Summit Tech Blog

Larry Selleh

Larry, Summit's Director of Business Development, has experience working organizations large and small. He puts his 20+ years of experience to work every day finding the best solution for each company.
Find me on:

Recent Posts

Adding Mobile Devices to your Organization's Acceptable Use Policy

By Larry Selleh| March 21, 2017 |

Tags: Managed IT, Managed Services

A Mobile Device Acceptable Use Policy (AUP) defines the standards, procedures, and restrictions for employees' use of their mobile devices such as cell phones, iPads, and tablets.  Since mobile devices have become standard business tools storing sensitive organizational information, they have become a popular way to defraud users and steal confidential business data.

Read More
0

Employee Security Awareness - Educating the Weakest Link (pt 4 of 4)

By Larry Selleh| March 16, 2017 |

Tags: Managed IT, Managed Services, Security

Part 4 of 4: How to Protect & Recover from a Ransomware Attack

In our previous three  blogs, we covered 5 Steps for an Effective Information Security Program,  Best Practices to Protect your Data, and Employing Effective Backup Strategies to Protect your DataThe final blog in our series about How to Protect and Recover from a Ransomware Attack will cover Employee Awareness Training, your...

Read More
0

Protecting Your Data with an Effective Backup Strategy (pt 3 of 4) | How to Protect & Recover from Ransomware Attack

By Larry Selleh| March 14, 2017 |

Tags: Managed IT, Security

Part 3 of 4: How to Protect & Recover from Ransomware Attack

In our previous two blogs, we covered creating and maintaining an effective Information Security program as well as Best Practices for Protecting Data. Here, we will cover employing Effective Backup Strategies.

Read More
0

Best Practices to Protect your Data (pt. 2 of 4) | How to Protect & Recover from Ransomware Attack

By Larry Selleh| March 9, 2017 |

Tags: Managed IT, Managed Services, Security

Part 2 of 4: How to Protect & Recover from a Ransomware Attack

In our previous blog, we covered creating and maintaining an effective information security program.   Here, we will cover protecting data with technology’s best practices.  

Read More
0

5 Steps for an Effective Information Security Program (pt. 1 of 4) | How to Protect & Recover from Ransomware Attack

Part 1 of 4: How to Protect & Recover from a Ransomware Attack

The number of ransomware attacks targeting nonprofits, healthcare and all other organizations have rapidly increased.  They have  become a simple and direct source of revenue for cybercriminals and unfortunately, it’s very lucrative for them to hold your data for ransom.   When organizations experience a cyberattack, many lose...

Read More
0

What is a Managed Service Provider?

By Larry Selleh| February 22, 2017 |

Tags: Managed IT, Managed Services

 A Managed Service Provider, often referred to as an MSP, is an organization’s partner that cares for their information technology (IT) infrastructure – thus enabling it to function more effectively and efficiently.    An MSP manages a customer's IT infrastructure and/or end-user systems – either remotely or onsite - typically on a proactive basis and under a contractual arrangement that...

Read More
0

IRS Issues Warnings of W-2 Email Scams

By Larry Selleh| February 21, 2017 |

Tags: Security Awareness, Tips

The Internal Revenue Service is cautioning corporations, nonprofits and health systems of the dangers of W-2 scams.

Read More
0

The Pros and Cons of In-house IT Staff vs. Outsourcing IT Staff

By Larry Selleh| February 14, 2017 |

Tags: IT, Managed Services

We are asked about the pros and cons of outsourcing an organization's IT and technology needs often. Of course there are variations to every business or nonprofit, but here are some of the pluses and minus:

Read More
0

What's the cost of outsourcing IT services?

By Larry Selleh| February 14, 2017 |

Tags: Business, IT, Managed IT

A Study of Cost & Talent

IT Department Structure

Cost often drives the outsourcing of key IT applications and services, but analysis shouldn’t stop there when looking for managed services.  Factoring in employee acquisition, salaries, employee workloads and the core expertise of your IT department also needs to come into play when making the decision to outsource or keep the IT...

Read More
0
1