Recent Blog Posts

Shutting Down Your PC May Not Put a Stop to Your Processes

It sounds ludicrous, but turning your computer off doesn?t accomplish the same thing as restarting it does, at least not anymore. Let?s take a look at the differences. What?s the Difference Between the Shut Down and Restart Processes? In older versions of Windows, up until Windows 7, shutting your computer down and restarting it resulted in the same process. The computer would shut down, RAM would be reset, and once you started the computer back up, you?d start with no elective processes running. With the introduction of Microsoft?s first ?metro? OS, Windows 8, this process changed. In these OSs, Microsoft has a new startup process called Fast Startup. With this feature, shutting down a device and restarting a device have two separate processes. Shut Down The presence of Fast Startup shortens the process of starting up your machine, it does this for shutting down as well. When a user commands the computer to shut down, their programs and files are shut down, but their OS is placed in standby mode. This shuts the computer down, unlike the hibernate and standby options, but it also makes Windows faster to reactivate. Since most of the computer?s processes aren?t stopped in their tracks, the issues that got you to shut it down in the first place will still be there when it is rebooted.  Restart When a user selects to restart, however, the devices puts a stop to all processes. This is why it takes a little longer to restart than it would to just shut down. It is a fresh boot at the motherboard level.  The difference is in the shutdown process. Funny enough, by ?shutting down? a computer, it actually leaves more components active than a restart does, making a restart the recommended process to use when troubleshooting an issue. Next time you hear ?turn your computer off and on again,? or ?reboot,? you?ll know that restarting your computer is the way to go. If you would like more information about how your operating system works, or any other technology issue you always wondered about, subscribe to our blog.

Understanding How Technology Impacts C-Level Business Roles

Let?s consider these positions, and why they are only becoming more important for a company to fill ? officially, or unofficially. How Technology is Represented in the C-Suite CIO Chief Information Officer When a company selects someone to be the CIO, that person is then responsible for everything IT within the company. From maintenance, to policy making, to every other consideration, the CIO will probably have their hands in it; and, as technology has grown in importance and impact in the workplace, so has the importance of having someone serve as a CIO. This importance is only exacerbated by the prevalence of cyberattacks and other threats today. Companies have had their eyes opened to the importance of comprehensive defenses, and therefore want to have an informed person somewhere near the top to help prioritize these defenses. As an executive, the CIO is more focused inwards, toward the company itself. Their job is to work amongst the departments, vendors, and service providers to make sure that all goes smoothly and that their organization?s needs are met. CTO Chief Technology OfficerOn the other side of the coin, the CTO focuses outward, focusing on how technology can be used to improve what they offer (rather than how their offering is delivered), boosting the top line rather than the bottom. With remote data storage and cloud computing rising in popularity, CTOs have seen a similar upswing. To effectively fulfill their responsibilities, a CTO will need both the background with the technical side of technology solutions as well as the creative spin to take these solutions to new areas in unique applications. As such, a CTO also needs the ability to cultivate relationships with their engineers and developers to better work together to visualize and achieve their goals. On a related note, vendor relationships are also a huge component of the CTO?s wheelhouse, as these relationships are key to ensuring the supply is there to accomplish the goals that the CTO has envisioned. CDO Chief Data OfficerFinally, you have the CDO, whose role has developed as data?s importance has increased. The CDO is effectively the gatekeeper over your data, ensuring that it is up-to-date and protected, while still accessible to your employees. This data can be used to add value to their offering, gain insight into their ecosystem, and to better measure quality through more in-depth analytics. Admittedly, this c-level position is a controversial one, as many businesses feel that their tasks aren?t the kind that require an additional c-level position to be ?created,? so to speak.  Nevertheless, more organizations are leveraging a CDO to help them better lock down their use of their data, as well as its security. What Does This All Mean? In so many words, the fact that these c-level positions are popping up so often is indicative of the clearly apparent shift toward technology and its true importance to modern businesses. This shift is permeating businesses at all levels, from small shops to global enterprises. However, it is also important to acknowledge that adopting technology is often simpler for larger businesses, with their larger resources and much larger budgets. Small businesses can have a tougher time adopting these more-and-more-needed solutions, which is where the services of a managed service provider can be beneficial. With the budgetable services that an MSP […]

