How to Avoid the Pitfalls of Public Wi-Fi

Here are some of the reasons why a public Wi-Fi connection isn?t as secure as you might hope it will be, and what can be done to limit the risk factor. The Real Dangers of Public Wi-FiIf you stop into a location just to use their Wi-Fi connection with your smartphone, you?re doing so because you would rather use their connection than your own mobile data plan. You might choose to stop into the local coffee shop with hopes that you can find a connection. There is one, but it?s not protected by a password. This might come off as convenient, but it should also create a red flag in your mind. There is always the chance that your activity is being monitored by nosy onlookers. Hackers tend to gravitate toward busy public wireless connections for the express purpose of stealing information and looking for sensitive data. There?s nothing keeping a hacker from accessing these networks, as they are practically devoid of any security features. Your business needs to have measures put into place to ensure that this doesn’t become a detriment to your organization. Password Protection is ImportantYour in-house network is secure because you require credentials to access it. These passwords should always be implemented. If you don?t, it could mean that your organization?s network is wide open to anyone who wants to use it. We actually recommend setting up multiple wireless networks; one for your in-house employees, and one for your office?s visitors. You can even partition off your network so that specific resources are delegated to both your in-house workers and your visitors. If you?re accessing a public wireless connection, it?s important that your business has an encryption solution put into place to make sure that any data sent to, and received by, your devices is protected. If there is a wireless access point available, make sure that you don?t connect to it unless it requires a password. Just ask around the establishment if you need one. Implement a Virtual Private NetworkA VPN is the best way to make sure that your company?s data is secure while out of the office and on unprotected networks. VPNs take advantage of encryption by scrambling your data while it?s in transit. Anyone hoping to catch a glimpse of your data will only see a jumbled mess, making a VPN an incredibly valuable solution. Does your company need a VPN? White Mountain IT Services can help. To learn more, reach out to us at (603) 889-0800.

Four Things Your Antivirus Fights

The reason why businesses might not want to implement an antivirus solution is a rather silly one. They might believe that they are too small of a target to be noticed by hackers, but this is simply not the case. Even the smallest of businesses have data that is of considerable value for hackers. That?s the reason why information like Social Security numbers, credit card numbers, and other personally identifiable information is sold on the black market. Therefore, any organization that stores this information is at risk to threats–and let?s face it, pretty much all companies have this information somewhere on their infrastructure. Basically, there?s no reason to put your company at unnecessary risk. Antivirus is an ideal way to mitigate common threats that your organization could come into contact with. Antivirus is a bit more reactive compared to other security measures, but it?s an important one nonetheless. The longer you let threats linger on your network, the more danger your company is exposed to. Here are some of the many cyberthreats that can be eliminated with the use of antivirus software. Viruses: Viruses are bits of code that can be anything from funny, to inconvenient, to downright threatening. There are too many varieties of viruses to share here, but know that just about all of them will harm your network. Malware: Malware, or malicious software, comes in a huge variety, and as such, it?s hard to truly prepare for all of them. You can be certain of one thing, though; the name ?malicious? software is no joke. Spyware: Spyware is a variant of malware that is designed to infiltrate and lurk on a network to steal information. As such, it?s capable of being a considerable issue for your organization. Trojan: Like spyware, a trojan is designed to hide on a network and open up the way for a future attack at a later date. This provides you with the opportunity to root it out and eliminate it before it causes problems. More advanced threats are a bit more difficult to remove from your network. Ransomware is almost impossible to remove. This always highlights the importance of a multi-faceted security system that includes not just reactive software like antivirus, but proactive solutions like firewalls, spam blockers, and content filters. Thankfully, these enterprise-level solutions are easy enough to take advantage of, and it?s all thanks to a Unified Threat Management (UTM) tool. A UTM is a valuable tool that lets your organization take advantage of powerful enterprise-level solutions without breaking the budget. To get started with a UTM, contact White Mountain IT Services at (603) 889-0800.

