Pre Header

Header

Spurs Sports & Entertainment

This is a presentation from the San Antonio Business Breakfast.

Spurs Sports & Entertainment

Port San Antonio

We provide assistance to small business owners to expand their business into federal, state, regional, county, and local markets with government agencies, and military installations. PTAC staff provides advising, training, and networking opportunities through specialized classes, monthly networking meetings, matchmaking events, and one-on-one assistance. In addition to the following services:

  • Determining Suitability for Contracting The government marketplace poses unique challenges that can overwhelm or even ruin a company that does not have the maturity or resources to meet them. Our advisors can help determine if your company is ready for government opportunities and how to best position it for success.
  • Securing Necessary Registrations Advisors are available to help ensure registration with the various databases necessary to participate in the government marketplace, including the Department of Defense’s System Award Management (SAM), the SBA’s Dynamic Small Business Search, and other government vendor databases.
  • SDB, 8(a), HUBZone, WOSB and other Certifications Certain small businesses are eligible for preferred status in some government solicitations. A PTAC specialist can help determine if your company is eligible for certain certifications and guide you through the steps necessary to secure them.
  • Researching Procurement Histories “What agencies have bought products like yours in the past? Which companies have been awarded these contracts? How much have they been paid?” Answers to questions like these are necessary to guide a marketing strategy and gain a competitive edge. PTAC staff can help ask the right questions and get the information needed to succeed.
  • BidMatch Service BidMatch is an automated system that searches new federal, state, and local government contracting opportunities on a daily basis and delivers matching opportunities to your email inbox. The PTAC BidMatch service searches over 350 government websites nationally. This service can help expand your customer base by providing a daily internet listing of contract opportunities customized to your business, providing names of potential customers who buy your products and services, and providing subcontracting opportunities with primary contractors on major contracts. The BidMatch service provides an affordable, customized contracting opportunity search tool for clients of the PTAC.
  • Proposal Preparation A procurement specialist can help navigate even the most difficult solicitation package, including securing necessary specifications and drawings and determining pricing.
  • Contract Performance Issues After contract award, PTAC staff can assist with performance issues such as developing a costaccounting system, bonding and interim financing, developing environmental, quality control, and accident prevention plans.

Port San Antonio

Small Business Cybersecurity Awareness

Small Business Cybersecurity Awareness

Information protection and security is vital to the sustainability and success of small business and the national economy.  As advocates and resource partners for the business community and service providers for the federal government, it is our role to educate and assist with federal contracting compliance guidelines and information security awareness.  More than two thirds of all small businesses report that are dependent on the internet for day-to-day activities.  Yet, according to the National Cybersecurity Alliance, most small businesses don’t do enough to protect themselves online.  Twenty percent of small businesses don’t have or use anti-virus software.  Sixty percent don’t use any encryption on their wireless networks, and fewer than 30% have a security plan in place.  This program is designed to provide awareness through training, one-on-one assistance with cybersecurity action plan development and implementation working with other UTSA specialty centers on cybersecurity.

Items of consideration when developing your system security plan:

  • What information does your business collect?
  • How do you store the information?
  • Who has access to the information?
  • How do you protect your business data?
  • What steps are you taking to secure your computers, network, email and other tools?

Protections

How to Protect Your Computer

Below are some key steps to protecting your computer from intrusion:

Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.

Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users’ knowledge. Most types of antivirus software can be set up to update automatically.

Install or Update Your Antispyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It’s like buying groceries—shop where you trust.

Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.

Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don’t know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.

Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users.