The Chrome Browser is Redefining Your Security

How Chrome is Shaking Up the Conventional Advice There are two major types of websites out there, HTTP and HTTPS. The primary difference between them is that the one with the S at the end signifies that the data was sent through a secure connection, meaning that there are extra layers of security there to shield it from any prying eyes. It?s been a best practice for a long time to make sure that any sensitive data sent to or from a website utilizes a secure connection. This is done by looking for the padlock icons in the address bar. Google is finally stepping up its game by labeling businesses that don?t encrypt their communications with their host server. Chrome will notify users when they are surfing a site that isn?t using HTTPS. The idea is that this is supposed to put the pressure on websites that have yet to adopt HTTPS. Since Chrome is the most popular web browser, it makes sense that this approach could spark a revolution in website security. So far, the approach is seen as ideal by security professionals. What Are Other Browsers Doing? The other major web browsers, Safari, Firefox, and Edge, also have some plans for how they will handle unencrypted websites in the future. However, not all of them plan on flipping the script in such a dramatic way. Firefox: It?s likely that Firefox will follow a similar path to Google Chrome. Firefox is still subscribing to the ?confirming the page is secure? method. Firefox will also tell you whether or not the HTTP page contains a login form with a padlock that is stricken through. There is even a warning that pops up when the cursor moves over any of these fields. In the future, the browser will display all HTTP pages with the strike-through padlock, even if there aren?t any forms. Safari: Apple has yet to deviate from tradition. By this, we mean that the browser just confirms that the connection is secured by showing the lock. However, Apple has taken other, different steps toward ensuring the security of its users. If a user attempts to log into an HTTP page, the page will inform them with alerts popping up into the field and the address bar, much like Firefox does now. Edge: Microsoft Edge only tells a user when a page is protected, but there are other options in place that allow the user to access even more information about their connection. This information can reveal if the connection isn?t encrypted, identifying it a potential risk. This same feature doesn?t extend to the input fields on unencrypted pages, though. We don?t feel like Edge is doing enough to warn users about unsafe browsing. Are you unsure of how to keep your business secure? Reach out to White Mountain IT Services at (603) 889-0800.

Getting to Know Technology: Username

The username is the name given to a user (or in some cases the computer or network) and is typically some abbreviation of the user?s, computer?s, or network?s name. An example would be if a user?s name is Brett Hanson, a strong username would be hansbr. It is strictly for identification purposes in the database that holds access information. In some cases, a username might also simply be your email that you use to sign up for a service, or it may also be a display name for people to find you on a service. For example, the popular payment app Venmo uses the username as a way to send someone cash. Making your username easy to remember and share may be a benefit. Other times, you may want to make your username something more unique and less identifiable. One such case would be in regard to your bank account username, which typically shouldn?t be guessable. Combined with strong, unique passwords, unique usernames can add one small extra step to make it slightly harder to get into your accounts. Username Best Practices Coupled with your password, your username is important as it is essential for access. Since it?s the key to a user?s identity when trying to access data and applications, it is important to follow some best practices. These include: Pick a username you can remember – Most services have a password retrieval or reset tool attached, but not many have a tool that allows you to retrieve your identifier. Keep it simple. Never use personal information – Information like your social security number should never be used as a username or password. Your social security number is a coveted piece of information that, if attained, can cause you a lot of personal grief. Other sensitive information to avoid would be your date of birth, any contact information, or anything else you wouldn?t want a total stranger to have. Take into account the platform you are signing into – If you want an account to stay anonymous, for example, ensure that your username is something obscure or is set to not show. We use usernames every day, so the more you are cognizant of how to best utilize them to your advantage, the better. For more great technology information contact us today at (603) 889-0800.

Why (and How) SMBs Should Strategically Adopt Technology

There is no question that a small business can benefit from technology, as has been proven time and time again. However, an issue can arise if a business bites off more than it can chew, so to speak, and ultimately creates a spike in costs. A responsible business owner will resist this temptation and prioritize the solutions they need over the ones they want – building profitability and generating capital needed to make other improvements. In this blog, we?ll examine some of the implementations that can deliver a good return on investment to a small business. Managed IT Services For the small or medium-sized business seeking maximum value for their dollar, managed IT is a great choice. For a predictable, scaled monthly fee, a managed service provider (also known as an MSP) will make sure that a company?s information technology solutions are functional before a problem or issue arises. What?s more, a relationship with an MSP can also provide invaluable access to specialized vendors, enabling you to leverage some of the best solutions available. As alluded to above, one of the biggest values that an MSP provides is in the hands-on experience that its technicians have, both on-site and remotely. A company whose solutions aren?t in working order is a company that is hemorrhaging money via downtime, and so it is crucial that a company in this situation has the means to resolve and ideally avoid downtime, continuing its productivity and revenue generation. One of the biggest benefits to investing in managed IT services is the speed at which you will see a return on that investment. Comparing the cost of an MSP?s services to the multitude of costs that these services help you avoid will help to illustrate how much an MSP can help you. How much are you spending on break/fix services, hiring and onboarding an in-house technician, updating and upgrading your hardware and software, and weathering downtime? All of these costs can be consolidated and/or eliminated with an agreement with an MSP. Hybrid Cloud The cloud is growing at an explosive pace, and for the business or organization with specific needs where accessibility and security are concerned, a hybrid cloud platform may be the best strategy to leverage this industry-shaking technology. Private clouds, while secure, are costly to implement and maintain. Public clouds are more affordable, but there are some major concerns among businesses at the thought of blindly entrusting crucial data to another organization. While the security of such methods is improving, there is an understandable need for control among many business owners that disqualifies the public cloud as a viable option. The hybrid cloud is the integration of these two halves, joined together to eliminate the downsides while preserving the advantages. This also provides control over a business? data and applications while allowing the scalability to leverage it as needed. Arguably best of all, the hybrid cloud can add the productivity that your business needs to increase revenue and profits. These reasons are large contributors to why the hybrid cloud is swiftly being considered an inevitability for all businesses by many industry experts. Bring Your Own Device (BYOD) Nowadays, just about every business has a wireless network. This has led, in conjunction with every employee coming to work with a smartphone in their pocket, to […]

