Tip of the Week: Backup Your Personal Files With Google Drive Backup

Just keep in mind that we are only talking about Google Drive as a backup solution for the average PC user. If your business wants to keep downtime to a minimum and maximize data recovery, you should implement an enterprise-level backup and disaster recovery solution. Call us today and ask about we can provide comprehensive data backup and fast recovery options for your organization. Backup and Sync is the latest version of Google Drive. It allows your users to back up files or folders on their desktops by sending them to Google Drive. This is great for users that want a free way to keep backups of their photos, videos, and media. Google even tells its users that this is only intended for consumers, as well as encourages its G-Suite customers to wait for their upcoming Drive File Stream services. Backup and Sync is available for users of Google Drive for PC and Mac. Just keep in mind that using your Backup and Sync application to take backups of your videos and photos will probably end with you exceeding your free Drive space provided by Google. One last thing to think about for any business owner, however, is that you should discourage employees from storing company data locally on their workstations. Files should be stored on your company network whenever possible, especially if they need to be accessed by multiple employees. Plus, there’s always a chance that an employee on bad terms may set up Google Drive Backup to snag all of the data located on their workstation. White Mountain IT Services wants to help your business implement only the best and brightest solutions for your business technology infrastructure. To learn more about how we can help you take full advantage of data backup and disaster recovery, reach out to us at (603) 889-0800.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here?s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don?t know? While it might be tempting to give them the benefit of the doubt–after all, maybe they know a friend of yours–it?s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a ?follow? feature, and limit who can send you friend requests. Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may actually be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it?s best to stay safe and avoid these in any way possible. First, you need to log into your Facebook account. If you?re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom. This opens up the General Account Settings page. In the left column, you?ll see several sub-categories for Facebook?s settings. Click on Privacy first. Under the Privacy Settings and Tools page, you?ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you?ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though. Now, let?s say that you want to give people another option to see what you post, even if they aren?t currently friends of yours. Maybe you have articles about your industry that you?d like to share, but you don?t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only. Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily enough. For more information about how to keep your organization secure, reach out to White Mountain IT Services at (603) 889-0800.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

This is by no means the first time HBO has moved to increase the show?s security. During last year?s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews. Now that the show has overtaken the books, the importance of secrecy and security has increased even more. This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave. For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is–in all senses of the word–a business, and if it was to lose its critical data or trade secrets (like who?s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project. In this way, it is just as important that you ensure that your business? data is secured as well. Otherwise, the same scenario would likely happen, your ?audience? replaced by your customers and clients. Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it?s also quickly becoming a best practice for security. Are you excited about this season of Game of Thrones? Let us know in the comments what you think–but no spoilers, please!

Need A Simpler Way To Manage Data? Try A Cloud Server

That?s right–we?re talking about migrating your data to a cloud-based server infrastructure, one built specifically for your organization and hosted by a third party. By outsourcing the management of your server infrastructure to a managed service provider, you?ll be able to take advantage of the many benefits that they offer your organization. Cloud Servers Eliminate CostsHaving physical servers in your office comes with various costs. These include operational expenses such as air conditioning and electricity, as server units consume significant amounts of energy and generate enough heat to warrant cooling systems. When you migrate to a cloud server, your data infrastructure is stored online in the cloud via a virtual server. This server is managed by the IT provider, eliminating any costs associated with upkeep on your business?s part. Cloud Servers Promote FlexibilityStoring your data on cloud-based servers also allows for more flexibility within your organization. By storing data and applications in the cloud, you can then access all of it through any connected device that has been approved by IT. This makes it easier for your business to get work done, and also promotes the possibility of remote work for especially busy workers, like business owners or those who do a lot of traveling for conferences or meetings. Cloud Servers Break Down BarriersOne of the biggest uses for virtual or cloud-based servers stems from one of the largest frustrations of using technology for business: legacy applications. As new technology is released, compatibility issues often arise between applications and operating systems. Your organization might rely on a legacy app that isn?t compatible with more recent server operating systems, forcing you to run multiple machines with various OSes installed. Partitioning with virtual servers means that you can consolidate your data and applications onto a single unit and emulate each OS for your various applications? needs. Not only can you cut down on costs associated with running multiple servers, but you?ll simplify your network in the process as well. Does your business want to start leveraging cloud servers to its advantage? If so, reach out to White Mountain IT Services. Our professional technicians can assist your business with consultation, implementation, and migration. To get started, call us today at (603) 889-0800.

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

First, the benefits. Your team will likely get more done if they are using devices that they are comfortable with. After all, forcing someone to use a company-provided iPhone when they have a Samsung device that they are perfectly comfortable with will do nothing but cause friction and make for a frustrating experience. Plus, this also saves you from investing in company devices for your employees, which can be of significant expense. Furthermore, employees just like the freedom of using their own devices. Since nobody likes being told that they can?t do something–namely, use their phones in the workplace–it makes sense that you avoid the problem altogether by implementing BYOD. However, it?s still important that you implement BYOD in a way which makes sense from a security standpoint, without hindering the ability of your employees to work properly. We?re here to help you design a BYOD strategy that makes sense for your organization. Application BlacklistingNot all applications found on the Google Play Store will have your best interests in mind. You want to ensure that your employees won?t download just any application to their device, primarily because they might accidentally expose any of business? sensitive data on their device. While you could trust that your employees won?t be downloading suspicious apps, you might be surprised to hear that these apps can be rather sneaky with how they access certain data on your device. For an example, look at the typical flashlight app. While it might need access to your camera for use of the flash, it certainly doesn?t need access to any other information, like your contacts or messages. The apps will request permissions, so you?ll have an opportunity to deny them, but it?s best to prevent this outright with application blacklisting. In general, it?s best not to download apps to your device unless they have been approved by IT. Remote WipingWhat happens if one of your employees loses their device? You never know who could find it. It could be a do-gooder who wants to return it to its proper owner, but more likely than not, it will be someone who either wants to keep the phone for themselves, or sell it to make a quick buck. From there, your imagination can run wild, dreaming up all of the worst-case scenarios. A hacker could steal information about your business from it, or someone could steal the identity of your employee, putting the rest of your organization at risk. Remote wiping dodges this bullet by eliminating data on the device when it is lost or stolen. User Access RestrictionNot all users need access to the same information in order to do their jobs properly. For example, your human resources department might need access to sensitive information, like dates of birth or Social Security numbers, but the typical user certainly doesn?t. On the other hand, only accounting needs access to bank account routing numbers and other financial credentials. You need to make sure that your BYOD policy implements such solutions to ensure that sensitive information isn?t available to just any employee. This means that anyone who loses their device will only give the device?s finder access to any information they were privy to in the first place. While it might only be a small consolation to consider, it?s certainly better than […]