Password Practices that Work to Secure Your IT

How to Create a Secure Password The best passwords are ones that are easy to remember while being difficult to guess. Furthermore, they need to include letters (both upper and lower case), numbers, and symbols. The problem is that these security measures make the password difficult to remember, making it an inconvenience whenever you have to use it. The best way to make sure this doesn?t become a problem is to use what are called passphrases, or alphanumeric phrases that are designed to be easy to remember while still maintaining security standards. Making too many passwords that are complex or hard to remember means that any progress you?re trying to make could be halted before it even begins. There are solutions like the password manager that make ?remembering? your passwords much easier. Password managers assign one complex password as the ?gatekeeper? password, meaning that the only one you?ll need to know to access your secure database of passwords is the gatekeeper. Two-Factor Authentication Passwords are most effective when there is a secondary method of authentication that can guarantee the authenticity of the one plugging in the password. Two-factor authentication is a way of guaranteeing this authenticity. A passcode can be sent to a mobile device via a text message or phone call, or a biometric code like a thumbprint or face scanning software can detect the user?s identity. Regardless of what the method is, a two-factor authentication solution makes it less likely that a hacker will be able to infiltrate your account, as it means they either need to do twice the work or get their hands on a device that?s connected to the account. More often than not, they?ll see it as something that?s simply not worth the effort. White Mountain IT Services wants your business to take password security seriously. To learn more about password management tools and two-factor authentication, reach out to us at (603) 889-0800.

Tip of the Week: Bring Your Own Device Policy Considerations

First, let?s take a look at some of the basic principles of BYOD. Basically, instead of an employee being given a device by your business, they use their own personal devices for work purposes. Why BYOD Has Become So Popular On paper, BYOD seems like the perfect solution. Businesses that take advantage of BYOD practices can save up to $350 a year per employee and using portable devices for work purposes can save employees about an hour per workday, as well as improve productivity by up to 33 percent. Other benefits include, but are not limited to, the following: Access to Better Technology You might have a laundry list of technology solutions you want to implement, but at the end of the day, you?re at the mercy of your budget. You always run the risk of a new solution affecting your operations in a negative way. While this might have an effect on your decision making for business technology, your employees have a different mindset, replacing devices as they want. It?s more likely that your business? employees will replace outdated technology, leading to happier and more productive employees overall. Reduced Financial Toll on Businesses Your technology acquisitions will largely be driven by the budget behind them. For example, you might want to replace your workstations, but if the budget doesn?t allow for this, then it just simply can?t happen. Rather than hope your budget accommodates these changes, you can instead give your employees the option of using their personal devices, freeing your business from the responsibility of acquiring said technology. The expenses of BYOD are basically limited to securing access to information and implementing it. Employee Satisfaction You might find that your organization?s technology simply isn?t pleasant to work with. Forcing productivity is rarely effective, and aging workstations certainly aren?t going to make the process any easier when they have just bought a shiny new laptop. If you force employees to work using technology that doesn?t work properly for no good reason, they will naturally push back. You avoid this situation entirely by giving them permission to use their own devices. The Potential Issues with BYOD Distractions Compared to the amount of productivity applications on the app stores, there are plenty of ways to get distracted by BYOD. While you can whitelist and blacklist applications on your company-owned devices, you don?t have too much control over devices your employees utilize. Loss of Control Losing control of devices is a recurring issue for businesses, especially with BYOD on the playing field. Policies can be put in place, but they require the employee?s consent, which they are probably not going to give. What happens if an employee leaves with company data on their device? What if they are careless with the way they access this information? All of this needs to be considered. Compliance Shortcomings How will your BYOD implementation interact with other parts of your organization, namely compliance? Requirements put in place by laws like HIPAA and Dodd-Frank mean that IT administrators need to be particularly aware of how data is being distributed to BYOD devices. How Do You Leverage BYOD Securely? The best way to make sure BYOD is being managed properly is to work with a managed service provider with professional IT technicians on staff who can help you […]

How to Avoid Business Complacency

I want you to think back to how your business operated just a few short years ago. How similar was it to the way you currently do things? Hopefully, not very. Consider this: in 2013, mobile technology was just starting to become more commonly used for computing than the PC. In 2016, ?unified communications? was still a buzzword, and collaborative solutions were experiencing widespread adoption. Today, just a few short years later, these are some of the basic solutions that all organizations should be leveraging. Many businesses can easily fall into the trap of believing that their past success guarantees more of the same in the future. This comes with a few operational and behavioral warning signs. For example: Are any potential changes or growth opportunities avoided or rebuffed through the use of highly selective facts? Do conversations amongst your team skirt around topics like new markets, possible competition, or other developing business opportunities? Are failures used to postpone new attempts instead of as learning moments? Do meetings frequently end in a holding pattern? These factors all signal that a business has slipped into patterns that are comfortable, rather than habits that are operationally sound. ?Okay? becomes the standard, as do shortcuts and cut corners. The question is, do you want your business to be ?okay?, or do you want it to be a success? Fortunately, once you?ve identified it, there are many ways to mitigate complacency. Ask yourself a few more questions about your business, its policies, and its culture: Is there any way that your processes could be made more efficient? Is your service offering a good fit for your current audience? What needs will they have in the near future? Are there any technologies that could soon cause a disruption in your market, or could be used as an invaluable tool? How engaged are your employees? Many of these questions will require a big-picture perspective of both your business and your industry. Macro-views like these can be challenging, especially when one is accustomed to the micro-perspective into a single business. Answering these questions on your own will prove to be challenging as well, and then you still have to resolve any issues that they unearth. White Mountain IT Services has plenty of experience with managing the technology that businesses rely on to be successful and efficient. While up-to-date technology isn?t the only thing necessary to avoid becoming complacent in business, it is a good start, and one that we can help with. Reach out to us at (603) 889-0800 to learn more.

