Cyber Security

Cyber Security is ingrained in all roles and in everything we do. From help desk and field services all the way through systems engineering, NOC, and the consulting team, we take network security seriously. Security starts during the interview process, everyone on our team has been subjected to comprehensive background checks and has been checked and registered (including fingerprints) with the national CJIS FBI databases as a prerequisite to being hired. Our offices are protected by monitored alarms, electronic access control, and video and audio recording systems. Our entire team follows industry best practices and are enrolled in ongoing cybersecurity training and testing. We offer a wide range of Cyber Security Services from the basics required for safe computing and IT management, all the way through penetration testing and advanced network security audits. White  Mountain IT Cyber Security services include: Event and security log monitoring and alerting Password management system Management of anti-virus, anti-malware, firewalls and server permissions Vulnerability audits Penetration testing and reporting Data encryption Secure email and message encryption User monitoring and activity recording Honey pot systems and monitoring A complete end-user cybersecurity training curriculum Ongoing Phishing test campaigns and reporting If you are concerned about your current level of network security, give us a call for a confidential consultation.    Engineering & Support Help Desk Services Onsite Services Server Support Network Management Data Backup Disaster Recovery System Engineering Network Operations Network Security Project Work Staff Augmentation Cloud Services Computer Consulting Professional IT Management Service and Support Management Project Management Standard Operating Procedures IT Policies Systems Documentation Technology Consulting Cyber Security Training Reporting and Metrics Co-Managed IT Services Planning & Consulting Virtual CIO Services Strategic Alignment Budgeting IT Road-Map Business Continuity Workflow Analysis

Project Work

We are available to help with all of your technology projects. From a simple office move across town to a full CRM system migration, or move to the cloud, White Mountain can provide the resources to get the job done. Depending on your needs, we can simply provide a helping hand, or provide consulting and project planning services, or even full project management, overseeing other vendors and internal resources. Typical IT Projects that we help out with include: Office moves, new locations Mergers and acquisitions Deployment of new workflow and software systems Integrating tablets and mobile technology Wireless network design and deployment Overseeing Web development and digital marketing projects Cloud migrations and readiness audits Video conferencing system installations Security camera and door controller installations Choosing and evaluating new vendors for security, telephone and internet services New VOIP system migration and roll-out Compliance and audit projects   If you have a new project coming up, or if your old project list just seems to never get finished, give us a call, we are happy to help out!    Engineering & Support Help Desk Services Onsite Services Server Support Network Management Data Backup Disaster Recovery System Engineering Network Operations Network Security Project Work Staff Augmentation Cloud Services Computer Consulting Professional IT Management Service and Support Management Project Management Standard Operating Procedures IT Policies Systems Documentation Technology Consulting Cyber Security Training Reporting and Metrics Co-Managed IT Services Planning & Consulting Virtual CIO Services Strategic Alignment Budgeting IT Road-Map Business Continuity Workflow Analysis

Staff Augmentation

Staff Augmentation, because sometimes you need a helping hand. Staff augmentation is when a client needs an onsite tech resource on a regularly scheduled basis. This might be to help out with deployment and training of new hardware or software systems, helping out with onboarding new employees, or to help open a new office. Whether your need is as little as four hours per week, or a full forty, short or long term, we can provide the help you need when you need it. Advantages of having White Mountain help with your staffing needs include: Our technicians are trained in industry best practices We provide management and oversight Detail of all work performed will be documented in our ticketing system Configuration changes will be documented in your IT documentation portal When your project is finished, the tech is still available as a member of our team   If you are considering bringing on part-time help, or an IT contractor, to help out with a long term project, give us a call first, we may be able to offer much more value than just a hired hand.    Engineering & Support Help Desk Services Onsite Services Server Support Network Management Data Backup Disaster Recovery System Engineering Network Operations Network Security Project Work Staff Augmentation Cloud Services Computer Consulting Professional IT Management Service and Support Management Project Management Standard Operating Procedures IT Policies Systems Documentation Technology Consulting Cyber Security Training Reporting and Metrics Co-Managed IT Services Planning & Consulting Virtual CIO Services Strategic Alignment Budgeting IT Road-Map Business Continuity Workflow Analysis

Cloud Services

Move your business to the Cloud, and leave the hassles behind. Are you ready to get out of the IT infrastructure business? Q: “Can I really get rid of my servers and desktop computers?” A: “YES, we can move your entire IT platform into the cloud, including your custom database, line of business app, and any other special software that you may use. We can even replace all of your desktop PC’s with $200 ‘Windows terminals’ and be done with IT headaches forever.” White Mountain has an established track record of helping small businesses evaluate and realize the advantages of cloud computing, and actually moving to the cloud, not just hosting email or a server in a data center.  If you are considering a move to the Cloud and would like a free consultation and demo, just give us a call.  It’s no problem if you aren’t ready to make the move, all we ask is that you call us BEFORE you buy another server, we may be able to show you a better way.    Engineering & Support Help Desk Services Onsite Services Server Support Network Management Data Backup Disaster Recovery System Engineering Network Operations Network Security Project Work Staff Augmentation Cloud Services Computer Consulting Professional IT Management Service and Support Management Project Management Standard Operating Procedures IT Policies Systems Documentation Technology Consulting Cyber Security Training Reporting and Metrics Co-Managed IT Services Planning & Consulting Virtual CIO Services Strategic Alignment Budgeting IT Road-Map Business Continuity Workflow Analysis

Lessons From a Company that Successfully Beat Ransomware

Characteristic of ransomware, the attack locked transportation agency employees out of their workstations and disabled other systems. As a result of such widespread system failure, the agency was unable to collect payments for fares at their many ticketing kiosks, seeing as each kiosk could only display the message ?you hacked. ALL data encrypted.? However, the agency still managed to operate by accepting cash payments for fares or not charging for rides while the system was down. The hacker or group of hackers responsible went by the username Andy Saolis. In exchange for the decryption key, the hackers asked the agency to fork over approximately $73,000 worth of Bitcoins. In an odd twist as to why the hackers targeted the public transportation agency, an email revealed misplaced Robin Hood-like motives, ?They give Your Money and everyday Rich more! But they don?t Pay for IT Security and using very old system?s !? However, an investigation by the FBI into the Andy Saolis account reveals a less-than-noble history of hacking several private companies. Instead of bowing to the hackers? demands, officials elected to restore their system from a backup copy. Essentially, they called the hackers? bluff and came out on top. Upon enlisting the help of hackers of their own to assist with stopping the attack, the agency discovered that the hackers had only gained access to 25 percent of the agency?s network and made off with no data. This stands in contrast to the hacker?s online claim that they stole financial information from the payment kiosks, as well as 30 gigabytes of sensitive data pertaining to the operations of the agency. While your SMB may not be able to employ the services of the FBI or vigilante hackers to strike back against those who hack your business; or, even be in a position to offer your services for free during a blackout, you do have the ability to maintain backed up copies of your data so that you can revert back to these copies should a ransomware attack ever befall your organization. Additionally, by taking advantage of security best practices like using complex passwords, two-factor authentication, and security solutions like firewall, spam blocking, and content filtering, you?ll be able to safeguard your network from getting hacked in the first place. To make sure your network is equipped to thwart a malicious ransomware attack, reach out to White Mountain IT Services at (603) 889-0800.