Recent Blog Posts

Why Small Businesses Need to Think Big When it Comes to Network Security

You might be surprised by the reason, and it?s the fact that hackers quite simply don?t care what the size of your company is. They don?t care which industry you?re in or what you do. Regardless of whether or not you?re a startup or a major service provider for your region, your business holds information that hackers will find valuable. This is what hackers care about most–how much value you can provide them with, and you can be sure that it?s a dangerous gambit to not prepare for the worst. But what data do you have that could be so valuable to hackers? Information that?s managed by human resources, like Social Security numbers, dates of birth, addresses, phone numbers, and email addresses, are all great ways to either steal an identity or attempt targeted spear-phishing attacks. Furthermore, the finance department might have access to payment information for both your business and your clients, which could lead to a major problem should this information get out of your grasp. Still, it?s worth mentioning that hackers can use plenty of other tactics at their disposal to find a way into your network, be it through viruses, malware, spyware, or otherwise. They probably won?t target specific data, and in most cases, it?s not even your particular business they?re after. Often times, these types of scams are designed to be one-size-fits-all in nature, and the spam message that you see in your inbox was probably sent out to a bunch of other businesses, too. Think of it like a fisherman; they don?t necessary know what they?re going to catch, but they?ll do whatever it takes to catch at least something. In this case, it?s a literal phishing email, which convinces the user to click on a link, download an infected attachment, or navigate to a malicious website. It will be rare that your business experiences a legitimate, direct hack tailored to infiltrate your specific network. Thanks to this oversight, it?s possible for your business to cover plenty of ground in the cybersecurity department by following a few easy steps. The first is that you implement a plethora of proactive security measures that are designed to keep issues from both happening in the first place, and from escalating into major problems. This includes firewalls, spam blocking, and content filtering to minimize exposure to threats and to keep them out of your network, and an antivirus solution just in case things go south. You might be a smaller target, but you?re still a target nonetheless. Be sure that your small business implements these security solutions, or you could be putting your entire network at risk. White Mountain IT Services can help you implement enterprise-level security measures, like our Unified Threat Management solution, that can handle all of the above threats and then some. To learn more, reach out to us at (603) 889-0800.

For Emergency Purposes Only: Users Can Now Activate Facebook’s Safety Check

One of the most devastating elements of any disaster is not knowing if affected friends and loved ones are safe. Safety Check meant to reduce the fear of this unknown by giving users a simple way to confirm that they are okay, and to check in to make sure the people they cared about were safe as well. However, when Facebook retained total control over the tool?s activation, it was put into effect a total of 39 times worldwide between December of 2014 and December of 2015. Unfortunately, this number is clearly far too low for a tool meant to chart disasters around the world. As a result, Facebook took steps to put the power to activate Safety Check in the hands of those who would need it most–the communities affected by the crisis in question. Utilizing a two-step system, Facebook will first receive confirmation that an event is taking place through a network of third-party organizations, and then analyze the chatter put out by the community in the affected area to determine if Safety Check is warranted. This new, fully-automated process has been put to use 328 times since first being tested in June of 2016. Disasters, unfortunately, are a terrible fact of life on this planet. It is difficult to be prepared for anything, but with tools like Facebook?s Safety Check, we can at least be informed that our loved ones are safe.

Every Network Security Plan Needs to Cover These 4 Components

We?re talking, of course, about a Unified Threat Management (UTM) solution. It?s a well-known and exceptionally helpful security tool that manages to take care of most threats that can access a network. However, unlike some other security solutions, the UTM not only focuses on eliminating current threats to your infrastructure, but also preventative measures designed to keep your system safe and secure. We?ll discuss the components of a quality UTM, so that you can know what to look for when shopping around for a security solution. FirewallA firewall is a basic security measure that anyone who uses a computer should be familiar with. You can think of a firewall as a virtual bouncer that keeps the bad data from entering your organization?s network, while still allowing good data through. A firewall, however, needs to constantly be updated with threat definitions in order to remain effective, and some seemingly-benign data might still get through. AntivirusAn antivirus solution works well alongside a firewall; it can detect and destroy potential threats before they can do harm to the infected system. Alongside a firewall, antivirus software is a critical component of any computing infrastructure–particularly in the business sector. Spam BlockingSpam is one of the preferred modes of transportation that hackers use for their malware, and there?s a very good reason for that. It?s because spam allows users to ?go incognito,? so to speak, and mask their identity through the use of email spoofing and other methods. Hackers commonly use what are called phishing attacks to trick users into downloading malicious files or accessing suspicious websites. A spam blocker can keep the majority of spam out of your inbox, eliminating this threat. Plus, spam is just annoying in general, even if it?s not malicious. Content FilteringNot all web content is safe to browse, and even a good employee could accidentally visit an unsafe website that contains malicious code. In instances like this, a content filter keeps your infrastructure safe. Also of note is that content filtering can restrict access to specific sites on a per user basis–perfect for the problem employee who can?t seem to stay off of social media. To learn more about UTM solutions and other security measures, be sure to reach out to us at (603) 889-0800. Our professional technicians can work with your business to assemble the ultimate security package.

