Summit Business Technologies Blog

Welcome to Halloween in the Cyber Age.

The perfect time for hackers to catch us off guard.

And so it begins. The countdown to Halloween in the age of cyber. Ghouls and goblins are joined by hackers and attackers with a torrent of Halloween-themed phishing emails and online scams.

Read More
0

How Technology Has Changed the HVAC Business

When we think of high tech, most of us think of smart phones, applications, and Internet-powered services, but technology has revolutionized another industry most of us take for granted—the heating, ventilation and air conditioning systems (HVAC) that make the air around us comfortable, less humid and more energy efficient, with fewer pollutants, bacteria and odors.

Read More
0

It’s Q4: Welcome to Cyber Hell

If Q4 isn’t stressful enough for organizations, cyber criminals will make sure it is. The near constant occurrence of cyberattacks ramps up even more in advance of Halloween and the holiday shopping spree.

Read More
0

Outsourced IT: the Value of a Second Opinion for Government Contractors and Nonprofits

You may love your doctor, but that doesn't mean you shouldn't seek a second opinion when a condition develops that is out of the ordinary. The same applies to your business technologies and IT operations, whether you're a government contractor or nonprofit.  Like medical tests, the results of a checkup can reveal hidden problems that could pose bigger problems later - as one company found...

Read More
0

What Should I Be Spending on Technology and Security?

An IT Cost Comparison for Small Business and Nonprofits

We manage IT and security for close to 200 businesses and nonprofits in Maryland, DC and VA, but for the purpose of this article, we have no horse in this race. We are simply trying to answer the question we get with increasing frequency: “how much should I budget for IT and security?”

Read More
0

2019 Amazon Prime Day Offers: Real or Fake?

Amazon Prime Day 2019 is nearly upon us, and with it, the annual uptick in cyber threats.  The shopping juggernaut starts at 12a.m. PST, Monday, July 15 and ends at 11:59 PST, Tuesday July 16th.  The blitz of promotional emails, online ads, and blogs linked to special deals are not only irresistible to shoppers, but to hackers who feed on high emotions and a sense of urgency.

Here’s the...

Read More
0

Three Consultants No Business Can Be Without

There are two professionals every business needs to avoid preventable risks: an attorney and an accountant. For businesses and nonprofits alike, add cybersecurity consultant to this crucial advisory group.

Read More
0

HR Departments Targeted with Payroll Diversion Scams

Is your HR department trained to combat cyber-crime?

A wide-spread fraud scheme has been making a comeback in recent months and it's specifically targeting the department responsible for making sure employees are paid on-time, every time. The IRS warns that direct deposit and wire transfer scams are becoming more prolific and are bypassing even the most sophisticated technical controls....

Read More
0

Your computer is wiped clean. Get back up with backups.

Imagine walking into the office on a Monday morning and seeing that your computer has nothing on it. That weeks’ worth of complex excel calculations? Gone. Your client project that needs to get out the door today? Disappeared. The long list of unread emails? Poof. (Even though you might not be so upset about that).

Read More
0

Dogfooding: Why We Use Our IT Products First

Ever heard of “eating your own dog food” or "dogfooding” for short? The expression means using your own products to test them in a real-world environment before you introduce them to customers.

It’s thought the term originated with a 1970s TV commercial in which actor Lorne Green endorsed Alpo dog food by pointing out his own dogs eat it. Since then, companies large and small have adopted this...

Read More
0
1 2 3