Summit Tech Blog

Baltimore Construction Company Decides It's Time to Rethink IT

Case Study: The True Cost of Managing IT Yourself

The Company

This nationally recognized company has been in business for nearly 25 years, has 3 offices in different states, and 40 employees. The type of business they are in  requires powerful computers, AutoCAD plotters and large printers, plus a sizable investment in other office technologies. The company owner is semi-technical and...

Read More
0

A Cyberattack is Inevitable. Layered Security is the Best Defense.

Remember the 1990’s, when your new desktop computer came with Minesweeper, a full suite of productivity software – and an anti-virus program? Whether it was Symantec, McAfee or Norton, that icon on your desktop once meant that your office’s data and budding IT infrastructure was relatively safe and secure.

Read More
0

What does a Managed IT Services Provider Do?

Remember not too long ago when IT was regarded as a limited support function? In just two decades, technology has become the critical infrastructure that runs your business. As a result, it’s important that business owners and executives understand the best way to manage it.

Read More
0

The 7 Gifts of Managed Service Providers

Now Your IT Staff Can Take the Holidays Off!

You're busy this time of year. Holiday orders are coming in fast, you're trying to coordinate your own family plans, and you're also planning for the year ahead! You have employees to manage and when things are going well, it becomes easy to neglect your day-to-day IT maintenance. But could that lead to a high-stress holiday catastrophe? This is a...

Read More
0

317,000 files encrypted. What do you do?

 It was Friday morning. The staff was trickling in, ready to wrap up the week's work, except for one problem.  They were locked out of the network. Everything on the server-- client documents, financial spreadsheets, media plans and analytics, graphics, production software, and the most critical problem, the project tracking software at the core of their day-to-day business—all locked and held...

Read More
0

“WannaCry” Ransomware Attack Variants Start to Emerge

The “WannaCry” ransomware attack last week was a cyber Pearl Harbor that should be viewed with alarm by every company. If you have an aging, unsupported Microsoft operating system or other IT vulnerabilities, you need to take precautions, as new variants of this threat continue to emerge.

Read More
0

Adding Mobile Devices to your Organization's Acceptable Use Policy

By Larry Selleh| March 21, 2017 |

Tags: Managed IT, Managed Services

A Mobile Device Acceptable Use Policy (AUP) defines the standards, procedures, and restrictions for employees' use of their mobile devices such as cell phones, iPads, and tablets.  Since mobile devices have become standard business tools storing sensitive organizational information, they have become a popular way to defraud users and steal confidential business data.

Read More
0

Employee Security Awareness - Educating the Weakest Link (pt 4 of 4)

By Larry Selleh| March 16, 2017 |

Tags: Managed IT, Managed Services, Security

Part 4 of 4: How to Protect & Recover from a Ransomware Attack

In our previous three  blogs, we covered 5 Steps for an Effective Information Security Program,  Best Practices to Protect your Data, and Employing Effective Backup Strategies to Protect your DataThe final blog in our series about How to Protect and Recover from a Ransomware Attack will cover Employee Awareness Training, your...

Read More
0

Best Practices to Protect your Data (pt. 2 of 4) | How to Protect & Recover from Ransomware Attack

By Larry Selleh| March 9, 2017 |

Tags: Managed IT, Managed Services, Security

Part 2 of 4: How to Protect & Recover from a Ransomware Attack

In our previous blog, we covered creating and maintaining an effective information security program.   Here, we will cover protecting data with technology’s best practices.  

Read More
0

5 Steps for an Effective Information Security Program (pt. 1 of 4) | How to Protect & Recover from Ransomware Attack

Part 1 of 4: How to Protect & Recover from a Ransomware Attack

The number of ransomware attacks targeting nonprofits, healthcare and all other organizations have rapidly increased.  They have  become a simple and direct source of revenue for cybercriminals and unfortunately, it’s very lucrative for them to hold your data for ransom.   When organizations experience a cyberattack, many lose...

Read More
0
1 2