Tech Term: Understanding HTML and Plain Text

When all is said and done, the true difference between these two terms is how much information each conveys. HTML HTML, or Hyper Text Markup Language, is the language that most web browsers accept as the standard for web content. Developed at CERN, or the European Organization for Nuclear Research, by Sir Tim Berners-Lee in the 1980s, HTML provides a browser with tags that dictate how a web page?s content is to be displayed. HTML is the reason that this sentence can be displayed separately from the other content on this page. A web browser takes the HTML code and translates it into a layout that can be read by a user. HTML is the reason that web content can appear bold, italicized, or can be anchored to other pages online. It is no exaggeration to say that the Internet itself was built on the basis of HTML. Plain Text In contrast, plain text is the text with most of its formatting stripped away. While basic formatting and punctuation, like new paragraphs and commas, are preserved, stylistic elements are removed. Any fonts or specialized formatting are stripped, leaving just the bare-bones content. While HTML is used to create fancy, stylized text that draws the eye, plain text is simply what it sounds like – simple, unformatted text. On the modern web, you rarely run into plain text sites, but over a decade ago many sites opted to have plain text versions for slower dial up connections. Email Uses Of course, HTML and plain text have applications other than in web design – they can also be used to stylize or simplify email messages. This is entirely based on what kind of email you?re trying to send. HTML can help you create a dynamic, attention-grabbing email, while plain text allows you to simply and honestly share a message. HTML and plain text also each have advantages and disadvantages in email usage. HTML allows you to tell a more visually dynamic story, ultimately boosting your ability to brand your emails. Furthermore, the more clickable HTML format also enables you to send emails and track their open rates. Unfortunately, for all its features (and partially because of them) HTML is more likely to be put in the spam folder or sorted into a folder that isn?t read nearly as often. On the other hand, plain text can make emails easier to write, as formatting is essentially a non-issue. They also can be read on any device, and rarely, if ever, have any deliverability issues. However, plain text isn?t the most visually appealing, which makes it less likely to be clicked. Then again, plain text also can?t be tracked, which means that you have no idea whether or not your email was successful unless it is brought to your attention. Are there any other tech terms that you?d like to learn more about? Let us know in the comments!

Small Business Communication Options to Boost Productivity

Here are some of the best ways that you can foster communication in your organization, in no order. Consider an IntranetThose who might not know much about technology will be somewhat hesitant to adopt it. This can make implementing a unified infrastructure tricky, as you might encounter users who have no clue what they are doing. After all, they?re going to need to access important files on a company network or accessing your cloud solution for sharing information or software. You can use an intranet to connect these employees to important resources that they might need on a daily basis. This acts like a central hub where all of your business’ assets can be found in a moment?s notice. This allows you to minimize the risk of confusion or miscommunication. Use Common Communication SolutionsIf you don?t have a unified communications solution already put in place, it?s extraordinarily proficient at keeping threats out of your network and infrastructure. Unified communications consists of a unified email server, a phone system where each employee has their own individual extension, and instant messaging for quick and easy communication in a moment?s notice. These solutions can be hosted either on-premise or in the cloud–in fact, Voice over Internet Protocol, or VoIP, is the preferred method of telephone communication. By providing your employees with several mediums to reach out to each other, you are giving your team the means to be as productive as possible with their time. Make Important Information Easy to FindIf you?re hoping that you can find information about a solution your business uses online, perhaps there is an easier way to accomplish this same goal. Your company can benefit from implementing some sort of documentation system where frequently asked question are stored and compiled. This can help your business accumulate knowledge and cut down on time spent asking repetitive questions, as well as eliminate a portion of training for more self-driven lessons. It essentially provides your employees with the autonomy they might crave. What are your business’ specific communication needs? White Mountain IT Services can help you meet them. To learn more, reach out to us at (603) 889-0800.

Can You Spot the Bait in a Phishing Attack?

Phishing attacks come in many different forms. We?ll discuss some of the most popular ways that hackers and scammers will try to take advantage of your business through phishing scams, including phone calls, email, and social media. Phishing Calls Do you receive calls from strange or restricted numbers? If so, chances are that they are calls that you want to avoid. Hackers will use the phone to make phishing phone calls to unsuspecting employees. They might claim to be with IT support, and in some cases, they might even take on the identity of someone else within your office. These types of attacks can be dangerous and tricky to work around, particularly if the scammer is pretending to be someone of authority within your organization. For example, someone might call your organization asking about a printer model or other information about your technology. Sometimes they will be looking for specific data or information that might be in the system, while other times they are simply looking for a way into your network. Either way, it?s important that your company doesn?t give in to their requests, as there is no reason why anyone would ask for sensitive information over the phone. If in doubt, you should cross-check contact information to make sure that the caller is who they say they are. Phishing Emails Phishing emails aren?t quite as pressing as phishing phone calls because you?re not being pressured to make an immediate decision. Still, this doesn?t lessen the importance of being able to identify phishing messages. You might receive tailor-made customized phishing messages with the sole intent of a specific user handing over important information or clicking on a link/attachment. Either way, the end result is much the same as a phone call phishing scam; To avoid phishing emails, you should implement a spam filter and train your employees on how to identify the telltale signs of these messages. These include spelling errors, incorrect information, and anything that just doesn?t belong. Although, phishing messages have started to become more elaborate and sophisticated. Phishing Accounts Social media makes it incredibly easy for hackers to assume an anonymous identity and use it to attack you; or, even more terrifying, the identity of someone you know. It?s easy for a hacker to masquerade as someone that they?re not, providing an outlet for attack that can be somewhat challenging to identify. Some key pointers are to avoid any messages that come out of the blue or seemingly randomly. You can also ask questions about past interactions that tip you off that they may (or may not) be who they say they are. Ultimately, it all comes down to approaching any phishing incident intelligently and with a healthy dose of skepticism. To learn more about how to keep your business secure, reach out to us at (603) 889-0800.