Recent Blog Posts

Professional Services are Getting a Technology Makeover

Professional Services Pen & Paper Approach Many professionals that have been working for decades were taught their craft by people that didn?t have the technology that we have today, and therefore, often dismiss it. There is something to be said about understanding the fundamental reasons certain tasks need to be done, but the truth is that a large chunk of work, some say upwards of one-third of the time spent by a professional services business, is doing mundane, repetitive tasks. If you have an analog strategy it may be time to consider deploying some technology that can help you streamline your business. Professional Services Technology There are certain solutions that are created specifically for professional services companies. In professional services, there?s that extra responsibility to be the authority that you were hired to be. As a result, today?s professional services firms are really looking to use cutting-edge technology. Like any other business, professional services firms need reliable hardware, software tools that promote productivity, and the security solutions needed to protect their network and data. Here are a few technologies that can help. Document Management You have that archetype in your mind of an office worker. Someone that sits behind a desk and types and frequently takes phone calls to go retrieve a file from a file cabinet someplace in the office. Once the model, this version of the office can only be viewed today as inefficient and costly. Businesses, even professional services businesses, need to do more with less.  Document management is an opportunity to streamline the management of all of your business? crucial information.  In professional services, the ability to get the information you need at the moment you need it can be completely indispensable. A document management system (DMS) presents an opportunity to do just that as every document your business needs to save, every receipt, even the all-important lunch menus can be scanned and saved in an easy-to-organize digital management system. Privacy is built-in as many DMS options allow administrators to secure documents down to the file folder.   While often resource-intensive to set up, the DMS provides complete and secure access to all of your business? filed information from nearly any device, anywhere you have access to the Internet. For professionals, information is a key component of doing business, so to have remote access to all your information can both speed up business and reduce costs.  PSA Professional Services Automation (PSA) is a software designed to manage the professional services business from end-to-end. It allows for comprehensive service management as well as options to manage resources, store information, and manage projects. It provides a great deal of automation options that both enhance your business? ability to do business and manage the relationships that make the service offering possible.  Most businesses use some type of CRM (Customer Relationship Management). This software basically comes with a calendar, a time management system, analytic tools and more. The PSA is designed specifically for tracking time and managing tasks within a project setting. This means that each client has a profile within the PSA and each service that is carried out is tracked through a ticketing system. This provides an easy-to-use interface to manage all of a business? day-to-day operations.  Additionally, many of today?s PSAs provide access through a web client or […]

Tip of the Week: Getting a Better Wi-Fi Signal at Work or at Home

By the way, the following would all apply to the office as well. So, don?t hesitate to use some of these tricks in the workplace. Elevated, Centralized Placement For your business to use the Internet wirelessly, your router needs to be able to get the signal to every device used in your day-to-day processes. This means that the signal should have as unobstructed a path as possible to, once again, every device. To accomplish this, it helps to avoid as many obstacles to the signal as possible. While not all obstacles can be avoided, you should make sure that you eliminate as many as possible. One great way of doing so is to strategically place your router in a centralized place in your business, elevated above most barriers. This will help keep your coverage relatively consistent throughout the workspace. Keep It Away from Clutter On a related note, these signals can be blocked by obstacles of all sizes. So, while placing the router on top of a cabinet in the middle of the office will keep Rob?s desk from blocking the signal, stacking extra supplies around it will create just as much difficulty. Other devices and even wires can seriously disrupt the wireless connection. Try to keep the area around your router relatively clear. Not only will this help preserve a stable signal, it will help keep heat from building up there and causing other problems with your equipment down the line. Augment with Extenders, or a Second Router Let?s say that router placement or clutter isn?t so much the problem, and it?s more of a problem of scope? your router just doesn?t get the signal to all of your employees, or the number of employees you have just clogs up the signal. There are a few ways to potentially fix these issues. First, you could extend the range of your Wi-Fi signal using signal extenders. If you need to make more connections, you can add an additional router to your network as well. White Mountain IT Services is here to assist you with your IT, from building the infrastructure that meets your needs to yes, helping you set up your wireless network. Give us a call at (603) 889-0800 to learn more about what we can do for you, and make sure you subscribe to our blog for more handy IT tips.

New Cyberattack Targeting Remote Workers

Warnings from Federal Agencies The issue of voice phishing is currently being pressed by the Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency alike. Vishing is the same as any other phishing attack, just conducted through a voice call instead of an email or other form of message. These agencies have announced that cybercriminals have begun a vishing campaign, directed toward those that are working from home. By extracting login credentials for corporate networks, these criminals can turn a profit by selling access to other cybercriminals. The Vishing Strategy According to the FBI and CISA, cybercrime groups have registered facsimile domains to mimic legitimate company resources before developing phishing sites to live on these fake domains. These domains commonly had a structure like the following: support-[company] ticket [company] employee-[company] [company]-support If someone were to visit these pages, they would find a page that looked very much like a company?s login page to their virtual private network?so as a result, if someone were to input their credentials, the cybercriminal would then have the means to access the business? network. These pages can even capture multi-factor authentication measures. Once these pages are completed, the criminal groups responsible then begin to research a company?s employees to build a profile on them. Names, addresses, phone numbers, workplace titles, and how even how long an employee has even been employed at a company are all included in these dossiers. Then, using random or spoofed VoIP numbers, hackers call these employees and swiftly gain their trust. Once this trust is acquired, the attacker directs the targeted employee to the spoofed VPN page. Quicker than you can say ?social engineering?, the hacker can then access the legitimate account. From there, the attacker is free to do as they please?collecting data on other employees and contacts to take advantage of or extracting other data for financial gain. With attackers now directing these vishing scams toward remote workers, it is more important than ever that your team understands how they can identify phishing scams Identifying Scams Be suspicious of unsolicited messages?including calls and voicemails?from those you don?t know. If possible, verify their identity through another means to ensure that they are legitimate. Keep track of the number that any suspected vishing messages come from, as well as the Internet domain you were directed to. Don?t visit a website on a whim after a caller directs you to it, unless you have reason to believe it is legitimate. For more assistance with your business? security, reach out to the IT pros at White Mountain IT Services. Give us a call at (603) 889-0800 to start a conversation.

