Recent Blog Posts

Understanding the Different Kinds of Blockchain and Their Purpose

The blockchain first gave us a look at what the benefits of a decentralized ledger could be, and the many ways they could be put into practice. However, some of the aspects of Bitcoin (namely, how much energy it requires to operate, amongst other shortcomings) made that form of blockchain a poor choice for many businesses and their needs. While we?ll discuss it in more detail momentarily, this is because Bitcoin operates on the public blockchain? something that obviously can?t be used to store sensitive information or proprietary data. As such, other forms quickly emerged to meet these needs, so there are for all intents and purposes now four varieties of blockchain to consider. Public Blockchain The public blockchain is the most open form of blockchain, where anyone can participate in transactions and maintain their own copy of the ledger so long as they can access the Internet. This was the first form of blockchain, as we mentioned, and commonly powers the assorted cryptocurrencies that suddenly became all the rage to talk about. Other potential uses for the public blockchain involve voting and fundraising, thanks to the openness of the system as a whole. This openness is one of the public blockchain?s greatest advantages, along with its inherent transparency and trust-based nature. However, the public blockchain does have a few issues. For one, it can only register transactions at a very slow rate. This compounds into a second disadvantage: the fact that the blockchain network itself is limited in scope, simply to prevent the rate of transactions dipping down further. Private Blockchain A private blockchain is very similar to the public blockchain, with a few key differences setting it apart and resulting in a different sample of advantages and disadvantages, alike. Instead of being accessible by anyone, a private blockchain is kept in a closed network and maintained by a singular entity?typically, a business that wants to see a similar level of trust and security within its own operations?requiring permissions to be extended to any participants. Apart from this more centralized nature, the private blockchain is made in very much the same way that the public one is. While adding this level of centralization to the blockchain makes the entire system much more efficient, it also requires the sacrifice of some of its security. This is important to consider as a private blockchain is often used for key internal processes like supply chain management, internal voting, and asset ownership. Hybrid Blockchain Combining public and private blockchains, a business can take advantage of the capabilities that each presents in concert. These capabilities make it possible to connect to public networks while maintaining privacy, with customizable rules allowing an organization to keep its data close to the chest. For all these advantages, there are some drawbacks to hybrid blockchains?namely, the fact that the hybrid blockchain lacks some of the transparency of other blockchains, and there is no prerogative for a business to undergo the extensive and challenging adoption process. However, there are still effective use cases in real estate, retail, and various other markets that are beholden to steep regulations. Federated Blockchain Finally, we come to federated blockchains. Similar to the hybrid blockchain, the federated blockchain combines the beneficial features present in both the public and private blockchains. This makes some records […]

Planning Future IT Investments Can Get Tricky

You Will Likely Have to Make Cuts While technology has helped millions of businesses from all over the world stay relevant during the pandemic, we?re seeing that IT is one of the elements of a business that is seeing the most obvious cuts, even as more technology is needed. This is not a good situation. Most businesses have to cut some costs just to make everything work, of course, but analysts are saying that after things ease back into normalcy, the remaining recession will actually cut IT expenses by two or more percent for the next year. To sustain profitability businesses will need to free up as much capital as they can, and many businesses?including ones that operate in the hospitality and manufacturing industries?are already seeing massive declines in revenue. This suggests that their 2021 technology investments will probably be less than their 2019 spends.  Depending on your situation, you may be using your capital to fill in any potential holes in your workforce and your operational capabilities, and while IT can help you make some headway there, ultimately new technologies aren?t going to be as in demand in the near future. How Managed IT Services Can Help If your business is looking to make some cuts to your operational technology, choosing the right IT service provider can be a great solution. Not only will you be able to maintain your current IT infrastructure, but we can help you find and implement the solutions you are going to need to get through this situation.  Let?s start with the remote workforce. Before the pandemic only around eight percent of full-time workers were able to have the flexibility to consistently work from home. With states mandating people stay at home during this situation, telework has exploded. If your company was one of the few that provided telework options before the stay-at-home orders hit, you probably have had a much easier transition to supporting a completely remote workforce. Most businesses, however, didn?t, and with the vaccine rollout, you are beginning to see companies going to more hybrid employment strategies.  The challenges of supporting a staff that works remotely aren?t necessarily the same as you would have envisioned. Many businesses didn?t provide the work-from-home flexibility out of the fear that they would lose substantial amounts of productivity (and therefore revenue). While this is still somewhat of a concern, most workers that work remotely understand what their responsibilities are and go above and beyond to ensure that they aren?t the weak link. It’s been said multiple times over the past several weeks, but if you have an employee that does not work well from home, it’s a pretty good bet that he/she wasn’t working that well from the office, either.  One consideration that does have to be made if you are going to continue to offer remote work after the pandemic is over, however, is how to secure your endpoints and data-in-transit. If this wasn?t already a main consideration of your disaster recovery policy, it has to be now. Working with remote access and virtual private networks can go a long way toward mitigating the risk your company will see. White Mountain IT Services can quickly help you find solutions that will not only keep your data safe and protect your existing infrastructure, it can provide you with […]

