Summit Tech Blog

How Long Does it Take to Crack Your Password?

Less and Less Time

 For a Baltimore area religious order, it took no time at all to crack their passwords, because members had stored them in the nifty Password section of this paper planner. When one member left it behind at church, it somehow got into the hands of, let’s call him a “less than devout” person, and it wasn’t long before that religious institution was hacked.

Read More
0

HR Departments Targeted with Payroll Diversion Scams

Is your HR department trained to combat cyber-crime?

A wide-spread fraud scheme has been making a comeback in recent months and it's specifically targeting the department responsible for making sure employees are paid on-time, every time. The IRS warns that direct deposit and wire transfer scams are becoming more prolific and are bypassing even the most sophisticated technical controls....

Read More
0

Your computer is wiped clean. Get back up with backups.

Imagine walking into the office on a Monday morning and seeing that your computer has nothing on it. That weeks’ worth of complex excel calculations? Gone. Your client project that needs to get out the door today? Disappeared. The long list of unread emails? Poof. (Even though you might not be so upset about that).

Read More
0

Who Hackers are Betting on for March Madness

The Cybercriminal's Final Four

Every year, March Madness is an enticing distraction for many employees. Whether your company embraces the championships as  morale boosting or puts a halt to distractions and unproductive behavior during the work day, it’s inevitable that March Madness is going to impact office productivity.

Read More
0

Dogfooding: Why We Use Our IT Products First

Ever heard of “eating your own dog food” or "dogfooding” for short? The expression means using your own products to test them in a real-world environment before you introduce them to customers.

It’s thought the term originated with a 1970s TV commercial in which actor Lorne Green endorsed Alpo dog food by pointing out his own dogs eat it. Since then, companies large and small have adopted this...

Read More
0

It’s a win-win for Maryland small businesses: Lower taxes and cybersecurity

Every small company seeks to pay lower taxes to increase their profit margins on products and services that they provide. Now in Maryland that opportunity exists and with the added benefit of enhanced cybersecurity.

Read More
0

Valentine’s Day Brings Out the Catfish.

Valentines Day brings out the best (and worst) in people. As couples scramble to book their dinner reservations and grab the last bouquet of flowers, singles are swiping and clicking to find last minute love. Yet in the search for love, many online daters are finding scams and fraud instead.

Read More
0

It's National Data Privacy Day. Wishful Thinking?

Today, January 28, is National Data Privacy Day, the annual date devoted to raising awareness about the use (or misuse) of our personal data and the importance of keeping it private. Many would argue that ship has sailed.

Read More
0

What do bell bottom jeans, mullets, and Windows 7 have in common?

One Year Until Microsoft Sunsets Windows 7

Don't let your operating system become the next fashion faux paus. The world has moved on. It's officially outdated. Microsoft has announced it is going to stop supporting Windows 7 on January 14th, 2020. That means you have one year to modernize your operating system by moving to Windows 10. 

Read More
0

2019 Cyber Environment Presents Challenges and Opportunities

As a company that manages IT security and tech support, the new year is time to take stock of the cyber security landscape. Our own experience has taught us that cyber challenges will only increase, although the nature of those threats continually evolves. Here is  what leading experts expect to emerge in 2019. 

Read More
0