Summit Tech Blog

2019 Amazon Prime Day Offers: Real or Fake?

Amazon Prime Day 2019 is nearly upon us, and with it, the annual uptick in cyber threats.  The shopping juggernaut starts at 12a.m. PST, Monday, July 15 and ends at 11:59 PST, Tuesday July 16th.  The blitz of promotional emails, online ads, and blogs linked to special deals are not only irresistible to shoppers, but to hackers who feed on high emotions and a sense of urgency.

Here’s the...

Read More
0

How a Non-Profit's Good Idea Led to an App with a Big Impact

An app that finds financial help for seriously ill patients 

The Patient Access Network (PAN) Foundation offers nearly 70 disease-specific assistance programs to help eligible patients with life-threatening, chronic and rare diseases pay out-of-pocket-costs for treatment. Since its founding in 2004, PAN has provided nearly 1 million underinsured patients with over $3 billion in financial...

Read More
0

Three Consultants No Business Can Be Without

There are two professionals every business needs to avoid preventable risks: an attorney and an accountant. For businesses and nonprofits alike, add cybersecurity consultant to this crucial advisory group.

Read More
0

How Long Does it Take to Crack Your Password?

Less and Less Time

 For a Baltimore area religious order, it took no time at all to crack their passwords, because members had stored them in the nifty Password section of this paper planner. When one member left it behind at church, it somehow got into the hands of, let’s call him a “less than devout” person, and it wasn’t long before that religious institution was hacked.

Read More
0

HR Departments Targeted with Payroll Diversion Scams

Is your HR department trained to combat cyber-crime?

A wide-spread fraud scheme has been making a comeback in recent months and it's specifically targeting the department responsible for making sure employees are paid on-time, every time. The IRS warns that direct deposit and wire transfer scams are becoming more prolific and are bypassing even the most sophisticated technical controls....

Read More
0

Your computer is wiped clean. Get back up with backups.

Imagine walking into the office on a Monday morning and seeing that your computer has nothing on it. That weeks’ worth of complex excel calculations? Gone. Your client project that needs to get out the door today? Disappeared. The long list of unread emails? Poof. (Even though you might not be so upset about that).

Read More
0

Who Hackers are Betting on for March Madness

The Cybercriminal's Final Four

Every year, March Madness is an enticing distraction for many employees. Whether your company embraces the championships as  morale boosting or puts a halt to distractions and unproductive behavior during the work day, it’s inevitable that March Madness is going to impact office productivity.

Read More
0

Dogfooding: Why We Use Our IT Products First

Ever heard of “eating your own dog food” or "dogfooding” for short? The expression means using your own products to test them in a real-world environment before you introduce them to customers.

It’s thought the term originated with a 1970s TV commercial in which actor Lorne Green endorsed Alpo dog food by pointing out his own dogs eat it. Since then, companies large and small have adopted this...

Read More
0

It’s a win-win for Maryland small businesses: Lower taxes and cybersecurity

Every small company seeks to pay lower taxes to increase their profit margins on products and services that they provide. Now in Maryland that opportunity exists and with the added benefit of enhanced cybersecurity.

Read More
0

Valentine’s Day Brings Out the Catfish.

Valentines Day brings out the best (and worst) in people. As couples scramble to book their dinner reservations and grab the last bouquet of flowers, singles are swiping and clicking to find last minute love. Yet in the search for love, many online daters are finding scams and fraud instead.

Read More
0