Do We Really Need a Computer Feature to Tell Us We Need a Break?

Microsoft?s Solution for Anxiety Filed in October of 2019, and finally being published a short time ago (as of this writing), Microsoft?s patent describes their ?Emotion Detection From Contextual Signals For Surfacing Wellness Insights? technology. By collecting and compiling data from assorted sources, including biometrics from fitness trackers and smart watches and usage data from Microsoft?s Office software, an employee ?anxiety score? can be generated and alert the employee of their emotional change. The platform would then provide recommendations to help them wind back down, like taking a break or a brief walk. For instance, let?s say that James has an important meeting coming up, and is starting to feel anxious about it. This anxiety could manifest itself in a few different ways?perhaps increased typos and spelling errors are popping up in the emails he?s composing, or the email is taking longer than it generally would to write up. If James? behaviors suggest that he?s feeling anxious, a notification will pop up to inform him of his stress and how it was calculated, along with a recommendation based on his schedule to help him relieve this stress. This Technology May or May Not Be Implemented Let?s make something clear: filing a patent is much different than including certain capabilities in a product or service, so there?s no guarantee that these features will ever appear in Microsoft?s software solutions. Having said that, it does show that software developers?even those of as much renown as Microsoft?are more seriously considering the importance of employee wellness and how impactful it can be to the workplace. This Isn?t All Microsoft Has Done, Either (Along With Other Software Developers) This patent is one more in a line of solutions that Microsoft and other software developers have designed to help promote the wellbeing of their employees. Microsoft has also introduced MyAnalytics, an individualized wellness and productivity tool, as well as Viva, a Teams-based tool that combines the benefits of MyAnalytics with Workplace Analytics, an analytics tool intended to deliver insights to managers and business leaders. Cisco has implemented People Insights into its Webex collaboration platform, with data broken down by individual employees, the entire team, as well as the workplace as a whole. Google has also made plans to make similar data available to workers in the interest of self-awareness and improvement. Do People Really Need An Application to Tell Them That They?re Stressed? At first glance, this all may sound a little silly. Is (yet another) notification really the best way for one of your employees to find out that they?re feeling anxious? In so many words: it very well could be. While we aren?t saying that all of your team members are incapable of identifying their own emotions, they may not feel totally comfortable in responding to them in the appropriate way?in this case, stepping away from a task for a moment to decompress. This kind of feature could potentially not only help make them more aware of their own mental state in the workplace, it signals that their needs are important, that it is okay to take a break if they need one. With the kind of stress that so many have felt over this past year, this message has perhaps never been so pertinent. What do you think? Is this kind of feature […]