Three Reasons VoIP is a Great Choice for Businesses

A Voice over Internet Protocol solution provides your organization with unprecedented flexibility and functionality. We?ll go over some of the best ways that your organization can leverage VoIP for its benefit. Freedom The corded desk phone is a major limiting factor for your business. Since you?re usually tied to the desk while you?re using a traditional telephone system, it can be freeing to use a VoIP application on any connected device that you want. Whether it?s a desktop computer, a laptop, or a smartphone, you?ll be able to stay connected to your workplace number and contacts with a cloud-based VoIP solution. As long as your device is connected to some sort of network, you can use VoIP anywhere and anyhow you like. Flexibility Usually, a business will go into their venture with some sort of idea about how they want their infrastructure to be set up. The same can be said for implementing a telephone system, as wires and terminals need to be placed in the office. As such, it can be challenging to change a physical infrastructure without it becoming a major pain. A cloud-based VoIP system allows your business to make changes to your phone system without making drastic changes to your infrastructure. You can add new numbers or users to your infrastructure without running new cables or knocking down walls. As long as your Internet connection and network infrastructure can support the increased bandwidth, you should be fine. We recommend consulting with your IT provider to make sure your network is ready for VoIP. Functionality A traditional telephone system is generally subject to the all the bells and whistles that your provider wants to offer you. This means that in order to take advantage of a phone system, you might have to pay for services that are bundled with it. You might need the ability to make a phone call, but you certainly don?t need the 300 channels of cable television that are bundled with it. A VoIP solution lets you bypass this by customizing the solution to make your ideal telephone system. You can leverage traditional features like conference calling and voicemail alongside optional buy-ins like instant messaging, video chat, and more. You only pay for what you need. Plus, many hosted VoIP solutions give you more features for less money than traditional PBX phone systems. Does your business need hosted VoIP? To find out, reach out to us at (603) 889-0800.

4 Internal Threats Every Business Owner Should Understand

A lot of times, the problems a company has with its network and infrastructure come from the inside. There are countless ways your employees can cause a major security problem for your business. They include: Retribution – Disgruntled employees can often be a problem for a business. This is no more evident than in its IT. If the employee is dissatisfied with elements of their job, they could conceivably take it out on the business. They can delete information, deliberately bring malware onto your network, or just be blatantly negligent to situations and your network can end up having many major problems. Moreover, if an employee is crafty enough, he/she could conceivably hide their betrayal; or worse yet, access the network after they?ve left the company. To handle issues like this, promptly removing access to the network after a former employee leaves the company is one way to mitigate issues; while constantly monitoring workstation behavior can give you a precise idea on just how these types of issues can be unleashed in the first place. Trickery – Hackers today realize that a frontal assault on a business network is mostly impossible, so they attempt to get in any way they can. If your employees haven?t been properly trained to decipher the telltale signs of a social engineering attack, they could put your company in a lot of danger. Having a strategy to train your staff on the best practices of handling emails and extensions can go a long way toward keeping malware and unwanted visitors off of your network. The more they know how to protect themselves, the better they can protect your business. Subversive Activities – The computers that your employees use are essential for productivity, sure, but they are also attached to one of the biggest distractions in human history: the Internet. Since there is an endless amount of content online, sometimes viewing that content can get in the way of their productivity. Some employees will go even further, viewing content that is highly inappropriate for work and could pick something up along the way, putting your network in jeopardy. To ward against this, content filtering is a great option. It gives you the opportunity to block certain websites by a per user basis. By being able to control the content that your employees can access, you can eliminate a lot of distractions, while also controlling your network against the threats third-party sites can bring. Leaking Data – Some employees could want to take information out of the sanctity of your network. Some are simply looking to be productive outside of the office, while some may just be looking to take data for personal or professional gain. Whatever their reason, it can be a big issue when people?s personal information is at stake. One solution to this is hosting information in a secure cloud server with dedicated access control. Giving your employees the option to do more away from the office is a great strategy, while preventing them from accessing information they don?t need can go a long way toward protecting that information and your network. If you would like more information about how to mitigate threats to your network and data, contact the certified professionals at White Mountain IT Services today at (603) 889-0800.