COVID-19 Resources (ARCH)
-
InnoTech – San Antonio’s Technology & Innovation Conference & Expo
04/12/2016Presented by Presidio Wednesday, May 11, 2016 Henry B. Gonzalez Convention Center The 9th annual InnoTech San Antonio returns to the Henry B. Gonzalez Convention Center on May 11. Join over 1,300 technology and IT professionals for a full day of conference sessions, networking and tech demos. InnoTech San Antonio will host 30+ conference sessions presented by a number of national and loc...Learn More >> -
The Needs of the Small Business
Submitted by Kevin Pate The Helpful Computer Guy For the past eight years we have served small businesses as an outsourced IT provider. We have learned how they operate and how they view their IT needs. These businesses are too small to need or pay for an in-house IT employee so they look to an outside source to service them. So what is it that they need? The needs of the small busines...Learn More >> -
Scam of the Week: Phish with Hidden Sting
Submitted by Gary O’Hara Hi Impact Technology, Inc. There is a particular type of Phishing attack which research teams see more and more often. This attack plays out as follows: Employees receive an email with an attachment — usually PDF or DOC. The body of the email contains no malicious links and consists only of a social engineering ruse to open the attached doc. The attached d...Learn More >> -
The Importance of Conducting Due Diligence on 3rd Party Providers
Submitted by Tom DeSot Digital Defense, Inc. We’ve entered into an age where network security breaches aren’t just common – they’re alarmingly more common than you think. According to the 2015 Cyberthreat Defense Report, an incredible 70% of all organized were compromised by a successful computer security breach at some point during the previous year. Hackers and other people with malicio...Learn More >> -
5 Steps To Protect Your Business From Cyber Crime
Submitted by Beth Hill TechSage Solutions A Seattle company was recently broken into and a stash of old laptops was stolen. Just a typical everyday crime by typical everyday thieves. These laptops weren’t even being used by anyone in the company. The crime turned out to be anything but ordinary when those same thieves (cyber-criminals) used data from the laptops to obtain information and ...Learn More >>