Recent Blog Posts

Tip of the Week: Six Keys to Managing Your Phone?s Battery Life

Condition 1: Your Battery Will Degrade Over Time, and Naturally Hold Less Power in a Full Charge While the ones currently being put into smartphones are much better than the ones used in the past, batteries have long been one of the fastest components to fail in smartphones and laptops alike. The timeline of this failure can come as a surprise, too?manufacturers admit that, by the time a year has passed, most batteries will have lost a sizable amount of their available life. Many recommend users to expect a loss of 20 percent after 400 charge cycles. With this knowledge, you can see that it is important to adjust how a device is charged to help extend the lifespan of its battery. Condition 2: Temperature Extremes Can Encourage Degradation A smartphone?s battery capacity can also be adversely impacted by very high as well as very low temperatures. This is a common issue for people who often leave their devices in their cars. With the potential for extreme temperatures on either side of the spectrum depending on where someone lives, the enclosed car only exacerbates these impacts. Keeping a device at a happy medium can therefore help keep the device?s batteries from losing too much potential. Condition 3: You Let Your Battery Run Out of Charge Not too terribly long ago, the prevailing advice for preserving a mobile device battery?s lifespan was to let it get all the way down to zero before you next charged it. More recent innovations in batteries and their internal chemistry have actually made this a bad thing to do for the battery?s longevity. Instead, it is advisable to keep your device?s battery somewhere between 20 and 90 percent. Condition 4: The Screen is Too Bright It just makes sense that keeping your screen turned all the way up would result in a greater draw on the device?s power reserves. However, it can actually harm your battery in the long term as well. Fortunately, both iOS and Android devices now have built-in utilities to help you control your screen?s brightness, but you can also boost it further by manually setting your brightness to the lowest brightness that is still visible. Condition 5: The Screen Stays on Too Long Most modern smartphones feature a setting that turns off the screen if there is no activity registered for a set period, usually ranging between a few seconds to a few minutes. There are also applications that can give you more granular control over this, and some smartphone makers will include extra software to keep unnecessary battery usage at a minimum. Condition 6: You Haven?t Adjusted the On-Board Battery Saver Most smartphones today come with some capability to control how much battery life is taken up by background processes. While this solution might not give you the longevity you would expect from a device that likely cost you over a grand, it can help you to make the most of it. Properly managing your mobile device?s battery can have a lot of impact on how it operates, which in turn can impact your finances. To learn more ways to get more out of the technology that your business relies on, subscribe to our blog, and give White Mountain IT Services a call at (603) 889-0800.

How Unified Communications Improves Productivity

Unifying Businesses Communications Having a strong communications strategy for your business can go a long way. With the options that are now available through the cloud, your business can significantly cut your communications costs by utilizing technologies like Voice over Internet Protocol (VoIP) and video conferencing. Today, there are complete communication platforms that integrate all necessary communications into one easy-to-control solution. This comprehensive platform, called unified communications (UC), combines your business telecommunications and messaging with your web and video conferencing and collaboration. UC delivers an efficiency that your business hasn?t experienced before. Some features include:  Disaster recovery Managed support Thorough analytics Management software integration Regulatory support Global service delivery …and more! Available Technology Below are some of the technologies a UC platform offers: Telephone A powerful and feature-rich telephone system is one of the most important parts of a business? communications platform. A VoIP system uses your organization?s bandwidth to deliver reliable voice services at a substantial cost reduction. Each VoIP platform can offer a whole cache of features, including: Call Management/Auto Attendant Call Queue Call Routing/Screening/Transferring Call forwarding/Voicemail Call Park/Presence/Pulling Call Recording Custom In-Call Music Custom ringtones Do Not Disturb Three-way calling Personalized extensions Find/Follow Me Voicemail services …And much more. Aside from these features, a hosted VoIP platform offers users the ability to use the system on their own mobile phones through the use of a mobile app, effectively making any smartphone a work phone.  Text and Instant Messaging The UC system also integrates a lot of other useful messaging features. Many people would rather get a text than a call. Your organization?s messaging can integrate with other software to provide a useful collaborative option. Video Conferencing Today, having a video conferencing solution is a must. With more people working outside of the office, and with businesses outsourcing work to remote contractors, having a solution to run meetings over the Internet is extremely useful.  Collaboration/File Sharing Collaboration is the name of the game in the information age and a UC can provide a solution for secure file transfer and document sharing.  With integrations with CRMs and other management platforms a UC can make your business be more efficient and productive. To talk to one of our IT professionals about the possibility of integrating a unified communication solution into your business, give us a call at (603) 889-0800 today.

