The NCSA Wants You to Be Aware this Data Privacy Day

The NCSA, in conjunction with the U.S. Small Business Administration, provides a few guidelines for businesses to follow in order to preserve privacy as far as company data and personal information are concerned. Protecting Your Business Nearly every business collects and utilizes personal information from its clients, employees, and vendors. Therefore, it is also the responsibility of the business to make sure that this data remains private and secure. In this digital age, businesses need to be transparent with their data privacy policies, as even the accusation of a data loss event or misusing their information in any way can be catastrophic. There should never be a time that a customer could accuse you of collecting more data than they consented to, without you having proof that they had been notified and provided their consent. A privacy policy should be available for you to provide to your clients. However, this needs to be more than a policy. It needs to become a tangible part of your organization, and enforced as such. Not only should you frequently remind your employees of the importance of privacy and data security, it should become integral to your company culture. As the NCSA and the SBA say, you should ?communicate clearly and often what privacy means to your organization,? as well as being sure to ?educate employees about their role in privacy [and] security…? Your diligence should extend not only to your internal employees but also to any external (or third party) resources you may use. You need to ensure any of your partners or vendors with access to your network and its sensitive data are taking your security as seriously as you are. Many businesses require all external resources to sign a network use agreement that holds them liable in the event their actions result in a breach of privacy. Privacy in the Home Data security does not just apply to work done within the walls of your offices, either. You need to cultivate an even greater awareness and respect for privacy at home or while traveling, as well. Any device that is used for work must be treated with the same security-minded processes that you and your employees would subscribe to in the office. Remind members of your household that they need to be careful with their personal information as well. While they may not have a company to manage, there are still plenty of consequences to deal with if their data is breached. Therefore, the entire family needs to be mindful about what they share online, avoiding sharing too much and keeping personal details close to the chest. This is especially true if you have children and teens under your care and supervision, as they could face a lifetime of ramifications. Additionally, White Mountain IT Services understands how important your privacy truly is. When you have built up and maintained a business, you want to protect it, and maintaining data privacy can help keep both it and you safe. We appreciate how big of a commitment it is to be entrusted with that responsibility, and we?d embrace the chance to live up to it with your data. Please, lean on White Mountain IT Services for more assistance and advice. Call us today at (603) 889-0800.

At What Point Does a Service Become Spyware?

Spyware, like other malware, is a problem for any organization. Since your business generates, collects, and uses considerable amounts of data, there are plenty of organizations that want to get their hands on it. You spend so much time and money protecting your data against threats on the Internet, but what if the spyware were to just come standard on the computer you just bought? HP, one of the most reliable names in business and consumer hardware, has seemingly been doing exactly that, adding a software, HP Touchpoint Analytics, into their Windows Update. The software, which typically is part of the larger HP Touchpoint Manager, regularly sends a random cache of data from the device. The rationale HP gave for this decision was to relieve ?time-consuming tasks of device support and lifecycle management.? Given that explanation, most wouldn?t bat an eye, but HP does this with data that belongs to users, without the user’s consent, and for some, that is a major problem. If you are the skeptical type, and would prefer to not have a program with such liberties working on your organization’s computers, consider bringing this up to your IT professional and they can ensure any software that isn?t vital is removed, and working properly. If you?d like to try your hand at disabling it you need to search Windows Services and disable ?HP Touchpoint Analytics Client?, then uninstall it from your installed software list in Windows 10. If you want to talk about a software strategy that truly suits your business, call White Mountain IT Services today at (603) 889-0800.

Tip of the Week: Are You at Risk Due to the IoT?

The Internet of Things is now a commonality. IoT devices are in our homes, in our offices, and in our pockets. While these devices are incredibly convenient, they also contribute to some major security risks. For today?s tip, we?ll review some of the ways to reduce these risks while still leveraging the IoT. Does it Need to Be Connected?The first consideration you need to make is whether or not connecting a particular item will be a big enough benefit to be worth the inherent risks. Depending on the device, an Internet of Things item could be used to spy on you, steal your data, and track your whereabouts. If the device in question directly offers you a helpful, worthwhile utility, it may be worth the risk. If the connected device serves little purpose beyond its novelty, or its purpose could just as easily be managed by a staff member, it is probably best to leave it disconnected. Are You as Secure as You Could Be?You should also make sure that the environment that you are using an IoT device in is as secure as possible. Making sure that your firmware is updated will ensure that you have the latest security patches and fixes for the various exploits and vulnerabilities that the IoT may present. If possible, this process should be automated so that your IoT devices, as well as your router, are fully updated. It may also be a good idea to check if your router supports guest networking. With guest networking, you can keep potentially risky IoT devices off of your main business network, protecting its contents. Finally, you should always make sure that your passwords are in line with best practices, and that you are not reusing passwords between devices and accounts. Following these guidelines means that even if one of your accounts is comprised, the rest of your accounts are safe behind different credentials. Are Your Devices Properly Monitored and Managed?Ultimately, the best way to keep your company safe from IoT issues is to establish rules regarding the use of these devices and monitor their permissions. Extending the consideration of whether or not a device needs to be connected, you need to establish if it even needs to be in the office. After all, a smartwatch can offer some business utility, whereas a smart salt dispenser (which does in fact exist) does not. Monitoring your network can help you identify if any unapproved devices have made a connection. White Mountain IT Services can help. Call (603) 889-0800 to learn more.

