Summit Business Technologies Blog

Government Warns of IRS Phishing Scam and Fake Hurricane Harvey Charities

IRS and FBI Scam

The government has issued two different alerts to warn the public about new email and Internet scams.

Read More
0

You Can Reduce Risk or Respond to Threats

Read More
0

5 Technology Pitfalls for Businesses

IT Nightmares for Small to Medium Sized Businesses

Technology is an integral part of business today, potentially leaving networks, personal information management (PIM) and intellectual property vulnerable.  Here are our top five cost-effective technology recommendations to protect your business:

Read More
0

Employee Security Awareness - Educating the Weakest Link (pt 4 of 4)

By Larry Selleh| March 16, 2017 |

Tags: Managed IT, Managed Services, Security

Part 4 of 4: How to Protect & Recover from a Ransomware Attack

In our previous three  blogs, we covered 5 Steps for an Effective Information Security Program,  Best Practices to Protect your Data, and Employing Effective Backup Strategies to Protect your DataThe final blog in our series about How to Protect and Recover from a Ransomware Attack will cover Employee Awareness Training, your...

Read More
0

Protecting Your Data with an Effective Backup Strategy (pt 3 of 4) | How to Protect & Recover from Ransomware Attack

By Larry Selleh| March 14, 2017 |

Tags: Managed IT, Security

Part 3 of 4: How to Protect & Recover from Ransomware Attack

In our previous two blogs, we covered creating and maintaining an effective Information Security program as well as Best Practices for Protecting Data. Here, we will cover employing Effective Backup Strategies.

Read More
0

Best Practices to Protect your Data (pt. 2 of 4) | How to Protect & Recover from Ransomware Attack

By Larry Selleh| March 9, 2017 |

Tags: Managed IT, Managed Services, Security

Part 2 of 4: How to Protect & Recover from a Ransomware Attack

In our previous blog, we covered creating and maintaining an effective information security program.   Here, we will cover protecting data with technology’s best practices.  

Read More
0

5 Steps for an Effective Information Security Program (pt. 1 of 4) | How to Protect & Recover from Ransomware Attack

Part 1 of 4: How to Protect & Recover from a Ransomware Attack

The number of ransomware attacks targeting nonprofits, healthcare and all other organizations have rapidly increased.  They have  become a simple and direct source of revenue for cybercriminals and unfortunately, it’s very lucrative for them to hold your data for ransom.   When organizations experience a cyberattack, many lose...

Read More
0

Tips for Creating Strong, Secure Passwords

By Marjorie Valin| May 19, 2016 |

Tags: IT Services, IT support, News, Security, Tips

 Changing your passwords regularly is a habit that we should all adopt! With the amount of hacking that is taking place by bots and computers every minute of every day, having a password that is hard to crack and that changes periodically is the best defense to keep your data safe! - the best defense to keep you safe.

Read More
0

Hurricane Preparedness - Are You Ready?

You can't control the weather. But you sure can take the right steps to prepare for the worst, especially when you're running a business.

Read More
0

The Most Common Wi-Fi Problems for Small Businesses

The most common Wi-Fi problems for small to medium size businesses are often the ones that are tolerated and therefore not addressed in a timely manner. “I have a really slow connection in the office” and “The range of our wireless signal in the office is too small” are some of the more frequent complaints we hear. Another customer once told us “Good luck trying to get a wireless signal in the...

Read More
0