Can You Recognize the Risks that Appear in Your Email?

In short, it amounts to being as vigilant as you can be. You should always be looking for reasons not to click on links in your emails if you can help it, as it?s better to err on the side of caution than risk suffering from a data breach or malware infection. Here are three warning signs to look for in a potentially malicious email attack. Spelling and Grammar Errors The first warning sign of a fraudulent email is that it?s filled with all sorts of spelling and grammar errors. Professional messages sent from reputable sources will likely have passable grammar, but if it?s incoherent and difficult to understand, chances are that the message is risky at best–especially if it contains links. There are always exceptions to this rule, however. Phishing emails are often so discreet that it can be difficult to identify them through this method. Therefore, you?ll have to keep other information in mind when clicking on any links. Links Leading to Obscure Targets Sometimes you?ll get an email and you won?t be sure if it?s fraudulent or legitimate. In cases like this, it?s always best to approach the link carefully by making sure that the link leads to where it claims to. You can do this easily enough by simply hovering over the link with your mouse without clicking on it. You?ll see the linked URL right in a little bar at the bottom of your browser showcasing the link target. If it?s not something that it should be linking to, stay away from it. Messages from Unknown Senders Another major red flag that gives away the nature of a message (and its links) is who is the actual sender. If it?s from someone who you don?t recognize or someone who you don?t think should be reaching out to you, immediately reconsider clicking on any links or messages found in it. Even if the sender is known to you, but the message is suspicious, you can see if the email address matches anything that you have on record for that user. If it doesn?t, you know that you can?t trust whoever sent the message to you. In a worst-case scenario, you could be looking at a phishing or whaling scam, in which case you want to notify your IT department immediately so that proper measures can be taken. The good news about suspicious or fraudulent emails is that you can keep the majority out of your inbox with an enterprise-level spam filter. The bad news is that even this sometimes isn?t enough for more dangerous threats. As we said before, the best security measure you can implement is good old-fashioned caution. If you teach your employees how to effectively identify threats, they will be more likely to avoid them; or, better yet, they?ll report them to IT for proper analysis. To learn more about security tools and training, reach out to White Mountain IT Services at (603) 889-0800.

Spring Cleaning Your Business and Its Technology

Why You Want to Keep Your Technology Clean, Inside and Out If your business is like most, you rely on technology to help manage things. While your particular operations may use different solutions than one in another industry will, your technology is an essential piece of your business. Therefore, you need to make sure that it can meet two criteria. First, it needs to remain in proper working order, and secondly, it needs to be organized so that the resources you rely on it for are easy to access and utilize. In order for these criteria to be met, your office technology needs some attention to both its physical components, and the information those components give you the ability to store, access, and edit. Furthermore, an unkempt technology strategy can have some detrimental effects to your overall productivity and even your general success as a business. Benefits of Digital Office Organization First, consider the state of your digital file storage. Is it organized properly, with documents and resources saved in the correct folders, with proper labelling and an intuitive, hierarchical system? If not, it will do you quite a bit of good to take the time and organize these files so that they can be found for reference more easily in the future. This is because this organization will enable you and your employees to find the things you need more easily, which means you and your employees will therefore be able to find them more quickly. This creates time savings that, while apparently insignificant when considered individually, can add up to be fairly significant after all. Secondly, taking the time to establish a filing system will also give you the opportunity to audit your old materials as you organize them into it. Perhaps some of them are due to be revisited and updated, and others are outdated to the point where they can be archived away or deleted safely. Going through your materials and making this call can easily save you some headaches in the future, and help build beneficial habits for the future. If part of your clutter problem is due to your reliance on physical files that are stored in bulky filing cabinets around the office, you might consider adopting a digital file storage solution and starting off with this hierarchical system in place. Not only does this make sense from a financial standpoint (fewer paper files means less paper and ink to buy), it is also environmentally responsible and allows you greater control over who in your organization has access to particular files. Organizing Your Inbox We?ve all learned the hard way how easy it is for a mess to pile up, and few places make that piling up more visible than your email inbox. While you know that there are certainly important messages mixed and buried in there, there?s also going to be plenty of conversations that you were privy to, but not really involved in, or situations that have long since been resolved and no longer require your attention. However, while these messages may not currently seem important, there is always a chance that they will be at some point in the future. It is better to take messages like these and, similarly to your business data and files, create a filing system to […]

Can You Spot the Signs of a Malicious Link?

