Tip of the Week: You Can Use Your Android Device As An External Hard Drive

Android to PC File TransfersAndroid devices are neat because they allow you direct access to its filing system. You can essentially access the internal storage of the device, allowing you to use it in much the same way as you would an external hard drive. You can use your charging cable to connect your device to the PC via a USB port. Once you?ve done this, you can transfer data from your computer to your device while it?s charging. First, however, you?ll notice that a little notification window has popped up on your device, which will tell you that your device is charging. If you tap this notification, a menu will pop up providing you with the various functionality that comes from connecting the device to a PC. You need to select Transfer Files from this menu. Once you?ve done so, a menu for File Explorer should open on your workstation. You?ll be able to see your device in the explorer, which should allow you to transfer any files as you see fit. But What About Security?Using this type of solution comes with various concerns, chief among which is security. How can you make sure that using an Android device in this fashion doesn?t put your company?s device at risk? The problem here is that employee mindfulness can only get you so far–you?ll need to implement a Bring Your Own Device policy to ensure that your staff?s use of mobile devices doesn?t put your business at risk. Does your business need a hand with managing mobile solutions? We can help you come up with the best BYOD policy out there, tailored to your business? specifications. To learn more, reach out to us at (603) 889-0800.

How To Keep Your Company Out Of The BSA’s Crosshairs

This organization–the Software Alliance (BSA)–was founded by Microsoft back in 1988 in an attempt to preserve intellectual property of member companies. Its initial goal was to put a halt to copyright infringement, especially in more recent years as pirating software has grown more popular. Only recently has the BSA started using some rather underhanded tactics to find unlicensed software on business systems. One of these tactics tries to entice employees (or former employees), to report instances of software licensing fraud. In other words, they try to get your employees to report any suspicious software handling by promising complete and total anonymity and a cash reward. It?s a tempting offer for employees who might feel downtrodden about their work, and a report from one of these workers could be condemning for your company. The BSA runs ads across social media looking for whistleblowers – it?s not like a former employee needs to look very hard to find them. But what if you don?t know that you?re using unlicensed software? Surely that makes a difference, right? Well? no. Being unaware won?t help your case, and there?s no excuse for using unlicensed software. Therefore, you need to ask yourself whether you?re willing to risk a situation like this potentially costing your business. One of the best ways you can keep your business safe from the BSA is by restricting user permissions on your company devices. By this, we mean allowing only your IT department to install applications on your company?s computers. This keeps your employees from finding questionable software licenses on the Internet and implementing them without IT approval, effectively eliminating a big risk factor for your organization. The need for software licensing documentation cannot be expressed enough. You need to be ready for an audit at any given time, as they can (like many business matters) be unpredictable. Therefore, what we recommend is that you reach out to an unbiased third-party provider for a comprehensive network audit to look for unlicensed software. The goal is to find any instances of unlicensed software so that, in the event of an unexpected audit, you aren?t caught red-handed–even if it?s not your fault. White Mountain IT Services can provide your business with the quality network audit needed to snuff out any instances of unlicensed software on your infrastructure. To learn more, reach out to us at (603) 889-0800.

How Do Your Business Communications Systems Stack Up?

Identifying Your OptionsWhat options are open to you that will let you improve your staff?s ability to communicate? The first thing you need to do to ascertain whether or not you have the tools or technology you need. This can be done through a thorough assessment of the types of platforms your business utilizes for communication: Is it just over the phone, or do you have email? Do you use a chat interface? Is your business currently active on social media? These are all effective options to incorporate that will allow your business greater communicative capabilities. How to Best Use These CommunicationsIt is important to understand that communications can either be a major time saver or time waster, depending on the situation. Fortunately, there are means to keep your communications efficient and optimally beneficial to the needs of your business. PhoneThe traditional phone plan for businesses is costly. You have to run the wires required and connect them to a central location. This makes it hard to make changes to the office layout, as well as adding difficulties adding new employees to the telephone system. Additionally, you have to pay a telephone service provider for the privilege of using the phone. Many of these downsides can be resolved by switching to a hosted Voice over Internet Protocol (VoIP) system. Since a VoIP connection leverages your organization?s bandwidth to function, you can eliminate the need of hardwiring your office if you so choose. More importantly, however, you can get a strong communications solution while eliminating a potentially expensive line item in your budget. EmailWhile many might consider email to be a replacement to the phone, it isn?t advisable. While both are important to maintain in a business setting. However, for your typical office communications, email provides a quick way to get in touch with a coworker or contact, providing a record of correspondence as you go. Chat InterfaceThere are often times that an office worker needs to reach out to a coworker, but their message may be too urgent to risk it sitting, unchecked, in an inbox. A chat interface provides a highly visible method of sending a message that grabs the recipients? attention, allowing for a much quicker response than one might expect from an email–which may go unchecked for far longer than the message can wait. Social MediaThe rise of social media has given businesses an opportunity that had never presented itself before in history: the ability to reach out to their fan base without a filter. Now, a business can reach out directly to their followers, sharing news, information, or content of a more human nature. Social media allows a business to connect more honestly with their followers, giving the company another layer of culture that sets them apart. Plus, it helps show your followers that you intend to actively interact with them, drawing them in and impressing them as a part of your marketing strategy. Plus, you can use social media as another means of uniting staff members and communicating with them directly. The technology that businesses can access today are capable of enhancing their communications greatly. Have you enhanced yours? White Mountain IT Services can help with that. Reach out to us at (603) 889-0800.

