(and Why They Didn’t Know It)
Several years ago, we did some IT work for a small nonprofit organization. It’s unlikely you would recognize their name unless you had reason to interact with them.
Last week our fabulous summer intern discovered something peculiar about their website. In typing the organization’s name into the address bar, their real site came up, but typing the name into a...
Mind Your MannersYou can tell a lot about a work environment by its videoconference etiquette. How often have you been subjected to people trying to unobtrusively text, or worse, not even try to pretend they’re doing it? Then, there’s the woman joining in from home whose dog wants to join the meeting! Or the guy who never changed out of his pajama bottoms that morning only to find he has to...
The “WannaCry” ransomware attack last week was a cyber Pearl Harbor that should be viewed with alarm by every company. If you have an aging, unsupported Microsoft operating system or other IT vulnerabilities, you need to take precautions, as new variants of this threat continue to emerge.
The next time you are stuck in traffic on the beltway, give thanks for the civility of it all. You have not experienced the true meaning of congestion until you visit China. I just returned from my first trip to China with Summit’s senior engineer, Dante Morgan. We spent a week in Shenzhen, a city in Guangdong Province, where Summit has a manufacturing client. I’ll get to that in a minute,...
Manufacturing businesses are behind the curve in updating their IT security, and hackers know it. According to industry reports, cyber threats against manufacturers are at unprecedented levels, second only to healthcare.
To: All Employees
From: Cyber Crooks Inc.
Re: Thanks. We couldn’t do it without you
As hackers, our sincere thanks for ignoring even the most basic security awareness practices. Thank you for not changing your password, clicking on that bogus catalogue link, and emailing your kids your ATM number and password. We appreciate your support.
IT Nightmares for Small to Medium Sized Businesses
Technology is an integral part of business today, potentially leaving networks, personal information management (PIM) and intellectual property vulnerable. Here are our top five cost-effective technology recommendations to protect your business:
A Mobile Device Acceptable Use Policy (AUP) defines the standards, procedures, and restrictions for employees' use of their mobile devices such as cell phones, iPads, and tablets. Since mobile devices have become standard business tools storing sensitive organizational information, they have become a popular way to defraud users and steal confidential business data.
Part 4 of 4: How to Protect & Recover from a Ransomware Attack
In our previous three blogs, we covered 5 Steps for an Effective Information Security Program, Best Practices to Protect your Data, and Employing Effective Backup Strategies to Protect your Data. The final blog in our series about How to Protect and Recover from a Ransomware Attack will cover Employee Awareness Training, your...