A classic example of this is seen when procuring new technology. There?s a reason why some laptops cost $200 while other models run $2,000. When buying computer hardware, the more money you?re willing to invest will get you technology that?s more reliable, more powerful, and provides better functionality. Short term decision makers will experience sticker shock when encountering high-end equipment, causing them to gravitate toward inexpensive models. While a move like this may save some cash at the time of purchase, long-term thinkers know better. Managers that choose to spend extra on hardware do so because they know it?s well worth the expense. When you go with technology that?s reliable, your company experiences significantly less downtime, which quickly adds up. When workers can?t do their jobs, that lost time equates to time that can?t be billed. When one considers such a discrepancy, it doesn?t take much in the way of downtime prevention to cover the financial gap between cheap hardware vs equipment that?s more reliable. The same logic can be applied to how technology affects employee productivity and morale. By going with inexpensive hardware for the sake of saving a few bucks, you?ll end up equipping your staff with equipment that?s not as reliable, and as such, may even experience frequent breakdowns. Now, a short-term thinker may not see this as a big deal and just expect their workers to suck it up and appreciate the tools they?re provided for doing the job they?re being paid for. Whereas a long-term thinker understands how equipping staff with reliable technology can dramatically benefit the bigger picture. InformationWeek explains, ?better devices lead to higher productivity and morale. According to a UK survey, more than two-thirds of workers felt negatively about their workplace, in part due to outdated technology and practices, with the average worker being frustrated with office tech around three times per day.? Considering just how much more productive an employee is that feels positive about their job, as well as the absurd cost of employee turnover, it?s clear why long-term thinkers don?t think twice when it comes to paying extra for procuring reliable technology. Of course, this same money-saving principle applies to how your business goes about the maintenance of its IT systems. If you view your company?s technology as an expense, then you?ll spend your money fixing problems as they crop up, which can quickly add up. Whereas long-term thinkers view their company?s technology as an investment, which translates to being proactive about IT maintenance and preventing problems before they surface. In the end, this long-term approach saves companies significant time and money, and that?s a decision everybody can feel good about. To learn about how managed IT services from White Mountain IT Services can benefit your company in the long term, call us today at (603) 889-0800.
Here are three ways that you can make Google Chrome work more efficiently. Use Chrome?s Task ManagerJust like your computer?s task manager, which shows you how much computing resources your programs are utilizing, Google Chrome has its own built-in task manager that lets you see which tabs and browser extensions are bogging your system down. To open it, look for the three-dot menu in the top-right corner of the browser window and click on it. Look down until you see More Tools. From here, select Task Manager. Alternatively, you can use the shortcut Shift + Escape to open it. Once the window loads, you?ll see the tabs and extensions used by Chrome, along with a percentage as to how much processing power they are consuming. Once you?ve found the offender, do what you would with any misbehaving application in your own task manager: select it and click End Process. Of course, if you end an extension or tab that you are using, it will cease to function until you reload it or restart Chrome. Implement Hardware AccelerationBefore we go any further with this, we want to throw out a disclaimer that it?s not always recommended to implement this feature for your browser (it depends on how powerful your computer is). To find out whether or not this setting will be helpful for your browsing experience, be sure to reach out to your IT department or the technology professionals at White Mountain IT Services. Hardware acceleration shifts some of the burden off of your PC?s CPU onto the GPU, potentially alleviating some of the processing problems that you might be having. This works by placing some of the page-rendering burden onto the GPU rather than the CPU. To find this setting, you?ll need to click on the three-dot menu and select Settings. Once you?ve done this, go to the bottom of the window and select Show Advanced Settings. Scroll all the way down to the System section and select Use hardware acceleration when available. Once you?ve done this, just close out of Chrome and reopen it. Reset Google ChromeIf you?re unsure if anything that you?ve done has changed Chrome?s performance, you can revert any changes made to the browser?s settings by simply resetting Chrome. To do this, go beneath the hardware acceleration option and you?ll see Reset Settings. Confirm your selection. Just keep in mind that while Chrome won?t reset things such as your bookmarks, browsing history, or saved passwords, it will reset settings like your default start page, your new tab page, your pinned tabs, and your default search engine. Does your business struggle with getting the most out of its technology? Subscribe to our blog for more great tips and tricks on how to make technology work for you.
