COVID-19 Resources (ARCH)

  • Featured Image

    InnoTech – San Antonio’s Technology & Innovation Conference & Expo

    04/12/2016
    Presented by Presidio Wednesday, May 11, 2016 Henry B. Gonzalez Convention Center The 9th annual InnoTech San Antonio returns to the Henry B. Gonzalez Convention Center on May 11. Join over 1,300 technology and IT professionals for a full day of conference sessions, networking and tech demos. InnoTech San Antonio will host 30+ conference sessions presented by a number of national and loc...
    Learn More >>
  • Featured Image

    The Needs of the Small Business

    Submitted by Kevin Pate The Helpful Computer Guy For the past eight years we have served small businesses as an outsourced IT provider. We have learned how they operate and how they view their IT needs. These businesses are too small to need or pay for an in-house IT employee so they look to an outside source to service them. So what is it that they need? The needs of the small busines...
    Learn More >>
  • Featured Image

    Scam of the Week: Phish with Hidden Sting

    Submitted by Gary O’Hara Hi Impact Technology, Inc. There is a particular type of Phishing attack which research teams see more and more often. This attack plays out as follows: Employees receive an email with an attachment — usually PDF or DOC. The body of the email contains no malicious links and consists only of a social engineering ruse to open the attached doc. The attached d...
    Learn More >>
  • Featured Image

    The Importance of Conducting Due Diligence on 3rd Party Providers

    Submitted by Tom DeSot Digital Defense, Inc. We’ve entered into an age where network security breaches aren’t just common – they’re alarmingly more common than you think. According to the 2015 Cyberthreat Defense Report, an incredible 70% of all organized were compromised by a successful computer security breach at some point during the previous year. Hackers and other people with malicio...
    Learn More >>
  • Featured Image

    5 Steps To Protect Your Business From Cyber Crime

    Submitted by Beth Hill TechSage Solutions A Seattle company was recently broken into and a stash of old laptops was stolen. Just a typical everyday crime by typical everyday thieves. These laptops weren’t even being used by anyone in the company. The crime turned out to be anything but ordinary when those same thieves (cyber-criminals) used data from the laptops to obtain information and ...
    Learn More >>