The Internet is notorious for being a minefield of threats, many of which lurk hidden behind innocent-looking links. In order to go about business safely, you need to be able to identify which links you can click; and, which should be skipped. Unfortunately, spotting fraudulent links isn?t an exact science, but there are ways to become proficient at the art of it. Trust No One… …or at least, trust no one?s links. It is exceptionally common for malicious links to be shared through emails or social media messages. In your email client, an easy check is to select the option to view the full header of the message. This will allow you to view the sender?s full email address, as well as the reply-to address, enabling you to judge if the sender is legitimate. If it just so happens that one of your regular contacts has sent you a link without any context, it is better to reach out to them through some other means to confirm that they did, in fact, send you the mysterious link. Similar actions can take place over social media accounts. Less security-savvy contacts can easily have their accounts hijacked to spread a malicious link, and so you should always be careful of messages that come without warning — even if you know and trust the apparent source. Sometimes, an attacker will create a clone of someone?s social media account to try and trick their target into accepting friendship. While this may seem initially harmless, keep in mind that the person behind the account now has access to a running record of your activities. Further Defenses It is also important to remember that the attackers that use these messages are becoming much more convincing. Many of these phishing attempts will draw upon data stolen from other breaches or drawn from any online accounts to make their attempts more convincing. Your best defense against links like these is to hover your cursor over the questionable content to see if the link matches what it should. In addition to these practices, you should also keep an eye out for egregious misspellings in the surrounding message, as these are an excellent sign of a malicious attack. Google Makes Its Move Google has adopted a policy of flagging any website that doesn?t have a Secure Sockets Layer, or SSL, certificate. This means that, in order to avoid your website displaying with a prominent ?Not Secure? in the address bar, you need to obtain a certificate as quickly as possible. Not only will this encourage a sense of trust from your web visitors, it will encrypt their sensitive information and keep them safe from cybercriminals. Now that you know how to identify malicious links like these, you should call White Mountain IT Services so that we can stop as many as we can. Call (603) 889-0800 for more information.

Ditching the iPhone for an Android Phone Doesn?t Have to Be Complicated

Evaluating Your Application Needs The more time you spend understanding the Android platform before you switch, the better off you will be. The first thing you should do is review the apps you use most often or are required to use for work reasons. Are they available through Google Play or the Amazon App Store? If so, you will have to repurchase them on that platform, which will require some additional investment. This also provides you with the opportunity to consolidate the apps on your mobile device to only include those that you actually use – and of course, it isn?t as though you can?t stagger some of your non-essential downloads to minimize the financial fallout. Deactivating iMessage Once you have planned out which apps will be the first you install, you next need to be sure that your phone will be able to send and receive text messages. Because Apple?s iMessage utilizes a Wi-Fi signal, something an Android phone cannot do, you will not be able to receive any text messages from iPhone users until iMessage is deactivated. Apple has a page dedicated to this task that allows you to preemptively turn off iMessage, or to do so even after you no longer possess your iPhone. Take a Backup on Google Drive To make transferring your data from one platform to another much easier, Google Drive offers a simple solution in its native backup wizard. The first thing you have to do is install Google Drive and log in, assuming you haven?t done so already. Then, by accessing Menu > Settings > Backup, you can save whatever content is on your iPhone to your Google Drive. You have the option to backup everything by clicking Start Backup, or to pick and choose what to include and what to abandon. This process can take up to several hours, so it is advisable to use Wi-Fi and make sure your iPhone is plugged in as the backup is taken. Then, once you have your new Android device, all you have to do is sign in to Google Drive from there. It is also worth mentioning that some Android phones have apps that assist with this process, making the switch even easier. What has inspired you to make the switch? Share your reasons in the comments, and be sure to subscribe to our blog to be notified of our new posts!

Tech Term: Virtualization

What is Virtualization? Virtualization is the process of replicating some physical resource (like a server, desktop, operating system, or storage solution) in digital form to increase scalability, thereby helping a user manage a workload. Simply put, virtualization makes your equipment behave like more than one would. Using what is known as hypervisor software, one physical resource (the ?host?) can be divided into virtual environments called virtual machines (the ?guests?). These guests can draw on the resources of the host as needed from a shared pool, allowing more functionality from a single piece of hardware. In this way, virtualization can help you to maximize the return on investments you?ve made, as well as potentially decreasing the investments you will have to make down the line. Varieties of Virtualization There are various types of virtualization, each with its own applications toward a business? functionality. Data Virtualization – This kind of virtualization helps to gather disparate information and data and assemble it into one source. Operating System Virtualization – Multiple operating systems can be hosted and run on a single computer. Desktop Virtualization – Replicated desktops can be opened and utilized. Server virtualization – One server can be made to act as though there are multiple servers in use. Network Virtualization – One network can be used to create multiple isolated networks. How could your business improve operations by leveraging virtualization? Reach out to us at (603) 889-0800 to find out!