Summit Tech Blog

You Can Reduce Risk or Respond to Threats

Read More
0

Hijacked! How a Nonprofit Website Became a Fake Pharmacy

(and Why They Didn’t Know It)

Several years ago, we did some IT work for a small nonprofit organization. It’s unlikely you would recognize their name unless you had reason to interact with them.

Last week our fabulous summer intern discovered something peculiar about their website. In typing the organization’s name into the address bar, their real site came up, but typing the name into a...

Read More
0

Video Conferencing Etiquette

Mind Your Manners

You can tell a lot about a work environment by its videoconference etiquette. How often have you been subjected to people trying to unobtrusively text, or worse, not even try to pretend they’re doing it? Then, there’s the woman joining in from home whose dog wants to join the meeting! Or the guy who never changed out of his pajama bottoms that morning only to find he has to...
Read More
0

“WannaCry” Ransomware Attack Variants Start to Emerge

The “WannaCry” ransomware attack last week was a cyber Pearl Harbor that should be viewed with alarm by every company. If you have an aging, unsupported Microsoft operating system or other IT vulnerabilities, you need to take precautions, as new variants of this threat continue to emerge.

Read More
0

Paul and Dante’s Excellent Chinese Adventure

By Paul Brophy| May 9, 2017 |

Tags: IT Services, cybersecurity

The next time you are stuck in traffic on the beltway, give thanks for the civility of it all. You have not experienced the true meaning of congestion until you visit China. I just returned from my first trip to China with Summit’s senior engineer, Dante Morgan. We spent a week in Shenzhen, a city in Guangdong Province, where Summit has a manufacturing client. I’ll get to that in a minute,...

Read More
0

Cybersecurity Risk Management Recommendations for Manufacturing

Manufacturing businesses are behind the curve in updating their IT security, and hackers know it.  According to industry reports, cyber threats against manufacturers are at unprecedented levels, second only to healthcare.

Read More
0

Security Awareness: Hackers Like Businesses of Every Size

By Michael Cohn| April 11, 2017 |

Tags: Security Awareness

MEMO

  To:  All Employees

From:  Cyber Crooks Inc.

 Re:  Thanks. We couldn’t do it without you

 As hackers, our sincere thanks for ignoring even the most basic security awareness practices. Thank you for not changing your password, clicking on that bogus catalogue link, and emailing your kids your ATM number and password. We appreciate your support.

Read More
0

5 Technology Pitfalls for Businesses

IT Nightmares for Small to Medium Sized Businesses

Technology is an integral part of business today, potentially leaving networks, personal information management (PIM) and intellectual property vulnerable.  Here are our top five cost-effective technology recommendations to protect your business:

Read More
0

Adding Mobile Devices to your Organization's Acceptable Use Policy

By Larry Selleh| March 21, 2017 |

Tags: Managed IT, Managed Services

A Mobile Device Acceptable Use Policy (AUP) defines the standards, procedures, and restrictions for employees' use of their mobile devices such as cell phones, iPads, and tablets.  Since mobile devices have become standard business tools storing sensitive organizational information, they have become a popular way to defraud users and steal confidential business data.

Read More
0

Employee Security Awareness - Educating the Weakest Link (pt 4 of 4)

By Larry Selleh| March 16, 2017 |

Tags: Managed IT, Managed Services, Security

Part 4 of 4: How to Protect & Recover from a Ransomware Attack

In our previous three  blogs, we covered 5 Steps for an Effective Information Security Program,  Best Practices to Protect your Data, and Employing Effective Backup Strategies to Protect your DataThe final blog in our series about How to Protect and Recover from a Ransomware Attack will cover Employee Awareness Training, your...

Read More
0