ALERT: Meltdown/Spectre Vulnerability Grants Malware Access, Patch It Today

In a blog maintained by a user known only as Python Sweetness, a post went up stating that ?an embargoed security bug impacting apparently all contemporary CPU architectures that implement virtual memory, requiring hardware changes to fully resolve.? In layman?s terms, there was a bug that interfered with how other programs interacted with the CPU. A functioning CPU has two modes, kernel and user. User mode is the one that is generally considered ?safe? mode, while kernel mode grants access into the computer?s inner workings. Python Sweetness, however, realized that there was a bug that blurred the lines between user and kernel mode. This issue created a means for malware and other malicious programs to access a system?s hardware directly. This bug was expected to cause the system to have to switch entire processes back and forth between user mode and kernel mode, which would ultimately slow any of the computer?s functions to a crawl. What?s worse, the initial expectation was that the computer could only be fixed with a hardware change. Fortunately, a fix was devised and released as a Windows update, costing only 2 percent of system performance (much less than what would be lost otherwise). For PCs with Windows 10 installed and an antivirus that supports the patch, the fix should already be in place. However, to confirm this, go to Settings > Update & Security to see if there are any updates waiting to be installed. If not, check your update history for Security Update for Windows (KB4056892), or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch. If you have an Android device, there was an update on January 5 that provided mitigations, with the promise of more, further updates to add to these protections. Google-branded phones, including the Nexus and Pixel lines, should have already received the patches, and other Android phones may have as well. It is something that you should check, and if you haven?t received an update yet, reach out to your carrier and ask why (public forums get you extra points). An update to Google Chrome is expected on January 23, with other browsers following suit, that will also include mitigations. In the meantime, ask your IT resource to help you activate Site Isolation to help keep a malicious website from accessing your data from another. Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using similar hardware. It?s really important for business owners to have their entire infrastructure reviewed and audited. Of course, for the fix to take place, the update has to be installed. This is the reason that it is worth having a managed service provider looking out for your business. The MSP would be there, ear to the ground for news of updates, ready to jump into action on your behalf. As a representative of you business, you wouldn?t have to worry about dealing with any of it. This means that you and your staff would be free to focus on profit-generating initiatives, without the distraction of maintenance and updates.White Mountain IT Services can be that MSP for you. Call […]

You Can?t Ignore the Elephant in the Server Room

Server Software in Need of an Update… or SevenA server acts as the epicenter of a business, a central point that allows each workstation to share data with each other. This makes it very important to keep your server?s software up-to-date. Otherwise, your server will not be able to send and receive data as efficiently as your business needs. Additionally, an updated server is also more resilient against cyberattack. As hackers and other malicious users are always working to improve their tools, the only way to keep your servers (and by extension, your business) protected is to keep the security that protects them up-to-date. After all, just because your defenses were able to stop one attack doesn?t mean they?ll be able to stop the next. Keeping Your Servers MaintainedIt is also important to remember that there is more to your servers than their software. The hardware that powers your server also needs some TLC in order for your company to maintain operations. In order to keep your servers properly maintained, you need to undergo a few specific activities on a regular basis to ensure your network has a reliable foundation. Dust can wreak havoc on your IT components, so keeping dust and other such debris away from your server is a critical concern. The entirety of your business relies in some way or another on that server, so in order to maintain business operations, you need to keep it in proper working order. Furthermore, it is also important to keep in mind that even the most well-maintained technology will not last forever. Your server?s components will eventually need to be replaced. Making regular maintenance a priority will help you get the most out of your servers, optimizing your return on your investment and making it less painful to replace them when the time comes. Considering VirtualizationA business will often require that many applications are running in tandem with one another, which might eventually lead to a need for multiple servers as the business grows. As a result, the business is then responsible for supporting and maintaining each of these high-end devices, in addition to powering them and cooling them. This is an expensive option, especially when a business? server needs can be consolidated to a single device through virtualization. By dividing a powerful server into sections, that lone server can then host multiple operating systems, each OS with its own resources. This way, a business can take multiple servers, each operating at a fraction of their capacity, and replace them with a single server that still meets their needs. Unlike the elephants that can be found in any given room, your server?s issues cannot be disregarded. White Mountain IT Services is in the elephant-wrangling business, at least where IT is involved. Call us today at (603) 889-0800 for assistance with your IT, infrastructure and all.