Alert: Update Windows Netlogon Remote Protocol Now, says Homeland Security

What?s the Exploit and Who Does It Affect? The vulnerability in the CISA?s emergency directive affects all supported Windows Server operating systems. It?s been named Zerologon, and If left unpatched, it could allow an unauthenticated threat actor to gain access to a domain controller and completely compromise your network?s Active Directory services. The vulnerability gets its name because all the hacker has to do is send a series of Netlogon messages with the input fields filled with zeroes to gain access.  Once in, this essentially gives the hacker a lot of control over your network, and it?s a publicly available exploit (since Microsoft has released a patch for it) which means cybercriminals will be taking advantage of it. The attacker doesn?t need any user credentials to use this exploit. If your business network is running Windows Server, you need to have updates applied to your servers to ensure that this vulnerability is patched. If you aren?t actively keeping all the devices on your network maintained with the latest updates and security patches, you are essentially leaving the front door wide open. The Department of Homeland Security (the parent department of the CISA), has issued a directive for all government agencies in the United States that they have until today (September  21st) to apply the patch, to prevent giving hackers control over federal networks. This means all state and local government agencies are required to apply this today and report back to the CISA. Not having this patch installed will also affect other compliance standards throughout other industries, and of course, leave your business and your data at high-risk of a breach. It is highly recommended to apply this patch today, as soon as possible, regardless of the industry you are in. We can?t stress this enough. Apply this patch as soon as humanly possible. The Good News If you have an active managed IT services agreement with White Mountain IT Services that covers the maintenance of your Windows Servers, you have likely already received the patch, or will be having it installed today. The patch was released by Microsoft as part of their August 2020 Patch Tuesday Update. If you don?t have an agreement with us, or you aren?t sure if your agreement covers fixing the Zerologon vulnerability, we urge you to reach out to us by calling (603) 889-0800. This is definitely not something you want to risk. The Department of Homeland Security and the US Cybersecurity and Infrastructure Security Agency don?t issue emergency directives casually. This needs to be taken seriously for all businesses and organizations. If you need help, or you are unsure about how to protect your organization from the Zerologon vulnerability, don?t hesitate to reach out to White Mountain IT Services at (603) 889-0800.

How Should IT Be Used as Employees Return to Workplaces?