Fix Any Bit of Data Leakage

Many organizations have a lot to lose through data leakage, where it makes its way out of your protected infrastructure and into an unprotected environment. To make sure your operations aren?t affected by these complications, you need to ensure that data leakage is something that can?t occur. The first step to making this happen is understanding why and how your data is leaking. The Three Kinds of Data Leaks All types of data leakage can be attributed to one of the following categories: At Rest: Data that is in storage, waiting to be accessed. If your data is stolen from a database or from a workstation, your data is stolen while at rest. In Transit: Data stolen while in transit is intercepted on its way to a particular location. This can happen if sensitive information is left unprotected in an email or in your web traffic. In Use: This kind of data leakage happens while the data is being actively used. The way this happens is if an insider threat is able to take screenshots or documents out of the office where they don?t belong. Securing Your Data Against Leaks There are several methods of keeping data leakage to a minimum. First, you need to educate your users about the risks associated with data leakage. While you might be aware of the data that should and shouldn?t be shared, this doesn?t mean that your employees know too. It?s your job to make sure that your employees are aware of how they can keep data from leaking into the wild. You can also implement IT solutions to keep data leaks from influencing operations. Here are a few of them: Encryption: Encryption is the biggest way you can keep your data safe. It effectively renders any data stolen from your organization indecipherable without the proper decryption key. Content Filters: You can prevent certain threats from even making their way to your infrastructure with the right content filtering solution. These can also alert the administrator of suspicious data transfers. Access Control: The fewer people who have access to data, the fewer the chances that they will leak it, either intentionally or on accident. Keeping close watch on data access and permissions is one way you can cut down on unnecessary risk. Hopefully you can use these tips and tricks to minimize data leakage for your organization. To learn more, reach out to us at (603) 889-0800.

Tip of the Week: A Few of Chrome?s Native Capabilities

The Omnibox and Its Search Capabilities While this area was traditionally called the address bar, Google calls theirs the Omnibox. The Omnibox is capable of many things, but since Chrome is Google?s browser, it is only fitting that the Omnibox has some of its clearest strengths where searching for content is concerned. Search in a New Tab While most people know that you can conduct a Google search simply by typing a query into the Omnibox, fewer may be aware that they can open this search in a new tab by pressing Alt + Enter. Even fewer likely know about how they can actually search within a website itself, although this does take some management. Search in a Specific Website Let?s say that you have a particular website that you frequently utilize as a resource. If you use it enough that you want to narrow your searches to that site in particular, Chrome allows you to do so. Once your IT team has given you the go-ahead to play with your Chrome Settings, access them and navigate to Search engine and from there, manage search engines. There, you?ll see the list of websites that you can potentially search directly from the Omnibox. To do so, type the URL of the website that you want to search within. On the far right of the Omnibar, you should see a prompt, urging you to press Tab to search that website. Do so, type in your query, and press Enter. Instead of bringing you to a Google results page, you should be brought directly to the results page of the website you entered, showing the results of the query you typed. Search for an Open Tab Of course, we?re all also guilty of opening tab after tab after tab, only to lose the one we were trying to work on or reference. Chrome offers a handy way to get it back. If you start typing the URL into the Omnibox, supported sites will offer a Switch to this tab option, allowing you to do so quickly. Tab Management Functions Speaking of tabs, Chrome offers many capabilities that a user can leverage to simplify their use of them. This includes general browsing. Jumping Between Tabs For instance, while we?re on the topic of working with multiple tabs, Chrome allows a user to quickly jump to another one with a simple command. Holding CTRL while pressing the number of the tab (1 through 9) will open that tab, allowing your work to go on with minimal interruption. Moving Multiple Tabs It can also be helpful to divide a mass of tabs into different windows, making it easier to reference one while working on another. To drag and drop multiple tabs, just hold the Control Key as you select your pages and you will be able to maneuver them as one. Reopening Closed Tabs Show me someone who hasn?t mistakenly closed a tab in Chrome, and I?ll show you someone who?s probably fibbing. We?ve all done it, and we can all undo it by pressing Control + Shift + T. Alternatively, you can open a new tab, right-click it, and select ?Reopen closed tab?. Again, there are many more Chrome features to be shared that we didn?t mention here. What are some of your most-used Chrome […]