Summit Tech Blog

Infographic: 5 Creepy Cyber Facts

Click here to download the PDF version

Read More
0

Baltimore Construction Company Decides It's Time to Rethink IT

Case Study: The True Cost of Managing IT Yourself

The Company

This nationally recognized company has been in business for nearly 25 years, has 3 offices in different states, and 40 employees. The type of business they are in  requires powerful computers, AutoCAD plotters and large printers, plus a sizable investment in other office technologies. The company owner is semi-technical and...

Read More
0

Finding the Right IT Security Company for your Business

Unless your organization is the last business on U.S. soil that does not require computers, applications, or the Internet, IT security has become your new cost of doing business. Reliance on technology has made IT security essential in keeping your organization free from disruption. 

Read More
0

5 Ways to Make Better IT Decisions: Use a Virtual CIO

 

Have you ever heard the phrase, “if it ain’t broke, don’t fix it?”  

In the evolving world of operating and information systems, that attitude can ultimately lead to disaster. For many small organizations, the limited IT staff or department is usually focused on the tactical issues. Fixing servers, troubleshooting phone systems, and maintaining websites are all time-consuming issues that...

Read More
0

2018 Amazon Prime Day: The Scams are About to Begin

All Day Shopping Means Your Office IT Network is at Risk

“Your order cannot be shipped…”

Read More
0

How Hackers are Using Your Address Book Against You

By Lee Snead| June 21, 2018 |

Tags: Security Awareness, Email, cybersecurity

D oes this sound familiar? A phone call out of the blue from a former co-worker, alarmed about an e-mail she said you sent her—only you didn’t.

 Janet, your former colleague, was clearly upset.  “I just got your email!Why are you sending me random links to these websites? I clicked the link and now my screen is filled with pop-ups that I can’t get rid of. I can’t use my browser at all anymore...

Read More
0

How do I tell if this email is from who it says it is from?

By Lee Snead| June 19, 2018 |

Tags: Email, cybersecurity, phishing, cyberattacks

When Nigerian Princes and fake FBI agents pop up in your inbox, it’s easy to spot the spam emails that plague us these days. However, it’s those authentic-looking emails from vendors, retailers, charitable causes etc. that make it hard to determine if they are the real deal or not.

Read More
0

How to Choose the Best Office Phone System

A Guide to Reduce the Time, Expense and Confusion 

If your office phone looks something like this, it’s probably time to upgrade, but buying a new phone system can be daunting. Just type in “office phone systems”, “phone systems for small business”, or “the best office phone systems” in Google. You will find more than 400 million choices, enough to convince you that your outdated phone system...

Read More
0

The Long Arm of Europe's Data Privacy and Protection Regulation

Are you prepared to meet the May 25th, 2018 requirements for the General Data Protection Regulation (GDPR)? This is a data protection and privacy law passed in the European Union, and applies to more than just organizations based in the EU. If your organization collects, stores, transfers, or uses the personal information of European Union Citizens (including employees, contractors, clients,...

Read More
0

Build it or Buy it?  Choosing Business Applications that Work for You

Your business is unique. That’s probably why you’re still in business. You offer something different that customers value. But with that uniqueness comes unique problems that you’ll have to solve. When this happens, you’ll have two options: Build a solution or buy a solution.

Read More
0