Summit Tech Blog

Moving to a New Office? Don’t Tackle Internet Service Contracts Alone

By Kimberly Scolaro| September 11, 2017 |

Tags: Office relocation

If you have a cell phone, Internet, wireless, or cable service at home, you know the mind-numbing complexity of data plans, fees and service contracts. Multiply that several fold when it comes to moving your office's IT infrastructure.  

Read More
0

Government Warns of IRS Phishing Scam and Fake Hurricane Harvey Charities

IRS and FBI Scam

The government has issued two different alerts to warn the public about new email and Internet scams.

Read More
0

317,000 files encrypted. What do you do?

 It was Friday morning. The staff was trickling in, ready to wrap up the week's work, except for one problem.  They were locked out of the network. Everything on the server-- client documents, financial spreadsheets, media plans and analytics, graphics, production software, and the most critical problem, the project tracking software at the core of their day-to-day business—all locked and held...

Read More
0

9 Steps to Make Your Website More Resistant to Hackers

 

To  discourage a hacker, it helps to understand why they want to hack your site. It likely has  nothing to do with you or your business. Your website is just one of thousands they continually scan until they find a chink in the armor.

Read More
0

Summit's Favorite 4th of July Apps!

By Marjorie Valin| June 29, 2017 |

Tags: Mobile

Wherever You're Going or Whatever You're Doing this Holiday, There's an App For That!

We are ushering in the 4th of July this year with the first installment of "Summit's Favorite Apps"! We polled the team here for their recommendations and the result was a motley collection of fun, useful, helpful and quirky apps to share with friends and distract your kids. As they say on TV, this report...

Read More
0

You Can Reduce Risk or Respond to Threats

Read More
0

Hijacked! How a Nonprofit Website Became a Fake Pharmacy

(and Why They Didn’t Know It)

Several years ago, we did some IT work for a small nonprofit organization. It’s unlikely you would recognize their name unless you had reason to interact with them.

Last week our fabulous summer intern discovered something peculiar about their website. In typing the organization’s name into the address bar, their real site came up, but typing the name into a...

Read More
0

Video Conferencing Etiquette

Mind Your Manners

You can tell a lot about a work environment by its videoconference etiquette. How often have you been subjected to people trying to unobtrusively text, or worse, not even try to pretend they’re doing it? Then, there’s the woman joining in from home whose dog wants to join the meeting! Or the guy who never changed out of his pajama bottoms that morning only to find he has to...
Read More
0

“WannaCry” Ransomware Attack Variants Start to Emerge

The “WannaCry” ransomware attack last week was a cyber Pearl Harbor that should be viewed with alarm by every company. If you have an aging, unsupported Microsoft operating system or other IT vulnerabilities, you need to take precautions, as new variants of this threat continue to emerge.

Read More
0

Paul and Dante’s Excellent Chinese Adventure

By Paul Brophy| May 9, 2017 |

Tags: IT Services, cybersecurity

The next time you are stuck in traffic on the beltway, give thanks for the civility of it all. You have not experienced the true meaning of congestion until you visit China. I just returned from my first trip to China with Summit’s senior engineer, Dante Morgan. We spent a week in Shenzhen, a city in Guangdong Province, where Summit has a manufacturing client. I’ll get to that in a minute,...

Read More
0