Ransomware Is One of Today?s Most Dangerous Threats

Ransomware The experience of someone victimized by a ransomware attack is laced with terror. The fact that the situation you are dealing with?finding your files, drives, or even network resources are encrypted and inaccessible–is definitely one that would startle anyone. You then see the clock that is patiently ticking down, and you know that if you don?t comply with the demands, your files/drives will be deleted. It?s not a pretty situation. Phishing Phishing messages are usually delivered through email, but can also be received via a phone call, text message, or social media message. They are known as such because the scammer responsible simply distributes a message and waits for someone to take the bait. Scammers today are well-established and have gone to great lengths to concoct messages that could fool even the most vigilant user.  Cybercriminals have taken to pairing these attacks together to help them take advantage of as many targets as possible. If a member of your staff incidentally clicks on a link or unpacks an attachment that is connected to one of these phishing emails?because it looks just like a valid email?you may be in some big trouble. Ransomware can move fast to encrypt data and drives, whittling your options significantly.  What to Look for in a Phishing Email There are some warning signs that a message is a phishing attempt. They include: Details are wrong – There are several details that you should check before you click anything in an email. Is the email address from the sending company? Are there misspellings and grammatical errors that you wouldn?t find in professional correspondence? Were you expecting an email from the company? If there are obvious inconsistencies, make sure to report it to your IT administrator before proceeding. There?s excessive urgency – Most phishing emails have desperate call-to-actions. Email is a useful correspondence tool, but very rarely are you directed to do anything that would necessitate you providing sensitive data. If an email?s message seems a little desperate, don?t proceed and report the message to your IT department. There?s a link or an attachment – If there is a link or an attachment in the email, and you weren?t expecting the email, you will want to reach out to the sender to confirm their legitimacy through another method of communication. Phishing is today?s hacker?s go-to strategy. Ensuring that your staff is able to spot phishing attempts is the best way to ensure that ransomware or other malware payloads stay off your network. Call the IT professionals at White Mountain IT Services today to talk about the strategies we prefer to ensure that our clients? networks are left free of malware. You can reach us at (603) 889-0800.

3 Ways Modern Businesses Leverage the Cloud

Let?s dive into three ways that businesses commonly implement the cloud, as well as the benefits for each of them. Data Storage If you have multiple devices, chances are you have felt the frustration of not having access to a particular file because it is located on your desktop rather than your laptop. Even if files are stored on an in-house network, this same issue can persist if that network is not connected to the Internet. How do you solve this dilemma? It?s simple; utilize a cloud-based data storage system for file sharing! With cloud-based data storage, this frustration can become a thing of the past. Data can be accessed on any connected device, making operations much easier and far more flexible as a whole. Imagine the possibilities; you can work on any file, anytime, from anywhere. Once things open back up and you are comfortable traveling again, you won?t have to worry about not having access to important data, and productivity can skyrocket. Plus, think about all the space that server units can take up on-premises. Imagine what it would be like to not have to worry about those? Which leads us into our next opportunity for cloud-based expansion… Backup and Disaster Recovery Data backups in particular are important for any successful business continuity strategy. You might be able to deal with not having momentary access to your data, since it?s safe and sound on a different device, but imagine the struggle that would come about if that data simply did not exist anymore? The traditional way of restoring data used to involve tape-based backups that would be stored on-site, take up a considerable amount of space, and had to be set manually at the end of every day. This made them prone to user error and devastating natural disasters, like floods and fires. If you have an automated data backup system that can be deployed through the cloud, you can get back in business relatively quickly following any sort of disaster, and since the backups are stored with more redundancy than with tape, you?ll never have to worry about them not being accessible or corrupt; chances are there will always be at least one copy of your data that can be called upon in your time of need. Cloud Hosting In much the same way that the cloud allows for easier access to data, the same can be said for just about anything stored in the cloud. You don?t need to limit the possibilities to just files and other types of data. Why not try hosting applications in the cloud? Doing so gives you access to them on any approved device that can handle them. Having access to applications like your email, productivity suite, Voice over IP phone software, and other productivity or communication software while out of the office can be game-changing. On a more broad scale, you can also use the cloud for hosting hardware solutions. Let?s say that you have a legacy software that only runs on a particular instance of a server operating system. However, your servers all need to be on supported versions of Server 2019. Using partitioning through the cloud, you can have the best of both worlds by hosting multiple instances of that operating system in a virtual environment. Get Started […]