Server Choices for Small Businesses

Server-Based LAN Let?s say you are a small business that is in the market for its first server. Up until now your LAN was just made up of what we in the IT services industry call workstations. No matter how powerful a PC is on a LAN, if it?s set up as an end-point, it?s a workstation. A server, on the other hand, is in the center of the LAN. Each workstation can access the server to get the resources on the server, whether they be communications, data storage, or access to applications. This allows for better collaboration, more efficient computing, and the improved ability to secure digital resources. What?s more, a server can be set up to allow for remote access, meaning that your employees will have the ability to have their work with them anywhere they are. You may be surprised just how much value this feature can have for your business. If everyone on your staff produces five percent more, that?s more available capital to invest in your business. In fact, if you don?t currently have a server, deploying one just for file sharing will provide a rapid and substantial ROI.  Server Options  There are several server options that come with varying degrees of capital outlay. Firstly, you will need to establish what exactly you need the server for. Are you implementing a company-wide email system? Do you need central file sharing and storage? Would you like to implement a Customer Relationship Management (CRM)? Whatever purpose you plan on rolling out a server for you need to understand that buying, setting up, running, and managing a server at your business comes with additional costs. In fact, you won?t find an inexpensive part of running your own server, but with the prolonged boost in productivity it should pay for itself pretty rapidly.  An option that businesses have if they are unsure that their major capital outlay will produce enough profitability is to deploy a cloud server. Solutions from Amazon Web Services, Microsoft Azure, and Rackspace all are decent and reliable options if you were to go this route. The benefit of hosting a server in the cloud is that you don?t have to make huge capital investments on hardware, management, utilities and security. These are provided as a part of a service. These companies offer virtual servers that provide generally the same purpose, but billed per month. Essentially, this method transfers the capital costs associated with buying and running a server into operational costs.  Cloud-hosted servers are more reliable than ever, but they don?t give your business the end-to-end control over data and resources that hosting your own servers can. Moreover, if for some reason your business was to lose connection to the Internet, you wouldn?t have access. This downtime can cripple even a rapidly-growing business? progress. Not to mention the reliance you then have on your level of bandwidth, another cost consideration that may make hosting your own server a little more attractive.  Regardless of how you decide to roll out your company?s first server, it is an exciting time for your business. Call the White Mountain IT Services IT professionals if you have any questions regarding your organization?s information systems or IT management. You can reach us at (603) 889-0800. 

Tip of the Week: Avoid These Types of Android Apps

RAM-Saving Apps If an application is running in the background of your Android device, it is going to help burn through your battery and use up your RAM, impacting the device?s performance. This is even the case when the app is only in standby mode. There are many apps currently on app stores that purport to eliminate these claims by shutting down these background processes. Unfortunately, these apps often have the opposite effect, ultimately making the problems they are meant to solve, worse. Cleaning Applications Your applications will often cache data into your phone to help their performance, and theoretically, this can eventually impact your device?s performance overall. Similarly to the RAM issue, many phone applications are committed to clearing this cached data to help boost the performance of the device ? especially useful if the offending app has since been deleted. Admittedly, this makes sense, and actually is true in some cases. However, cleaning apps (which aren?t even necessary to use) drain your battery and can expose you to malicious mobile advertising. Rather than relying on a potentially problematic app, just go into your Settings, navigate into either Storage > Cached data > Clear cached data or Apps > Downloaded > selecting an app > Clear Cache, and you?re all set. Battery Savers Any mobile user understands the frustration of battery limitations, so the idea that an app can help your battery last longer is a truly appealing one. Unfortunately, these apps can?t deliver on their promises, for a few fatal reasons. First, the kind of control that this would require would demand some control over Android, which means these apps would need root privileges. Second, if a power-saver ?closes? an app that is draining power, chances are good that the app will just reopen, ultimately using up more of your precious battery. Fortunately, Google is getting better at this as well, with Android?s Adaptive Battery limiting the drain of less-used applications. Flashlight Apps Your phone already has a flashlight built in. Why download an app that is only going to invade your privacy through flagrantly excessive permission requirements? Skip these. Free Antivirus Yes, antivirus is important, but it is also important to remember that you get what you pay for. In this case, paying nothing will get you nothing. Android has you covered. Have you noticed a pattern of Android already attending to its users? needs yet? If you really, really want to be sure, however, spend the few dollars and pick a reputable, paid antivirus option. Facebook We would be amiss if we didn?t mention the world?s largest social network. After the Cambridge Analytica scandal broke, it became clear that there are clear security issues to be considered. Using the app only makes matters worse: high memory use, background activity, invasive permissions, and voracious data consumption have turned the app from a luxury into a burden. If you still want to use Facebook while mobile, it is a much better idea to delete the app and instead access it through your mobile browser. From there, you can create a direct shortcut to it on your home screen. As a result, closing the Facebook web tab prevents it from chewing through your data and battery life. If you decide to continue to use the Facebook app, it?s worth […]