There are a few different outcomes here to consider. Remote work may be the best and safest option for some time to come, but some businesses may have no choice but to bring their teams back in-house and will need to prepare accordingly. Whichever approach you take, your IT resource is going to play an invaluable role. On-site Operations Many businesses and their processes simply aren?t suited to remote operations, necessitating them to open once again. Of course, this will require these businesses to enact a few significant measures to protect the health of their teams and clientele alike. As many of these measures will in some way involve protected health data, compliance to HIPAA (the Health Insurance Portability and Accountability Act) and other similar data protections will be necessary. This means that you need to ensure that you are prepared to properly store, track, and protect this data in some way. There are also many services popping up that allow businesses and employees to share COVID-19 test results securely and privately, assisting further in reopening processes. Remote Operations If a business can support it, remote work is likely going to be the wisest strategy at the present time. After all, it subjects your staff and your patrons alike to the least amount of exposure. To successfully do so, however, it is crucial that businesses who utilize remote work fully educate their remote team on how to work productively while also remaining secure. For many, this unfortunately has yet to be the case. An IMB survey recently reported that 45 percent of remote employees were not trained in how to protect their work devices while using them at home. While remote protections are far from the security that can be accomplished in-house, tools such as virtual private networks (VPNs) and remote access logins can significantly boost their capabilities. This becomes an even larger priority if an employee handles sensitive or personally identifiable information. Regardless, properly training employees to safely use their devices needs to be a priority as remote operations continue. Hybrid Operations For many businesses, logistics may make it necessary to stagger out how their workforce operates. As a result, a lot of these businesses will likely take a hybrid approach?some team members working in-house, and some working remotely, possibly switching periodically. This will require the technology solutions to assist in managing these schedules. This approach will also require business owners and managers to make a few decisions? for instance, what if one of their employees was to test positive? Should everyone else working in the office at the time be relegated to their homes to work remotely, or only those who share their immediate workspace, or used the same restroom as Patient Zero? As for the IT and cybersecurity strategies of these businesses, they will suddenly have to deal with double the opportunities to complicate matters. Basically, IT won?t have just in-house or remote to worry about?both will be in play. This makes comprehensively locking down a business more challenging. Regardless of your chosen approach, White Mountain IT Services is here to assist you in implementing and maintaining the solutions needed to enable your business? success. To learn more or discuss your options, give us a call at (603) 889-0800.

Is Older Technology Really That Bad?

The 747?s Floppy Disks People took notice when a retired Boeing 747 made an appearance during a virtual hacking conference. More specifically, a cybersecurity firm spotted a classic 3.5-inch floppy disk drive in the cockpit? you know, for the 1995 staple floppy disks that have been immortalized as the Save button?s icon. In the 747, these drives are used to load the plane?s navigation databases. Any updates require eight floppy disks to be installed in sequence. The funny thing is, floppy disks have all but vanished otherwise. When did you last think of one, let alone use one? At White Mountain IT Services, we?ll occasionally come across one that?s been hiding deep inside a drawer or a cabinet. If you?re pressed for options, they can make a pretty decent coaster to keep your beverages from leaving a ring on your desk. So, why would an aircraft rely on a technology that is so outdated, most college-aged people have never used it? After all, reliability is pretty important in an aircraft, so can we really trust these floppy disks to perform? Fortunately, the answer is yes, for a few reasons. First off, most 747s were built in the ?90s, the heyday of the floppy disk, with exceptionally specific hardware. As you would imagine, large commercial aircraft meant to go considerable distances aren?t just slapped together. If you refer to the Wikipedia page, only 1,558 Boeing 747s were ever constructed, with 419 still in the air. They were designed to use the computing equipment available at the time, built specifically for the aircraft?s use. So, the Boeing 747 uses floppy disks because it was originally built to use these floppy disks. This is also an example of a time when older technology isn?t introducing any vulnerabilities. While there is nothing inherently more secure about a floppy disk than other data storage options, the systems on a 747 could only be hacked if someone were to bring in their own disks, with the correct data on them, to successfully undermine the system. By comparison, a cybersecurity professor was able to use a normal USB mouse to crash a plane?s in-flight entertainment system in 2019. Hopefully, this hasn?t made you swear off planes or flying. The professor was only able to impact the entertainment system, not the airplane?s critical processes. So, what we should take away from all this is that older technology is only less secure when it is connected to modern tech or a modern network. Your old cassette player will continue to play your cassettes without ever requiring an update or charging a premium subscription fee to listen without ads. However, if your player were to break, the only way you could listen to your tape of Radiohead?s OK Computer would be to replace the player with a second-hand device. Business technology works in largely the same way?sure, the old printer that isn?t connected to the network might not make you any more vulnerable to cyberattacks, but it may not be able to update to the point where it can support Windows 10. This is the true danger of outdated technology. If it hasn?t been updated, but is still connected to everything else, a hacker could use it as an easy access point onto your network. A good rule of thumb: if it connects […]