Summit Business Technologies Blog

How Technology Has Changed the HVAC Business

When we think of high tech, most of us think of smart phones, applications, and Internet-powered services, but technology has revolutionized another industry most of us take for granted—the heating, ventilation and air conditioning systems (HVAC) that make the air around us comfortable, less humid and more energy efficient, with fewer pollutants, bacteria and odors.

Read More
0

Outsourced IT: the Value of a Second Opinion for Government Contractors and Nonprofits

You may love your doctor, but that doesn't mean you shouldn't seek a second opinion when a condition develops that is out of the ordinary. The same applies to your business technologies and IT operations, whether you're a government contractor or nonprofit.  Like medical tests, the results of a checkup can reveal hidden problems that could pose bigger problems later - as one company found...

Read More
0

Baltimore Construction Company Decides It's Time to Rethink IT

Case Study: The True Cost of Managing IT Yourself

The Company

This nationally recognized company has been in business for nearly 25 years, has 3 offices in different states, and 40 employees. The type of business they are in  requires powerful computers, AutoCAD plotters and large printers, plus a sizable investment in other office technologies. The company owner is semi-technical and...

Read More
0

A Cyberattack is Inevitable. Layered Security is the Best Defense.

Remember the 1990’s, when your new desktop computer came with Minesweeper, a full suite of productivity software – and an anti-virus program? Whether it was Symantec, McAfee or Norton, that icon on your desktop once meant that your office’s data and budding IT infrastructure was relatively safe and secure.

Read More
0

What does a Managed IT Services Provider Do?

Remember not too long ago when IT was regarded as a limited support function? In just two decades, technology has become the critical infrastructure that runs your business. As a result, it’s important that business owners and executives understand the best way to manage it.

Read More
0

The 7 Gifts of Managed Service Providers

Now Your IT Staff Can Take the Holidays Off!

You're busy this time of year. Holiday orders are coming in fast, you're trying to coordinate your own family plans, and you're also planning for the year ahead! You have employees to manage and when things are going well, it becomes easy to neglect your day-to-day IT maintenance. But could that lead to a high-stress holiday catastrophe? This is a...

Read More
0

317,000 files encrypted. What do you do?

 It was Friday morning. The staff was trickling in, ready to wrap up the week's work, except for one problem.  They were locked out of the network. Everything on the server-- client documents, financial spreadsheets, media plans and analytics, graphics, production software, and the most critical problem, the project tracking software at the core of their day-to-day business—all locked and held...

Read More
0

“WannaCry” Ransomware Attack Variants Start to Emerge

The “WannaCry” ransomware attack last week was a cyber Pearl Harbor that should be viewed with alarm by every company. If you have an aging, unsupported Microsoft operating system or other IT vulnerabilities, you need to take precautions, as new variants of this threat continue to emerge.

Read More
0

Adding Mobile Devices to your Organization's Acceptable Use Policy

By Larry Selleh| March 21, 2017 |

Tags: Managed IT, Managed Services

A Mobile Device Acceptable Use Policy (AUP) defines the standards, procedures, and restrictions for employees' use of their mobile devices such as cell phones, iPads, and tablets.  Since mobile devices have become standard business tools storing sensitive organizational information, they have become a popular way to defraud users and steal confidential business data.

Read More
0

Employee Security Awareness - Educating the Weakest Link (pt 4 of 4)

By Larry Selleh| March 16, 2017 |

Tags: Managed IT, Managed Services, Security

Part 4 of 4: How to Protect & Recover from a Ransomware Attack

In our previous three  blogs, we covered 5 Steps for an Effective Information Security Program,  Best Practices to Protect your Data, and Employing Effective Backup Strategies to Protect your DataThe final blog in our series about How to Protect and Recover from a Ransomware Attack will cover Employee Awareness Training, your...

Read More
0
1 2