Training is Crucial to Establishing a Security Strategy

How Often Should You Train and Evaluate Your Team in Cybersecurity Practices? Security threats are all over the place these days, so you need to make sure that your security is covering as much as possible. You can certainly implement strong security measures that can resolve many of the common issues you might encounter, but without a solid understanding on your staff?s part, they won?t be as useful as they can be. Your team should be prepared to handle cybersecurity events in a way that doesn?t risk your company?s data infrastructure and network integrity. Here are some ways you can make sure your cybersecurity training keeps up with this expectation. Regularity How often do you share training or security information with your staff? The frequency at which you do this can make or break your experience. If you only meet to discuss security measures once a year, your staff will not have the knowledge or experience to apply their training as often as it must be. More frequent training can be more effective for keeping your network security in tip-top shape, and informing your team periodically throughout the year can help them do their jobs more effectively. Reinforcement Reinforcement in particular means using what is learned during these training sessions and applying it to a real-life situation. People tend to learn better when they are shown how to do something in a hands-on fashion rather than being told what to do. If you simulate cyberattacks in real life, you can then accurately test your employees? abilities to react to them. How Often Should You Train, and Test, Your Team? Proper security training is something that is reinforced periodically throughout your employees? time at the company, not a one-and-done event that happens upon hire. Remember, with today?s ever-changing threat landscape, you will want to be as prepared as possible. Failing to do so is putting your organization at risk for no good reason. White Mountain IT Services can help you take your organization?s network security as seriously as it must be taken. We can help you establish powerful security standards and safeguards coupled with the security training needed to understand them. To learn more, reach out to us at (603) 889-0800.

Best Practices for Protecting Your Mobile Devices While Traveling

Keep Your Phone Locked and Protected You might know some people who don?t lock their smartphones, and it?s a huge mistake to leave something so simple out of your mobile device travel strategy. What would happen if you were to lose your device? What if it were stolen by someone hoping to make a quick buck off your device or the data it holds? We recommend using multi-factor authentication for your phone, including a passcode and a biometric measure of some kind. In fact, you should be using multi-factor authentication for just about any device or account where it?s available. Use a Virtual Private Network Businesses need to keep connected to a wireless network in order to stay connected to their home base, but the problem is that a lot of the wireless connections out there are unsecured and dangerous for devices with sensitive information on them. When you use a virtual private network, you can encrypt data that is sent to and from your device, allowing for the secure transmission of information while out of the office. Turn Off Wi-Fi and Bluetooth When Not in Use Many people tend to keep their Wi-Fi and Bluetooth enabled at all times, even when they are not actively being used. This is dangerous, as devices can automatically connect to networks that might be considered risky. We recommend just disabling these connections when not in use. Your battery will also last longer, as your devices will not be actively seeking out connections while out and about. Use a Mobile Device Management System Any number of issues could occur when you are on the road. Even if you just set down your device for a moment, someone could pick it up and walk away with it, putting the data on it at risk. A mobile device management tool can help mitigate these dangers somewhat. It won?t help you get your device back, but it will protect the data stored on it in the event of theft. Your mobile device management solution should include the whitelisting and blacklisting of applications, remote wiping of lost or stolen devices, and device location services. White Mountain IT Services can work with your business to ensure that mobile devices are not the reason why your employees fear traveling. To learn more about how we can help you stay safe while on the go, reach out to us at (603) 889-0800.

Tip of the Week: How to Catch Potential Hacks

Monitor Failed Password Attempts Nobody likes dealing with passwords, this much is beyond doubt, but it also must be said that they are an essential element in your business? security protections. This is because they not only help to prevent unwelcome access to your resources, they can also help you to identify if you are actively being targeted? particularly while you have remote employees accessing your network. Here?s the crux of the issue: devices that have remote desktop protocols enabled on them (like the ones your remote users would have) are very easy for attackers to find, and then target. Such devices are commonly targeted by brute force attacks. In such an attack, a hacker will basically spam a password requirement with every possible option until the correct password is found. When your remote protocols are properly configured, too many failed password attempts would lock down the device and send you a notification to let you know that so many failed attempts were just made. At that point, you could reach out to the user and confirm that they were simply having a problem typing in their password correctly, and that it?s okay to let them wait until the device allows them to log in again. However, if the user wasn?t having any such problems, you would know that their credentials may have been breached. Without this kind of oversight, however, a brute force attack could potentially go on and on with no warning to you that you were under attack. Keep an Eye on Your Traffic While experienced hackers are able to hide their location to avoid raising suspicion, there are many times that they neglect to do so. Maybe a hacker lacks the technical skill necessary, or the attack is so broadly waged that they just don?t bother covering their tracks. This is precisely why it is so crucial that you keep a close watch over your system and its logs so that you can spot and investigate any out-of-place activity. For instance, if your technology has never interfaced with a server in a given country, but now regularly contacts a domain that is sourced there, you should see it as a warning of a serious potential security issue. Actively Make Things More Challenging for Cybercriminals Here?s the thing: the more difficult you make it for a cybercriminal to gain access to your network, the less likely it is that one will manage to do so. There are various ways to accomplish this. For example, in terms of your remote desktop protocols, you should customize the configuration you use rather than relying on the default. Password timeouts and two-factor authentication are wise to enforce, as are access controls on your internal resources. Cumulatively, these kinds of protections will help keep your business much more secure than it would be otherwise. Looking for more assistance with your business? security? Reach out to us. We have experience in implementing the kind of protections that modern businesses need to survive. Find out what we can do for you by calling (603) 889-0800 today.

