Recent Blog Posts

Let?s Take a Look at the Data Breaches So Far in 2021

January For the first ten days of the new year, there weren?t any major breaches, but on the 11th: 1/11/21 Ubiquity Inc. – One of the largest vendors working in the Internet of Things space, had their database accessed by unauthorized entities through their third-party cloud provider. Possible exposed items include customer names, email addresses, hashed passwords, addresses and phone numbers. Parler – The former social media news app, Parler, after being removed from Amazon servers got some more bad news. It had its data scraped by a hacker and resulted in 70 terabytes of information leaked. This included almost every post to the platform, person-to-person messages, and video data. All of Parler?s Verified Citizens, users that have verified their identities with their driver?s license information were exposed.  Facebook, Instagram, and LinkedIn – A Chinese social media management organization called Socialarks suffered a data leak that exposed the PII (Personally Identifiable Information) of at least 214 million social media users from Facebook, Instagram, and LinkedIn. User?s names, phone numbers, email addresses, profile pictures, and more were exposed in the leak. 1/12/21 Mimecast – Cloud cybersecurity company Mimecast had their tools hacked, exposing around ten percent of their customers who currently utilize the Microsoft Office 365 email platform.  1/20/21 Pixlr – The free photo-editing application had the user records of 1.9 million of their users compromised. Data that was leaked included email addresses, usernames, hashed passwords, and other sensitive information.  1/22/21 Bonobos – Seven million customers of men?s clothing retailer Bonobos had their customer data stolen and posted on a hacker forum. Some of the data exposed included addresses, phone numbers, account information, and even partial credit card information. 1/24/21 MeetMindful – MeetMindful is a dating platform that was hacked and had 2.28 million registered users? personal information posted for free on hacker forums. The data that was exposed includes names, email addresses, location, dating preferences, birth dates, IP addresses and more.  1/26/21 VIPGames – The free gaming platform, VIPGames.com had 23 million records leaked for more than 66,000 users. The cause was explained as a cloud misconfiguration. Leaked user records include usernames, emails, IP addresses, hashed passwords, and the status of user accounts. 1/28/21  U.S. Cellular – After a targeting phishing attack of U.S. Cellular employees, hackers were able to gain access to the company?s CRM that contained almost five million user profiles. U.S. Cellular is the fourth largest wireless carrier in the U.S. and admitted to only having 276 users be victims of the social engineering attempt. Records that were compromised included names, addresses, PINs, cell phone numbers, plan information, and more.  February 2/2/21 COMB – Standing for a ?Compilation of Many Breaches?, a database containing more than 3.2 billion unique pairs of cleartext emails and passwords that belonged to past leaks of Netflix, LinkedIn, Bitcoin, Yahoo, and more was discovered available online. In the searchable database, hackers were given access to account credentials, access to 200 million Gmail addresses, and 450 million Yahoo email addresses. 2/10/21 Nebraska Medicine – In the first major medical organizational breach of 2021, Nebraska Medicine was inundated by malware allowing a hacker to access and copy the medical records of over 219,000 patients. Information copied included names, addresses, dates of birth, medical record numbers, health insurance information, lab results, imaging, diagnosis, and more. […]

The FCC is Taking Measures to Assist with Internet Connectivity

What the FCC Has Done On Thursday, February 25th, the FCC unanimously voted to give low-income households a discount on broadband internet service as a $3.2 billion part of the $900 billion that Congress earmarked for coronavirus relief in December. With up to $50 available to these households (or $75 for those on tribal lands) each month and a one-time $100 discount on a computer or tablet, this program will hopefully assist people in staying safe as the pandemic drags on. Considering that the average bill for stand-alone broadband service was calculated to be around $66 per month by the Wall Street Journal, it should come as no surprise that this is too much for many households to swing. Laying the numbers out like this makes it clear that the Internet is a costly investment, even in the best of times. The list of eligible households covers those that are already receiving low-income Internet benefits or pandemic relief recipients, as well as those who are eligible for free and reduced school lunches, Medicaid, SNAP, and Pell Grant recipients, and anyone who found themselves unemployed by the pandemic. Set to open up in a few short months, this program isn?t without its flaws. First of all, the $3.2 billion won?t last very long when you divide it up amongst 117 million households that meet the eligibility requirements. Once that $3.2 billion is gone, the program is slated to end. Deeper Connectivity Issues This program also does little to address another, arguably larger issue?the fact that millions of families don?t have any reliable means of accessing broadband at all. With so many now working and learning remotely, we?ll likely see some considerable impacts due to this coming to the surface. While the Federal Communications Commission has estimated that 18 million people lack reliable enough connections to access the Internet from home, the method they used to measure would allow these figures to be inaccurately skewed. The reason is this: these figures are based on ZIP code-based census blocks. In order to be counted as broadband-compatible, only a single household needs to have such Internet services available within the block. However, in sparsely-populated areas it isn?t uncommon for census blocks to stretch hundreds of square miles, indicating that this metric is far from effective. Hopefully, this discount will be the first step to a more accessible Internet service with more equity for all, as the need has never been more well-defined. Here, we?ll turn it over to you: are these steps the start of effective change? Let us know in the comments what you think about it.

