Summit Tech Blog

Facebook, Third-Party Access and Implications for Business

Virtually all businesses have vendors who have vendors who have vendors.

Read More
0

Part I: Costs & Risks of Outdated Technology

You know that TV show, The Walking Dead, about the zombie apocalypse? Your organization may have unwittingly joined the ranks of the “zombie-net”—infected computers used by hackers to unleash attacks on a much larger scale. Organizations with outdated and obsolete hardware and software are responsible, to some extent, for the rise of the zombie-net, because they are easier for hackers to...

Read More
0

Cybersecurity Risk Management Recommendations for Manufacturing

Manufacturing businesses are behind the curve in updating their IT security, and hackers know it.  According to industry reports, cyber threats against manufacturers are at unprecedented levels, second only to healthcare.

Read More
0
1