Business Technology Continues to Shift to the Web

We?re not talking about just using a web application like Gmail to access the Internet. Most businesses these days take advantage of some type of web-based service to keep their operations moving smoothly. They could either have a couple of applications hosted on the Internet, like Microsoft Office or the Adobe Creative Suite, or it could go as far as having the entire network infrastructure hosted in the cloud for easy access. Either way, business operations would change considerably without having access to the cloud and Internet-based solutions. Before web-based applications became commonplace, businesses rely on applications and solutions hosted locally on a network or desktop infrastructure. Nowadays, if solutions are stored in the cloud, they can be accessed on a plethora of devices that allow for more flexibility and innovation than ever before. We?ll talk about some of the various ways that the Internet and web-connected services change the way that businesses function. CommunicationsBusiness communications rely heavily on staying connected. Considering how the Internet is also all about connectivity, the two naturally go hand-in-hand. Businesses have access to all sorts of communication solutions, including voice and video chat, instant messaging, and email–all designed to keep your organization connected to all of your contacts and users in a way which fosters productivity. Imagine being able to take your business?s telephone solution on the go with you simply by having a mobile application on your device. You might even already be taking advantage of mobile email solutions. It?s just one way that a constant connection to the Internet and web-based apps really help businesses stay connected while on the go. Software SolutionsYour business relies on software to get work done, including a productivity suite of some kind. Thanks to the cloud, these solutions can be hosted online and stored in a way which allows for access via mobile devices and desktops alike. If you?re using a word processor, spreadsheet creator, or other type of software that lets you build out business documents or check information, you stand to benefit from web-based access to these applications. Now that you don?t have to rely on constant access to a desktop to work on text files or other projects, your organization is free to pursue a method of working and operations that best suits it. This gives your employees the freedom to choose their own devices. Furthermore, access to web-based applications is often much cheaper as a whole, since you?re simply paying for access to the latest versions of each solution in a web format rather than purchasing licenses outright for your desktop workstation. Access to InformationPerhaps one of the most important parts of Internet access for a business is the unprecedented access to important information. Businesses can investigate potential new solutions, potential clients, and competitors to create some of the most lucrative possibilities imaginable. Some might say that business lives on the web, and in this situation, it certainly does. You can perform market research, find other organizations like yourself to glean ideas from, and potentially even find new clients. Is your business fully taking advantage of mobile technology and access to web-based solutions? White Mountain IT Services can help your organization fully implement solutions designed to improve access to important information, be it locally on your network or through a cloud-based hardware infrastructure. To learn […]

Tip of the Week: Mastering Page Orientation in Microsoft Word

Here is a quick example of an occasion where changing the orientation for a single page in a document might be of value. Begin by navigating to the page inside your Microsoft Word document that you would like to change the orientation of. Once there, make sure that your cursor is on the page. Open the Layout menu and click the button to expand the Page Setup submenu, as seen below. Next select the orientation you desire and select what you?d like it applied to using the drop down menu, as demonstrated. In this case, you?ll select ?This section?. Click OK. Looking for more tips, tricks and hints that will improve the way you and your employees make use of technology? Make sure you check back to White Mountain IT Services?s blog every week for the latest and greatest IT how-tos!

Is Your Cybersecurity Prepared for 2018?

Check Endpoint SecurityFirst things first, you want to be sure that your endpoints (that is, your employees? devices and workstations) aren?t contributing to any vulnerabilities your network may have. Are your employees using their workplace devices responsibly? Do they each have access permissions that are appropriate for their work? Are some employees misusing their permissions? Your business security starts with your end users and their behavior. Risky actions will only put the business at risk. You need to be sure that your employees understand what the misuse of their devices or their credentials could bring about. Furthermore, you need to make sure that your network has the minimum number of endpoints possible, and that any former employees have had their accounts revoked. Apply Updates and PatchesIn order for your systems to be properly protected, you should keep them as up-to-date as possible. This is because cybercriminals and malware developers are constantly trying to improve their products to overtake the protections their targeted victims have in place, just as software developers and security professionals are constantly trying to identify and resolve weak points in these defenses. This is what updates and patches serve to do–they fix vulnerabilities that could otherwise severely affect your operations. Without them, your business is left exposed to potential threats. You need to make it a habit to regularly implement these crucial pieces of software so that your business is protected. Keep it Positive Admittedly, most of these resolutions have been about avoiding the bad, but why not embrace the good? Look ahead and consider the future. What attacks might be more likely to be leveraged against your business? What do you need to do to defend yourself? You want to put yourself in the best-case hypothetical scenario. Now, how can you go about attaining that standard? By taking an honest look at what is needed to have a year free of cyber-attacks, you get a better idea of how this can be achieved, and what you need to do to get to that point. Then, it?s simply a matter of doing it. Make Sure the Basics are Covered As you put these resolutions into action, don?t forget about the simple security measures. Solid password requirements will always help keep threats out of your network and accounts, and they can always be bolstered by two-factor authentication. While you?re putting these measures into place, you also need to make sure that your team is kept up to speed on these changes, and are taught how they work. Otherwise, they may resist these security changes and figure out workarounds. How have you resolved to improve your business? Have you made progress? Let us know in the comments!