Summit Tech Blog

Dogfooding: Why We Use Our IT Products First

Ever heard of “eating your own dog food” or "dogfooding” for short? The expression means using your own products to test them in a real-world environment before you introduce them to customers.

It’s thought the term originated with a 1970s TV commercial in which actor Lorne Green endorsed Alpo dog food by pointing out his own dogs eat it. Since then, companies large and small have adopted this...

Read More
0

5 Ways to Make Better IT Decisions: Use a Virtual CIO

 

Have you ever heard the phrase, “if it ain’t broke, don’t fix it?”  

In the evolving world of operating and information systems, that attitude can ultimately lead to disaster. For many small organizations, the limited IT staff or department is usually focused on the tactical issues. Fixing servers, troubleshooting phone systems, and maintaining websites are all time-consuming issues that...

Read More
0

What does a Managed IT Services Provider Do?

Remember not too long ago when IT was regarded as a limited support function? In just two decades, technology has become the critical infrastructure that runs your business. As a result, it’s important that business owners and executives understand the best way to manage it.

Read More
0

The 7 Gifts of Managed Service Providers

Now Your IT Staff Can Take the Holidays Off!

You're busy this time of year. Holiday orders are coming in fast, you're trying to coordinate your own family plans, and you're also planning for the year ahead! You have employees to manage and when things are going well, it becomes easy to neglect your day-to-day IT maintenance. But could that lead to a high-stress holiday catastrophe? This is a...

Read More
0

Part II: How to Budget for Information Technology

Unless you have a dedicated experienced IT team with time to do more than troubleshoot employee issues, you may not have the in-house capacity or expertise to know how to go about budgeting for technology.

Like every business decision, there are tradeoffs. Do you hold on to older equipment and just pay more to maintain it, or invest in newer, more efficient technology? How do you know when...

Read More
0

Part I: Costs & Risks of Outdated Technology

You know that TV show, The Walking Dead, about the zombie apocalypse? Your organization may have unwittingly joined the ranks of the “zombie-net”—infected computers used by hackers to unleash attacks on a much larger scale. Organizations with outdated and obsolete hardware and software are responsible, to some extent, for the rise of the zombie-net, because they are easier for hackers to...

Read More
0

5 Technology Pitfalls for Businesses

IT Nightmares for Small to Medium Sized Businesses

Technology is an integral part of business today, potentially leaving networks, personal information management (PIM) and intellectual property vulnerable.  Here are our top five cost-effective technology recommendations to protect your business:

Read More
0

Adding Mobile Devices to your Organization's Acceptable Use Policy

By Larry Selleh| March 21, 2017 |

Tags: Managed IT, Managed Services

A Mobile Device Acceptable Use Policy (AUP) defines the standards, procedures, and restrictions for employees' use of their mobile devices such as cell phones, iPads, and tablets.  Since mobile devices have become standard business tools storing sensitive organizational information, they have become a popular way to defraud users and steal confidential business data.

Read More
0

Employee Security Awareness - Educating the Weakest Link (pt 4 of 4)

By Larry Selleh| March 16, 2017 |

Tags: Managed IT, Managed Services, Security

Part 4 of 4: How to Protect & Recover from a Ransomware Attack

In our previous three  blogs, we covered 5 Steps for an Effective Information Security Program,  Best Practices to Protect your Data, and Employing Effective Backup Strategies to Protect your DataThe final blog in our series about How to Protect and Recover from a Ransomware Attack will cover Employee Awareness Training, your...

Read More
0

Protecting Your Data with an Effective Backup Strategy (pt 3 of 4) | How to Protect & Recover from Ransomware Attack

By Larry Selleh| March 14, 2017 |

Tags: Managed IT, Security

Part 3 of 4: How to Protect & Recover from Ransomware Attack

In our previous two blogs, we covered creating and maintaining an effective Information Security program as well as Best Practices for Protecting Data. Here, we will cover employing Effective Backup Strategies.

Read More
0
1 2