a malicious file distribution system targeting users of email by tricking them into installing malware. Once the program establishes itself, it will find all shared files that the user [...]

Outsource your IT or hire internally

Outsource your IT or hire internally As more companies move towards a managed IT services model to service their technology needs there are still questions on how best to implement that technology. Some companies struggle with the decision whether to outsource their IT or hire someone internally. We’re sharing a few of those concerns below [...]

Why you should choose a network health assessment from a neutral 3rd party, IT Support firm

Why you should choose a network health assessment from a neutral 3rd party, IT Support firm Often in IT services, we find that even the most well-intentioned support staff can overlook some of the simplest protections or best practices when it comes to your organization's network. If they focus on a break-fix model, for instance, [...]

How to Protect Yourself from Phishing, Malware, and Ransomware Attacks – at Work and Home

How to Protect Yourself from Phishing, Malware, and Ransomware Attacks – at Work and Home We’ve all heard horror stories from friends or co-workers about Ransomware and locking files only to find out that backups weren’t effective, or worse those backups became corrupted by the infection. At least once a month we hear from organizations [...]

How to protect yourself against Ransomware or other Malware

How to protect yourself against Ransomware or other Malware What is the weakest link in your organization? Since attackers commonly use social engineering to infect users training becomes imperative to educating your employees about the signs of social engineering. Email is the most common way of influencing end users and leaves them vulnerable on a [...]

Five essential steps to make sure you’re HIPAA compliant

Five essential steps to make sure you’re HIPAA compliant The Health Insurance Portability and Accountability Act, otherwise known as HIPAA, is a standard for protecting patient health information. You may have heard of instances where patient records were found in a dumpster (multiples times here in San Antonio over the last decade), or data breaches [...]

A strong case for Managed Security Services

A strong case for Managed Security Services As you probably have heard Equifax was hacked and up to 143 million people have had their Social Security numbers and other data stolen. Aside from the fears and problems this brings about, let alone the fact that this is a company that along with two other credit [...]

Cybersecurity for Small to Medium Business

Cybersecurity for Small to Medium Business As we rely more and more on technology to run our organizations, it is becoming imperative to learn how that technology is also used against us. A secure environment to protect our customer data is our mission in IT support, and it is a never-ending challenge to evolve with [...]