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

For a small business, it?s even more important to avoid becoming a cybercrime victim. Data loss, downtime, fines/restitution, and lost time and resources are just a few things that you might be forced to endure as a result of falling prey to a hacker. Here?s a list of actions that the FBI recommend you take to help protect your company from being a victim of ransomware. Raise Awareness: Make sure employees are aware of ransomware and of their critical roles in protecting the organization?s network and data. Updates and Patches: Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system). Auto Update Security Software: Ensure anti-virus and anti-malware solutions are set to automatically update and conduct regular scans. Limit Super Users: Manage the use of privileged accounts?no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary. Access Control: Configure access controls, including file, directory, and network share permissions appropriately. If users only need read-specific information, they don?t need write-access to those files or directories. Filters and Application Control: Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs). Data Backup & Disaster Recovery Plan: Backup data regularly and verify the integrity of those backups regularly. Multiple Storages: Make sure backups are not stored or connected to the computers and networks they are backing up. Given the extreme measures that governments have taken to prevent cybercrime, it?s a safe bet that businesses of every size should follow suit. Would you like to keep on top of all the latest news and information from the FBI?s cyber security division? Visit: https://www.fbi.gov/investigate/cyber/news.

What is the MSPs Role in Maintaining a Regulation Compliant IT Infrastructure?

To help make sure that your company in compliance, White Mountain IT Services can be there to help you attain, and remain in, compliance. Compliances and regulations usually fall into one of two categories: Government Mandated Compliances: Depending on the industry being regulated, the state government, federal government, and in some instances, both can pass laws requiring establishments to meet certain technology requirements and standards. Government mandates are usually focused on network and data security– and will audit a business to make sure that they?re in compliance and stay that way.  HIPAA is required by the Federal Government. New York State requires all financial organizations to meet Cybersecurity Requirements for Financial Services Companies. Internally Mandated Compliances: More and more businesses that aren?t technically required to meet regulations by law are setting their own technology standards. IT policies, best practices, processes, and procedures are just a few items that may be part of internally mandated compliances. These types include: Bring Your Own Device (BYOD) or Mobile Device Management policies to control which devices can access your network. Employees that are looking to access a company?s network remotely must do so using a secure, virtual private network or VPN. Business Continuity/Disaster Recovery: The majority of government compliances are going to require some type of business continuity planning. Managed Services Providers are in a position to help with business continuity a few different ways. First, is with a data backup and disaster recovery. Ideally, every plan should have a BDR solution. Another function of an MSP is keeping a detailed inventory of hardware, software and user access which comes in handy in the event that the building or workstations are damaged. Remote Monitoring and Maintenance: When it comes to security measures, remote monitoring and maintenance of a network is a requirement for most regulations. Even when business hours are technically 8 a.m. to 4 p.m. or something similar, servers and networks are often powered on 24 hours a day. Government mandates require that your network and data are operational whenever technology is. MSPs not only provide monitoring and maintenance services, they can provide you with the data proving your network was protected during an audit. Penetration Testing and Vulnerability Assessment: To determine how secure a network is, many compliances require that regular penetration tests be performed. This common tool is an intentional attack on a company?s network by a friendly entity. Additionally, vulnerability assessments are often required, as well. This assessment is a report that indicates where potential weak spots in your network can be found. In the event of an audit, MSPs can also provide documentation as required to prove these measures are being taken. Depending on the requirements of your industry, there are many other ways that an MSP can help with technology compliances and regulations. Whether government or internally mandated, contact White Mountain IT Services to make sure you are in compliance – and remain that way!