Tip of the Week: Pin a Chrome Tab for Easy Access Later

Pinned Browser Tabs Most times, you?re going online to do a set list of things, using just a few certain websites more than most others. Studies have shown as much. However, if a user prefers to keep these tabs open throughout their browsing session, it is too simple to accidentally close it out when trying to navigate between them. This is where the benefits of pinning a browser tab become apparent. By pinning a browser tab, your tab can no longer be closed out and the website name is removed so that it takes up less space and leaves more room for other tabs. Pinning a tab is simple: Right-click on the tab Select Pin tab from the drop-down When you want to unpin your tab, follow the same process, and simply select the correct option from the same drop-down. If a tab has been pinned, any internal links (directing to a page on the same website) will open in that tab, while external links will open in a new, unpinned tab. Interested in learning more about how your technology can work harder for you? Reach out to White Mountain IT Services today by calling (603) 889-0800.

What Your Employees Need to Know to Keep Their Own Data Secure, Too

Let?s go into why this is, and what these practices should look like. How an Employee?s Security Habits Impact the Business? Security Overall Okay, stay with us here?there are a few steps that we need to go through to get from point A to point B. Chances are that your team members are likely somewhat lax in their security practices when their own data is concerned. This means we can confidently say that, without oversight, simplicity will likely win out over the admittedly less convenient best practices. While you should be ensuring that all devices that connect to your business network are updated and abide by certain best practices, like password quality and the like, you aren?t exactly standing over their shoulder while they?re browsing from home. With so many people now working remotely?potentially from devices they own, not the ones you?ve provided?this can quickly become an issue. With poorly managed and maintained devices accessing your business? resources, you are exposed to greater risks. Obviously, this isn?t acceptable. To help minimize the impact that lax security practices could potentially have, you need to reinforce the importance of properly adhering to what is recommended in the office while at home. Best Practices That Your Employees Need to Abide by at Home, Too Password Hygiene Don?t reuse passwords Update passwords somewhat regularly Use an approved password manager to help simplify this compliance Supplement your passwords with some form of 2FA/MFA Precautionary Measures Avoid any publicly accessible wireless networks Think before you click when browsing the Internet or checking emails Use a Virtual Private Network (or VPN) to securely connect to your infrastructure Always keep an up-to-date antivirus and firewall installed Regularly update your software Browsing Practices Avoid insecure websites (those beginning with ?http? instead of ?https?) Keep personally identifiable information (PII) private Understand what a phishing attack is, and how to spot them Keep work devices dedicated to work purposes Interested in learning more about any of these practices? Give White Mountain IT Services a call to discuss your options with us, along with any of your other business-IT related questions. Dial (603) 889-0800 today.

Three Smart Business IT Moves for Any Sized Organization

Prioritize Security Your business? most valuable asset is in many ways its data?an importance that needs to be acknowledged and respected by everyone working there. Data security hinges on adherence to a great many best practices that address so much, from password creation to threat awareness to the importance of proper authentication. It will help to fully educate your team about the gravity of such topics, boosting their awareness by honing in on the consequential outcomes and how these measures help keep the company?and by extension, their jobs?safe. Checking up on and evaluating your team?s preparedness is also important, as the feedback you provide could just be what prevents a serious data issue in the future. Emphasize Consistency While the tools provided by Microsoft, Google, and Apple are more compatible with one another than ever before, it is in no way convenient to have your business spread amongst the different operating systems and environments. On the contrary?this can easily open the door to issues and user error creating larger problems. Establishing standard operating procedures pertaining to everything from your preferred equipment to the workflows that are carried out is important. If your processes are not consistent, data could be lost, misplaced, or otherwise rendered inaccessible. Making sure that approved company workflows are put in place and followed will be key to maintaining productivity and collaboration. Enable Mobility Finally, with work processes now possible from so many more places, ensuring that your team can work from effectively anywhere is a major benefit that shouldn?t be passed up on. With benefits to flexibility and productivity at stake, enabling mobile operations is almost a no-brainer for today?s most agile businesses. White Mountain IT Services can provide you and your team members the tools needed to support these practices. Learn more by calling (603) 889-0800 today.