Tips to Find a Reliable Printer and Copier Maintenance Provider

Reliability A lot of businesses need to print little things, and many have begun to move to a more paperless environment. Then there are some businesses that absolutely rely on their printers and copiers. For these companies, finding a maintenance solution is difficult. The first variable any business owner or decision maker should consider is the availability of the maintenance provider. Printers are notorious for having maintenance issues so being able to keep lines of communication open is essential to ensure that you get the service you need when you need it.  Expertise This variable is a must. A company that fixes copiers and printers needs to have technicians on staff that are proficient in fixing copiers and printers; it?s that simple. Shockingly, there are companies that will advertise that they offer printer and copier maintenance services, but when it comes down to it, there is no experience doing so, and that will substantially increase the cost, not only for the service, but also for the time your machines remain down.  Dedication For any maintenance provider, time is money, but for whatever reason some companies don?t act like it. You will want a provider that does a lot of the heavy lifting by monitoring systems remotely. Printers and copiers don?t always malfunction on the hardware side, but when they do, a solid maintenance provider has the part you need in stock so that your printer or copier isn?t down for more than a few hours.  Overall Value Printer maintenance can get expensive. That?s why it is important to find companies that can provide you with the value you need to not only keep your printers and copiers in operational order, but also extend beyond that so that you can justify the growing expense of maintenance for these machines. At White Mountain IT Services, we offer comprehensive managed IT services that can help you get the IT support you need, including for your copiers and printers. If you would like more information about copier and printer support or what it takes to keep your business? technology up and working for you, give us a call today at (603) 889-0800.

Vulnerability Leads to the Deletion of All Data on My Book NAS Devices

The Western Digital My Book NAS device gives users the ability to remotely access their files, even if the NAS device is secured with a firewall or router. Essentially it is a consumer-based external hard drive that you could potentially access from outside your home network. Bleeping Computer reports that some users cannot access their devices due to what appears to be a factory reset, and they received an ?Invalid Password? notification upon login. Some users have tried using the default login credentials, too, but to no avail.  After a little digging on the users? end, they discovered that their devices received a remote command to perform a factory reset. Bleeping Computer calls this attack an odd one as far as remote attacks go, mostly because the device targeted is secured behind a firewall and communications funnel through the My Book Live cloud servers. This has led some users to believe that the Western Digital servers were hacked, but it is odd that the extent of the damage is only deleted files rather than installed ransomware or other threats. Although Western Digital is investigating the attack, Bleeping Computer does detail a statement issued by the company, stating the following: ?If you own a WD My Book Live NAS device, Western Digital strongly recommends that you disconnect the device from the Internet. ?At this time, we recommend you disconnect your My Book Live and My Book Live Duo from the Internet to protect your data on the device,? Western Digital said in an advisory.? These WD My Book Live Devices have not received updates since 2015, so vulnerabilities are not entirely unexpected. However, this is more or less a wakeup call for those who have been considering an upgrade for the device. In general, you don?t want to utilize devices that are not actively being supported by the manufacturer, as failing to receive said security updates could result in situations like the one we?ve detailed above. You should also make sure that you are deploying said updates as they are released, as not doing so is the equivalent of using unsupported technology solutions. Remember, it is your responsibility to protect your data! It?s also imperative that you always store all of your important data on at least two separate devices, or even three for most businesses. Since the device in this case was an external hard drive, hopefully the majority of users were using it as a backup, but we?re afraid that isn?t always going to be the case. Don?t rely on a single drive to store your data! Need a Hand with Updates and Maintenance? If your business is ready to start taking its technology updates seriously, White Mountain IT Services can help you deploy updates or potentially even upgrade to new hardware to minimize the odds of security issues arising. To learn more about how we can help you keep your infrastructure as secure as possible, give us a call at (603) 889-0800.