6 Signs It’s Time to Migrate Your Company’s Cloud

1. Your company has changed directions or size. Any time a substantial change occurs in your company, it’s time to look at all the services your company uses. If your company is storing significantly more data or just acquired another company, you need more room. Accepting overage fees just to stick with your current plan and provider can be more expensive than it looks at first glance. So shop around based on your new tier of usage (whether it’s bigger or smaller). 2. You’ve added on features or services since your initial signup. Every cloud service provider offers additional services and premium perks. If you signed up for one package but your company needed to purchase additional line items since then, review your plan. Bundle packages are usually cheaper than going a la carte. If your current service provider won’t let you lower your monthly rate, shop around to put pressure on them or to head to greener pastures. 3. Your current service provider is no longer leading the pack. The technology market is highly competitive, and cloud service providers are no exception. Your current company may have offered the highest degree of security in its tier when you signed up three years ago, but now they might just offer middle of the road protections. No matter whether your primary concern is speed, security, or accessibility, keep track of the trends to make sure your service still does the best job of what you need. 4. There’s been a data security breach. Data breaches happen, and it’s going to be hard to find any technology company that hasn’t had some sort of scare. But if a serious data breach occurred or minor potential breaches keep happening, it’s time to get out of there. Switch to a nationally recognized brand that can’t afford the bad press of a breach and so does their best to protect their clients’ (and your clients’) data. 5. Your company needs more flexibility. Just like the first point, your company might be transitioning in terms of size, focus, and cloud demand. These changes might just be part of the business model instead of major alterations. Your peak months might see far more cloud usage than the off-season, and even your company’s internal travel-based or remote cloud access might fluctuate throughout the year. If your cloud service doesn’t offer slightly variable pricing that works in your favor, migrate to a more flexible cloud. 6. You want to switch from a public to a private cloud. If your company is growing to reach enterprise status, a public cloud might not be robust enough to support the growth. If your company is starting to need fine-tuned control and complete access into the “behind-the-scenes” portions of the cloud, switch to a private system. Delaying this switch can slow your company’s momentum. If any of these reasons sound familiar, migrate to a new cloud. White Mountain IT can help recommend the right service for your future cloud and manage the migration. Contact us today to get started.

Tip of the Week: How to Efficiently Manage Your Email

Don?t Be Afraid of Reusing an Email! How often do you find yourself sitting down to write a response to an email, only to think of all the other times you?ve had to do the same thing, effectively verbatim? You know the messages: the ?thanks, but I?m not interested,? the ?you should have emailed this other person,? or the ?yep, got it, need anything, thanks!? These messages are the modernized cousin of the form letter, so why not use a standardized template for them? Your email platform of choice should have the capability to create these templates for your messages, or as they are referred to in Outlook, ?quick parts.? In Gmail, they are called ?canned responses.? By setting up these templates, you can save your future self a lot of time rewriting the same message. Use Groups! Let?s say you frequently share news with your team and its various departments, or a particular team you?ve put together internally for a project. Whatever the case may be, you want an easier way to send a message to a set group of people. In Gmail, you can create groups to send messages to later, that make a sort of forum in an email message. It really simplifies the task of reaching out to large groups of people in the office regularly. Stay Organized, or in Other Words, Don?t Be Afraid to Archive! One of the most common reasons that even the most organized inboxes get cluttered again: those emails that you just keep around in your inbox.  Whether they came in from a newsletter you?ve subscribed to, or if they were shared in a particular email chain that you keep going back to, these emails get in your way. Maybe there was an idea in there that you really liked, as in, this was a good idea, one that could potentially take your business to the next level, even the level after that. But wouldn?t you know it, now just isn?t the right time to do something like that, but we want to someday! So, to make sure that you had the seed that planted the idea when the moment was right, so you could swoop in and embrace the opportunity at some later date, you?ve kept this email? and a bunch of others that also had good ideas. Honestly, how likely is it that you will ever actually put one of these ideas into practice? You?re likely better off deleting messages like these. However, if you really, really want to keep them, try creating a folder called ?Future Plans? After all, your good intentions should be put somewhere. Now, we kid, but don?t miss out on the improvements that small adjustments like these can potentially make. Make sure you subscribe to our blog for more tips to help you get the most out of the technology that drives your business!

What Are the Biggest Cybersecurity Concerns Going into 2020?

Compliance Fatigue Unfortunately, in a world as heavily reliant on security measures as ours is, this is the threat to cybersecurity that makes the most sense – businesses simply giving up under the increasing weight of the growing list of compliances and regulations that they are beholden to. As more and more standards are outlined for businesses to uphold–without much apparently being done to enforce them–businesses are just more likely to let a few things slip through the cracks. I hope I don?t have to explain how this could be dangerous. It goes without saying that these compliances are put in place for good reason, and as such, are meant to protect the welfare of a business and its clients. ?Letting things slide? therefore translates to ?putting all involved parties at greater risk.? Furthermore, there are also concerns around the idea that some businesses could be beholden to overlapping regulations that demand contradictory or prohibitive elements. Faced with mounting demands, cybersecurity may suffer through oversight or worse, omission, due to an overtaxed resource. Misconfigured Cloud Environments Cloud solutions have seen explosive growth as their benefits to businesses have been made clear. Unfortunately, this growth far outpaces the development of the workforce needed to maintain these cloud infrastructures and security configurations. As should come as no surprise, Gartner attributes a full 95 percent of public cloud security failures to the customers, not the providers of the platform. There are countless examples of misconfigured cloud solutions creating major security issues, many of which have taken place throughout 2019, like the infamous Capital One breach. Based on history like this, it can reasonably be expected that 2020 will see more of the same. Mobile Malware Again, surprising almost no-one, our increased reliance on mobile devices for many of our needs has led to a similar increase in malware intended for these mobile devices. In 2018, Kaspersky Lab discovered a considerably larger number of malware attacks meant to target banking applications, and the number of malware files rose from 18,501 to 29,841 within that year. That increase certainly isn?t nothing, and can be attributed to the simple fact that more people are using mobile banking applications. The cybercriminals have just shifted their focus as their targets have. Phishing Attacks One thing that no amount of algorithm tweaking or patching is ever going to fix is the nature of the person sitting at the keyboard. Your users (AKA you and your employees) are the weakest parts of your cybersecurity implementation, as you are the easiest to fool and will continue to be going into 2020 and beyond. Without the right training into effective cybersecurity practices, your company is going to be vulnerable to phishing attacks and similar scams. White Mountain IT Services can help. To learn what we can do to help protect your business in the new year, give us a call at (603) 889-0800 today.