Importance of Mobile IT Security Policies with Increasing Use of Mobile Devices at Work

“Ask any tech-savvy business owner whether they can run their business from their mobile phone, and you’ll likely get ‘yes’ for an answer. Expect that chorus to grow louder as more advance[d] business-friendly mobile apps hit the marketplace.” The article shares relevant data from ComScore to show the increasing use of mobile devices: “…mobile digital app use has grown by roughly 50 percent in the past two years, with more than 75 percent of that growth ‘directly attributable’ to the mobile app. ‘Mobile has grown so fast that it’s now the leading digital platform, with total activity on smartphones and tablets accounting for 62 percent of digital media time spent, and apps alone now representing the majority of digital media time at 54 percent,’ ComScore adds.” While going exclusively mobile isn’t the norm, Bring Your Own Device (BYOD) or issuing company mobile devices for workers is the norm for the majority of modern businesses. This is validated by an article found on TechRepublic called: “80% of IT business leaders believe employees need mobile devices to do their jobs”, written on June 20th, 2018 by Mark Kaelin, as he explains: “…80% of the respondents believe their employees can’t do their jobs effectively without a smartphone. In fact, 75% said their mobile devices are essential to their company’s business workflows. The successful modern enterprise workforce is a mobile workforce. …However, while mobile devices offer more convenience and flexibility for the modern workforce, they also bring with them additional risks and support issues.” Security Concerns with Mobile Devices at Work As mobile devices become ubiquitous within work environments, mobile IT security policies must be created and implemented to ensure cybersecurity, especially, for BYOD work environments. Essentially, employees’ mobile devices used at work must be encrypted and have strong authentication protocols. An article found on Mobile Business Insights called: “The importance of data encryption on employee mobile devices”, written on July 5th, 2018 by Rose de Fremery, explains more: “Once accessed, unencrypted mobile device data can quickly yield a treasure trove of sensitive financial, business or personal information that should be kept from prying eyes. …Mobile devices should be protected with long alphanumeric passcodes. Enterprises whose BYOD participants access particularly sensitive data might want to implement biometric authentication methods as well.” Developing Mobile Security Policies With mobile devices becoming more advanced and useful for work environments, businesses will need to consider developing mobile IT security policies that fit their unique situation. The security variables involved include: private vs. public cloud systems on-premises vs. cloud enterprise systems mobile devices vs. desktop/laptop systems industry’s level of customer data sensitivity BYOD or company-issued Hybrid work environments with a mixture of all of these variables are the most common, as cloud and mobile computing technology, increasingly, becomes integrated within modern enterprises. Whatever the variables may be, mobile IT security policies should comprehensively address and remedy the security risks that mobile devices create. As the Mobile Business Insights article surmises: “By taking prudent security measures now and educating employees on the importance of protecting their personal devices from unauthorized access, enterprises can maximize the benefits of a robust BYOD program while minimizing their risks.”   White Mountain IT Services has witnessed the rise of mobile technology in the workplace since our beginnings in 1985; our comprehensive managed IT services […]