Presented by Presidio
Wednesday, May 11, 2016
Henry B. Gonzalez Convention Center
The 9th annual InnoTech San Antonio returns to the Henry B. Gonzalez Convention Center on May 11. Join over 1,300 technology and IT professionals for a full day of conference sessions, networking and tech demos. InnoTech San Antonio will host 30+ conference sessions presented by a number of national and loc...
Submitted by Kevin Pate
The Helpful Computer Guy
For the past eight years we have served small businesses as an outsourced IT provider. We have learned how they operate and how they view their IT needs. These businesses are too small to need or pay for an in-house IT employee so they look to an outside source to service them. So what is it that they need?
The needs of the small busines...
Submitted by Gary O’Hara
Hi Impact Technology, Inc.
There is a particular type of Phishing attack which research teams see more and more often. This attack plays out as follows:
Employees receive an email with an attachment — usually PDF or DOC.
The body of the email contains no malicious links and consists only of a social engineering ruse to open the attached doc.
The attached d...
Submitted by Tom DeSot
Digital Defense, Inc.
We’ve entered into an age where network security breaches aren’t just common – they’re alarmingly more common than you think. According to the 2015 Cyberthreat Defense Report, an incredible 70% of all organized were compromised by a successful computer security breach at some point during the previous year. Hackers and other people with malicio...
Submitted by Beth Hill
A Seattle company was recently broken into and a stash of old laptops was stolen. Just a typical everyday crime by typical everyday thieves. These laptops weren’t even being used by anyone in the company. The crime turned out to be anything but ordinary when those same thieves (cyber-criminals) used data from the laptops to obtain information and ...