The warning comes from the Computer Emergency Readiness Team?s (CERT?s) National Cybersecurity and Communications Integration Center (NCCIC). In it, public reports from ESET and Dragos reported ?a new highly capable Industrial Controls Systems (ICS) attack platform that was reportedly used in 2016 against critical infrastructure in Ukraine.? You may recall a similar incident hitting the news not too long ago when workers at a Ukrainian power distribution center watched helplessly as hackers took control of their computers, and used them to shut down heat and power for over 230,000 citizens. Though the power wasn?t out for very long (somewhere between one-to-six hours, depending on location), the control centers are still suffering from the attacks several months later. In addition to turning off the power, hackers also overwrote crucial firmware, which left 16 substations unresponsive to remote commands. This is the first confirmed instance of hackers successfully taking down a power grid, and it?s thought that these hackers were very meticulous and sophisticated in the execution of this attack. Last year, the FBI began a campaign to raise awareness of the potential issue by briefing electrical power companies of the risk. Although, the possibility of such an attack hitting the United States was deemed improbable. Thankfully, there is currently no evidence to suggest that this malware has affected critical infrastructure in the U.S., but the recent CERT warning suggests that such an attack has grown more probable. This risk is due to CrashOverride having the potential to be modified to target vulnerabilities in U.S. critical information network and systems via the malware?s tactics, techniques, and procedures (TTPs). To give you an idea of how dangerous the malware is, the Dragos report links the malware to the group responsible for Sandworm, a wicked zero-day vulnerability that executed code within affected systems by opening a backdoor for later access. This threat utilizes phishing attacks and has the ability to spread between networks with the goal of disrupting systems and stealing sensitive information. In the CERT warning, the recommended way to handle CrashOverride is for utility companies to take a proactive stance when it comes to cybersecurity. This includes implementing techniques for providing and identifying malware. In truth, this is the same approach to cybersecurity that we recommend for all businesses, regardless of industry, size or location. As the sophistication of cybercrime continues to develop, properly monitored and maintained networks are a company’s first line of defense. Contact us today to learn more about network security and best practices.
Over the past few years, there has been a significant shift from text-based content to image and video-based content on the Internet. Google is attempting to boost its use of these mediums in the search engine market, by taking advantage of machine learning. Simply put, Google Lens can use images or the camera on your device to do Google searches and pull up relevant information based on what is seen. For examples of how Google Lens can work, here is just a snippet of what it can do: Identify the species of flowers that the camera is focusing on. Log onto a wireless network by viewing the SSID sticker on the router. Translate text that the camera is looking at into a different language. Obtain information about local restaurants, stores, and other establishments. Google Lens can interact with both the Google Assistant and Google Photos apps. Google Assistant lets you add an event to your calendar by simply pointing your camera at the information board. On the other hand, Google Photos lets users check the details about businesses, like opening and closing times. For example, if you have someone?s business card, you can even call them directly just by scanning the image. More apps that will add even more functionality to Google Lens will be provided in the future. What are your thoughts on Google Lens? Do you think these features will change the way that you go about your daily tasks? Let us know in the comments.
The benefit of being able to quickly diagnose IT problems is obvious; the problem will get addressed and resolved in a timely manner, and a solution to the issue can be found that will help prevent any future IT outages. In the world of IT support, getting to the bottom of an issue is known as performing a root cause analysis (RCA). Such an analysis begins by asking basic troubleshooting questions, which usually begins by looking directly at the performance of the technology in use. Although, as IT networks expand to become more complex and businesses grow to have more managers making IT-related decisions, a company?s RCA approach will naturally become that much more complicated. Consider what it takes to perform an RCA for a small enterprise having one server and a few workstations, compared to a medium-sized enterprise taking advantage of advanced technologies like virtualization and cloud computing in addition to a robust in-house IT network. In the latter example, getting to the root of a problem involves looking at more systems and questioning more parties. Therefore, getting an accurate RCA from more complex IT systems requires a higher degree of expertise from the IT technician overseeing the troubleshooting process. This is also where a case can be made about why it?s important to involve IT in matters where executives are making IT-related decisions. This is due to the fact that root causes of an IT outage often go beyond equipment malfunctioning and extend to poor policies being put in place by management. If the root cause of an IT outage is a poor policy, then any good IT technician will be able to spot this and inform management accordingly. For example, let?s take a look at a hardware replacement policy. Any good IT technician understands that hardware doesn?t last forever. It must be replaced periodically to prevent catastrophic failures that can lead to data loss. Before an inevitable hardware failure, most solutions–like servers, workstations, and networking components–will start to show signs of wear and tear. Unless these solutions are being monitored properly by an IT department, these signs could fly under the radar and eventually result in much more damage than if they were addressed properly. A good IT technician will be able to identify and resolve issues on your network before they become major problems. This type of proactive maintenance is something that is often neglected, especially amongst smaller organizations that have limited budgets and no internal IT department. In cases like this, it?s beneficial to outsource this responsibility to a trusted managed service provider like White Mountain IT Services. We can monitor your network to ensure that any issues are addressed before they cause major problems, like downtime, hardware failure, and data loss. To learn more about how managed IT can help your business succeed, reach out to us at (603) 889-0800.