Tip of the Week: Use Excel Like a Pro – Graphing

Select Your ChartExcel has several built-in chart types that you can choose from, with many of the more complex ones being a little difficult to use for normal business purposes. You can easily get your point across with a simple column, pie, or line chart. Column/Bar ChartsColumn charts are used best when you need to show how much data has changed over a certain period of time. You can also use them to compare values at a single data point. For example, you could use a column chart to show the revenue earned by individual sales people. You use a bar chart to do mostly the same thing as a column chart, only it?s horizontal rather than vertical. These are very useful to show particularly large discrepancies between data, or when you need to label your points. Pie ChartsA pie chart is great if you need to compare percentages according to a group of data. Let?s say that you are tracking how new customers say they find your business. You can break them out into a pie chart to compare and visually explain the bigger slices. Line ChartsYou can use a line chart to see how your data changes over time, as it allows you to showcase multiple data trends all at the same time. With the aforementioned examples above, a line chart could be used to showcase the frequency of how often these threats made themselves apparent on your network. Building the ChartsExcel has a simple chart building tool that you can use to showcase data from a spreadsheet. First, you want to make sure your data is properly organized in the spreadsheet. Next, highlight what data you want to show in your chart. Once you?ve done this, just select the chart type that you want to use. You can do so either in the list of Recommended Charts, or from the list of All Charts. You?ll then see your new chart appear. You can further customize your chart by using Chart Elements, Chart Styles, and Chart Filters. You can use other options to further customize your chart, and with a little bit of improvisation, you can build a chart that both accurately represents your data and gets your point across in the most effective way possible. To learn more about technology tips and tricks, be sure to subscribe to our blog.

Cybersecurity Can’t Stop During the Holidays

Mostly, people do celebrate the holidays. According to Pew Research, between 90-and-95 percent of Americans celebrate Christmas. As a result, many businesses will not be staffed for Christmas. One element that has to be taken into consideration is cybersecurity. While a study by IBM suggests that cyberattacks don?t peak during the holidays, many organizations like to hire seasonal help to make operations run more smoothly. This opens these companies up to social engineering attacks and other malignant computer issues. This extra risk, along with the undeniable amount of stress and reliance these computing systems have on them, make it crucial to have a full-scale cybersecurity plan in place. That?s why many organizations have consulted with IT professionals like White Mountain IT Services to protect their business? network and infrastructure through diligent planning. ?It takes roughly six months to really prepare,? said Peter Tran of RSA, a computer security firm. Another expert, Demetrios Lazarikos of Blue Lava Consulting stresses testing systems to ensure their cyber security protocols are strong, ?The fear is that the system will break. You test the system; you stress it; you try to anticipate the traffic.? He goes on to say that different types of attacks, including Distributed Denial of Service (DDoS) attacks create big issues, and that if there is no dedicated incident-response plan in place, a company?s IT is a sitting duck. By having a plan to protect, test, and guard the systems your business depends on to ensure no infiltrations happen, and any that do are mitigated quickly, any company, especially one that depends on its IT to succeed (think eCommerce), can sustain themselves until business returns to normal after the holidays. The IT support leaders at White Mountain IT Services understand how important cybersecurity is for the sustainability of your business, and are committed to helping New Hampshire businesses protect their networks through any type of situation. Call us at (603) 889-0800 to learn more.

It?s Decided: You?re More Likely to be Phished than Breached

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches. Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time. Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren?t obvious at first glance. The problem is that it?s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations. Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it–that?s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors. Besides the obvious data security problems associated with phishing attacks, it?s just downright embarrassing to have been had by hackers. It can leave a scar on your business that?s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at (603) 889-0800.

Tip of the Week: Hey Cortana! Don?t Listen to Them, You?re my Virtual Assistant

To begin to set this up you have to open Cortana?s Settings. To do this, click on the Cortana Icon on the taskbar. Then select the gear-shaped icon in the Cortana window to access Cortana?s settings. Make sure that the Let Cortana respond to ?Hey Cortana? setting is toggled on. Then select Learn how I say ?Hey Cortana?. You will then be asked to answer six phrases to help Cortana determine the way you say ?Hey Cortana?. Once you?ve completed that step, return to Cortana?s settings and make sure that the try to respond only to me option is selected. Now you have Cortana?s full attention. You can have her help you with any number of issues, while helping you navigate Windows 10. Do you use Cortana? Siri? Google Assistant? Alexa? Bixby? If so, which are your favorites? Leave your thoughts with us in the comments below.

Is Your Backup and Recovery Strategy Solid?

Recovery Point Objective (RPO)The Recovery Point Objective is a name for the amount of data that you can restore in the event of a disaster. The recovery point objective is determined by how much data can be saved following a data loss incident, be it an internally caused affair or one caused by external threat actors. The data loss could be caused by something as wild as a natural disaster (flood, fire, power surge), or unpredictable as user error or a hacking attack. Either way, you?re staring data loss in the face with no real guarantee of how much you can expect to lose. The type of data backup you implement will have a major impact on how much you lose in the event of a disaster. For example, tape backup has long been a staple in the business environment, but it?s not the ideal way to approach disaster recovery in a loss scenario. Tape backup is resource-intensive and can only happen once a day during your business?s off-hours. This means that you could potentially lose an entire day?s worth of data in the event of a disaster–much more than if you were to implement a cloud-based backup system. Recovery Time Objective (RTO)Once you have found out what portion of your data you can recover in the event of a data loss incident, you?ll be able to determine an adequate recovery time objective, or RTO. You want to have a clear idea of how long it will take to get back in action following a major data loss incident. Any time that your business isn?t operating as usual is time that?s not being spent productive–downtime, also known as one of the most dangerous things for any business in the wake of a critical data loss incident. Your goal should be to minimize downtime whenever possible, which includes ditching your tape backup solution and replacing it with one which allows for a quick and efficient restoration process. Cloud-based backup allows for minimum downtime by allowing for automatic backups every fifteen minutes. It?s just one way that BDR can allow for maximum recovery with minimal downtime and loss on your business?s part. Does your business need to implement a more dynamic data backup and disaster recovery system? A cloud-based BDR is the answer. To learn more, reach out to us at (603) 889-0800.