We're all guilty of moving away from actually printing pictures. The norm has become storing your memories in a folder on your device and taking things on the go. While it's nice to always have access to your pictures, what happens if you accidentally overwrite the file and you lose the picture forever? Sounds like you could be out of luck. Our IT expert Randy Moore joined the Guy Phillips Show for Tech Talk on KTRS last Friday to talk about the importance of securely backing up your personal data.
Read MoreKeeping up with the latest trends and staying ahead of the curve in technology can be difficult. It seems like we're inundated with messages almost daily about the "latest" and the "greatest" new pieces of technology. Relying on old technology and outdated methods can limit your productivity, make staying organized difficult, and leave you missing out on new opportunities. Not being on par with the latest technology can affect your business in more ways than one. There's no need to be feeling outdated with technology when there is so much available.
This is our list of the 4 ways old technology is hurting your business. The good news is, for each of these negative circumstances, there is a solution.
Read More
When we wrapped our last SumnerOne history lesson, we were just about to enter the new millennium. The growth SumnerOne experienced in the 1990's was the driving force behind all of the big changes that the 2000's and 2010's would hold for our company. It's safe to say that we didn't peak when the new millennium rolled around. We were just getting started.
10 Types of Ransomware Attacks and How to Protect Your Business
Ransomware is the leading cyber security threat in 2018. In a recent podcast, Hal Lonas, CTO of the security software provider Webroot, offered a succinct explanation of how ransomware has flipped the security threat paradigm on its ear. “It used to be that the bad guys wanted data because it was valuable to them,” he said. “With ransomware, they’re essentially asking: ‘your data isn’t valuable to me, but how much is worth to you?’ It’s scary how smart it is.” New types of ransomware will continue to surface. Hackers are constantly modifying ransomware code to evade detection by defense technologies, such as security software. This year, we’ve witnessed a surge in “polymorphic” malware, which is malware that changes automatically to appear unique to different endpoints. Security software often fails to discover these variants. To decrypt files, hackers typically demand a ransom in the form of bitcoin or other cryptocurrencies.
Read MoreIn 2004, the National Cyber Security Alliance (NCSA) and the U.S. Department of Homeland Security launched National Cyber Security Awareness Month (NCSAM) to educate Americans about online security. NCSAM is observed each October and is an active effort to educate end users about the different areas of cyber security including safety at home, work, and overall best practices. Online security isn't the job of just one person, it's a collective effort for each person that uses the internet. The SumnerOne's Solutions Team has worked together to create a great month's worth of tips and education to spread awareness.
Read MoreIt's Monday, and you're getting back into the office from your week-long vacation with the family. The second you sit down at your desk, you see an email from your wife. It appears to be a link sent via a Dropbox account and you assume, amidst your morning haze, that the link contains the pictures from your vacation. You click on the link and then… it happens. Your computer becomes corrupted. You've become the latest victim of a Ransomware attack. Well, what happens next?
Read MoreWhen we ended our last SumnerOne history lesson, the year was 1955 and Bud Sumner had moved back to St. Louis and purchased A.B. Dick Products of St. Louis, Inc. The decision to move back to St. Louis proved to be strategic and smart decision for Bud. More than 60 years later, our headquarters is based in St. Louis.
Read More