Managed IT Services Present Opportunities

How does your business manage its technology solutions? If you have an in-house IT department, you might think that you have a better shot at keeping your business safe from a hard drive failure, but this is only if your IT department isn?t already overwhelmed with work. You might find that implementing new solutions is tricky, which wastes time and resources on your part. What?s the small business to do? The choice that gets the most mileage for your business is outsourcing the care of your technology solutions to a managed service provider. Compared to the traditional break-fix IT model that many businesses (unfortunately) rely on, managed IT is more affordable and provides a plethora of benefits that you wouldn?t necessarily get through traditional break-fix maintenance. The break-fix model of IT management takes a reactive approach to technology maintenance, relying on issues that are already clear and present to indicate when you need your technology taken care of. This can lead to unnecessary downtime, meaning that your employees won?t be able to work while you?re waiting for maintenance. The costs of the break-fix model extend far beyond the costs of the maintenance itself. Not only can include large expenses such as a replacement server, or the cost of all the accumulated downtime during which your employees cannot do their jobs. Sometimes businesses get around the loophole of hiring an internal IT staff by taking an IT department?s responsibilities and handing them to the other workers–workers whose time is better spent on revenue building endeavors. If nobody within your company is designated as ?the IT guy,? you?ll encounter situations where the average employee is asking higher-ups how to resolve issues–a situation that wastes not just your employees? time, but yours as well. Their time is better spent being productive, but when their technology isn?t working properly, who can they go to for help? This is the major bonus of working with a managed IT provider. Not only can the managed IT provider act as the de facto help desk for your organization, they can also manage and maintain any hardware or software solutions you implement to keep issues to a minimum, thereby streamlining operations and mitigating downtime. Plus, if you leave the IT maintenance to your employees, who likely won?t know what they?re doing, you?re opening the doors for even more downtime caused by solutions not being implemented properly, introducing more work that needs to be done. When professional technicians do the job, they have a higher chance of doing it right the first time, reducing the risk of projects being repeated (a considerable waste of time and resources). Managed IT might just be the missing link for your business?s technology needs. To learn more, reach out to White Mountain IT Services at (603) 889-0800.

People May Not Trust the IoT, But They Still Use It

Cisco?s survey covered 3000 North American adults who had a passing familiarity with IoT devices, providing invaluable data to both business-to-consumer and business-to-business organizations. Generally speaking, most consumers aren?t aware of just how far-reaching the Internet of Things can be. The Internet of Things encompasses all devices that have some sort of connection to the Internet, even devices that traditionally haven?t been able to take advantage of this connectivity. Some great examples include car navigation systems, street lamps, home security systems, and even health monitoring devices like pacemakers. While the majority of users were familiar with some of the more conventional Internet of Things devices, they had no clue that some of the stranger IoT devices could boast such connectivity. Despite this considerable difference in awareness, those who knowingly use IoT devices have had a positive response to it. 53% of respondents claim that connected devices have made their lives easier, while 47% of respondents claim that they have made their lives more efficient through connected devices. Even 34% of personal connected devices have made users feel more safe, which is valuable in and of itself. Despite these impressive numbers, only 9% of respondents claimed that their data felt more secure or private. Furthermore, only 14% of users felt that their vendors were transparent about how the information collected by these devices is used. It just goes to show that just because a device helps you, that device may not necessarily make you feel safe and secure. Even with these suspicions, it?s probable that the Internet of Things will continue to grow, which means that your organization needs to start accounting for these devices both in and around your office. If you think about it, your employees will likely be bringing multiple devices with them to the office in the first place, so you need to have policies put into place to ensure that data security isn?t sacrificed just for the privilege of bringing personal devices into the office. A Bring Your Own Device policy can go a long way toward limiting which connected devices have influence over your company?s network. Do you have any questions about how the Internet of Things and connected mobile devices can influence your business? White Mountain IT Services can help. To learn more, reach out to us at (603) 889-0800.