Get Your Business Back on Track

Managed IT Services It?s true that many businesses that are looking to cut back on their expenses have already moved over to a managed service provider (MSP) in order to reduce their IT support costs. Many of today?s businesses depend on their technology, and one of the best ways to cut back on your IT-related expenses is to outsource some or all of the management. Your business has probably committed to a certain level of productivity, and more than likely COVID-19 has reconfigured those expectations. When your staff was laid off or working remotely, you may have seen the effect it has on your bottom line already, but more likely as things return to ?normal? you will see revenues hindered from all types of outside factors and the productivity of your staff may not be your biggest concern. It may be keeping people employed. Unfortunately, in today?s austere business climate, that may not be possible. By outsourcing your IT management and support to an MSP, you can get the comprehensive IT support your business needs, while reducing your technology-related expenses dramatically. IT services providers excel in keeping downtime to a minimum by constantly monitoring and actively managing all supported technology to ensure that problems are mitigated and downtime is left to a minimum. Additionally, MSPs provide around-the-clock IT support for all of your staff through our help desk.  When looking to cut costs, maintain support, and still get the IT support your business demands, choosing the right MSP will go a long way toward keeping your IT working for your staff and not the other way around.  Migrate to the Cloud Another service model that can reduce upfront costs is to migrate internal IT over to the cloud. This goes double for companies that were looking to spend this year?s IT budget on a new hardware refresh. Since committing to large investment is not a prudent strategy right now, utilizing the cloud for new operational strategies might be just what you need to stem the tide until your company can afford that new server.  Think about it: consider that a hardware replacement could come with a five-to-six figure price tag (depending on the size of your company), paying for the computing that your company uses in the cloud can be a great short-term sacrifice that will allow you to get through lean times with more of your business? technology intact.  Committing to Security With so many businesses using hosted solutions, there is a concern that it will make information systems less secure. It?s for this reason that prioritizing your physical, network, and cybersecurity strategies has to be a priority.  Physical security – Your business? physical security always has to be a priority, and in recessionary times, that priority is heightened. Digital camera systems, access control, and secure authentication systems are important when you need to monitor, control, and protect your business? assets.  Network security – Ensuring that you have the protections needed to detect intrusion and eliminate threats will go a long way toward ensuring your internal IT continues functioning proficiently.  Cybersecurity – Protecting your remote endpoints and having a mobile security plan are important to ensure that your cybersecurity is maintained. You will also want to properly train your staff on the myriad of cybersecurity threats that could decimate […]

Will We Soon Leave Passwords Behind?

Take, for instance, Microsoft. But First? What is Passwordless Authentication? Passwordless authentication is precisely what it sounds like. Instead of requiring a person to authenticate their identity by inputting a predetermined passcode, passwordless authentication looks to other measures to confirm validity. Does the user have access to a verification application? Do they possess a security token? Do their biometrics match the reference data? Have they already been authenticated by another service or application? If your phone unlocks when it recognizes your face or fingerprint, you?ve used passwordless authentication before, or if you?ve received an access code via text message or email. While not all forms of passwordless authentication are equally secure, they generally resist the weaknesses that the traditional password is prone to: Insufficient strength, making brute-force attempts much simpler for cybercriminals Without a password, users cannot reuse passwords across different accounts Brute force attacks require a password to be present to work, which passwordless authentication negates The Benefits of Passwordless Authentication Cost Efficacy Passwords can be shockingly expensive to maintain. Forrester Research has estimated that each password reset costs the company $70, finding that large organizations spent $1 million in staffing and infrastructure alone to handle them in 2018. However, if there is no password to reset, there will be no cost associated with resetting it. Improved Convenience in the User Experience When the average user nowadays is expected to remember literally dozens of passwords, there?s little wonder that so many users resort to just picking one and recycling it over and over. From the user?s perspective, it?s more convenient, which means they can access what they need and get down to business more efficiently. Of course, this doesn?t encompass the full reality of the situation. Therefore, to ensure that your security is maintained, it makes sense to make the most secure option the most convenient one as well. Passwordless authentication removes all the pressure of remembering all those credentials. As a result, your employees will both be under less stress and in a position to securely work towards your organizational goals. Security Finally, and most crucially, passwordless authentication is safer. Think about it: cybercriminals are targeting the human element more and more frequently as they leverage their attacks. Phishing is a common means for a cybercriminal to gain access to your business? data, and there are plenty of other attacks that target your authentication measures anyways, like credential stuffing and brute force attacks. Each of these attacks relies on a set, concrete password being the key to the castle, so passwordless authentication measures can minimize the threat they pose. Reasons like these are why Microsoft is putting so much effort into passwordless technologies. What Microsoft is Doing with Passwordless Authentication In no uncertain terms, quite a bit. In addition to 150 million consumer and enterprise accounts using passwordless authentication measures as of May 2020, Microsoft itself has effectively made an internal transition to passwordless. Up to 90 percent of their own 150 thousand employees have opted into passwordless authentications?saving Microsoft 80 percent of the support costs that once went to internal password management. Microsoft has accomplished this by pairing passwordless measures with secure multi-factor authentication. Their strategy now can be summed up as saying, ?Okay, so this user appears to be who they?re supposed to be. Let?s make […]