Google Knows a Lot About You. Here?s How to Control It

First Off, What Does Google Collect, and Why? There are a lot of obvious things that Google knows about you. For example, it knows what you search for, and what result you click on. Google watches traffic across the web to determine what web pages are the most popular or the most authentic. Google can tell approximately where in the world you, and that gets even more accurate when you are using a mobile device. Google uses all of this data to refine search results. If you are looking for a place to order lunch, Google wants to give you results that would be feasible.  When it comes to data privacy at this scale, you have a few options. You can either: Ignore it and just allow any entity to collect, store, and share your personal information at any time. Disconnect from the grid, throw your phone into a lake, and move to a self-sufficient cabin in the woods. Do your best to understand and control what data gets collected, and find a balance between being private and being connected. As nice as option two sounds sometimes, most of us are probably better off with option threen. Let?s dive in and discover what Google knows about us, and how we can control what information they use. Let?s Look At Your Public Google Profile and Lock Things Down First, go to https://myaccount.google.com/ and sign in with your Google account.  This page is going to look a little different depending on what services you have and use through Google, but we?re going to be focused on privacy and security-related options. On the left-hand side, click Personal Info.  Google will display your basic information, such as your name, your date of birth, and any contact information Google has for you. If you scroll down, you?ll see an option that says Go to About me. Click that and Google will let you control what other people can see about you. You can click the pencil icon to edit any of the information, and click the green globe if you want to hide a particular piece of information from the rest of the world. This is just a small tip of the iceberg. Next we?re going to look at Google?s historical record of everything we?ve ever done online. How to Pause Google?s Web and App Tracking Google keeps a historical record of all of your Google searches and other online activity to cater their results to you. While you are signed in to your Google account, go to myactivity.google.com to review your activity. You can scroll through years of your personal search history, YouTube videos you?ve watched, apps you?ve used, and more. Go to https://myaccount.google.com/ while signed in with your Google account. This time, on the left-hand side, click Data & Personalization. Look for Activity Controls.   From there, select Web & App Activity. You can pause all web and app tracking by clicking the blue switch on the right. This will prevent you from seeing relevant search results or recommendations that are catered to you. It doesn?t delete the tracking data Google has on you, but we will go over that in the next step. Google will warn you that they still might temporarily use information from your recent searches in order to improve […]

Tip of the Week: Taking Your Password Practices to the Next Level

Don?t Neglect the Tried and True Rules While we want a password to be easy to remember, we also don?t want it to be easy to guess. This is why we can?t help but shake our heads at the top-15 results of an analysis of data collected from the security website Have I Been Pwned: 123456  123456789  qwerty  password 1111111  12345678  abc123  1234567   Password1 12345  1234567890 1123123  000000  Iloveyou 1234  Many of these passwords clearly break some of the cardinal rules of password security, such as ensuring that there is a mix of character types included in the password, making sure that the password is of sufficient length, or using obvious words, like ?qwerty? or ?password.? What?s worse, it is probably a safe bet that many of the owners of these passwords had a tendency to recycle them across their accounts, putting more of their accounts at risk. None of this is a good thing for security, of course.  You definitely should not be using the same password to get into different accounts. This is not a good practice. The reason is pretty easy to explain: If a password were to be compromised for one account, that would mean that multiple accounts would be compromised.  A Proven Means of Securing Your Accounts There are several different ideas about how to do this. One means is to use a passphrase – a series of random words, rather than characters, that is both significantly more secure than most passwords and is easier for a user to remember. However, as is so often the case, you can start to encounter difficulties once the human element is introduced. We, as a species, tend to gravitate towards patterns, so we have difficulties creating a truly random series of words in our own. To counter this, an IT professional named Arnold Reinhold developed Diceware, a reliable means of generating a passphrase for yourself. Referencing the Diceware word list, roll five dice (or one die, five times) and find the corresponding word to the values you rolled. Repeat this process until you have a total of six or seven words, and you?ve got your passphrase. Why the dice? Simple – it makes it much more random, even than a user ?randomly? selecting words from the list of potential words to include. A Demonstration Let?s say we were to use this method now, and rolled the following number sets: 21633 16521 31336 13263 52452 33535 Referencing the word list, this gives us the following words… Criss Choke Gluing Bambi Rust Ice …and, as a result, our passphrase. The webcomic xkcd provides an illustrated explanation of why passphrases are so effective: However, many users will understandably hesitate to use passphrases, because this means that – assuming they subscribe to best practices – they will have to remember a series of six completely random words for each of their accounts. This is where password managers prove their worth. Utilizing a password manager to save your passphrases, and securing it with one, allows you to optimally secure your accounts without the need to worry about forgetting all of your access credentials. For more means of improving your business? use of technology, subscribe to our blog, or reach out to us directly at (603) 889-0800.