Tip of the Week: 3 Simple Tricks to Resolve a Troublesome Wi-Fi Connection

Step One: Check YourselfBefore you get started, make sure that your router is located far away from other electronic devices. This is because devices can often hamper your router?s ability to broadcast a signal. When there are devices or other obstacles between your own device and the router, like walls or floors, the signal is further weakened. Therefore, a simple fix is to elevate the router, especially if its signal needs to reach a higher floor. This cuts down on the distance between point A and point B, allowing for both a stronger signal and a more efficient router location in general. Hopefully, this resolves the problem, as there will be fewer places where the connection can get caught up. Step Two: Antenna AdjustmentsIf your router or device has an external antenna, you can try to adjust it to find the ideal Internet connection. It?s hard to suggest an optimal antenna orientation, but chances are that you?ll be able to figure it out pretty quickly with a little trial and error. If you still can?t get out of the dead zone, you can replace the antenna entirely. You may even have to resort to a standalone antenna/extension cord combo. The idea is to extend your device?s reach to a place far beyond the dead zone. With any luck, you should be able to pick up the signal that you need, even if you technically shouldn?t be able to. If the equipment you?re using just doesn?t have an antenna, you can use USB adapters for a similar effect. Yet, if these adjustments still aren?t helping your technology connect, it might be time to buckle down and go all-in on a Wi-Fi extender. Instead of figuring out the optimal position for a router, a Wi-Fi extender takes your signal and extends it even further, effectively repeating the signal so that any devices within range of the extender can connect to the Wi-Fi. It?s great for getting around an immovable object like a wall. Step Three: Upgrades and UpdatesThe final step is to make sure that your router and any adapters are all up-to-date themselves. While you may not notice significant problems at first, there is the possibility for significant trouble down the road. Like all office solutions, it?s important that you keep your connectivity technology updated with the latest patches, firmware updates, and drivers. Doing so can help you considerably extend the lifespan of your technology. With these best practices, you should have no trouble with your Wi-Fi connection troubleshooting. If you still have difficulty, however, let White Mountain IT Services give you a hand. To learn more about the services we offer, reach out to us at (603) 889-0800.

Tip of the Week: 3 Tips to Keep Your Email Inbox Under Control

Here are three ways you and your employees can save time and resources by wasting less time on your emails. Make Time to Read Your InboxWhile it might be exactly what you dread, there?s no other way to clean up your inbox. You need to go through it and read the messages that you?ve received, important or not. Many business executives receive so many messages a day that the sheer thought of keeping up with them sounds impossible. This is why you have to make time to go through your inbox. Remember, nobody can do it other than you. A good strategy is to check it in the morning, in the afternoon around lunch time, and at the end of the day. Eventually, you?ll start to chip away at your inbox to the point where the emails you receive are much more manageable. Unsubscribe from Email ListingsAnother great way to clean your inbox is to cut down on the amount of new messages you receive in the first place. In your Internet misadventures you may have subscribed to online news sources or e-newsletters that send promotional messages to your inbox. You can unsubscribe from these services by looking for the unsubscribe link in the message. This should direct you to the website?s account settings, where you can unsubscribe yourself from receiving any more messages. Just be sure that the link is legitimate and not a cleverly disguised phishing scam. Implement a Spam Blocking SolutionSpam is a major problem for all businesses, but even more than that it?s a security problem. Hackers tend to send malware in unsolicited email messages. If your users don?t know any better, they could accidentally expose your network to potential threats. With a spam blocking solution, you can keep your inbox safe and secure from dangerous or time-wasting spam messages. The ideal solution is capable of keeping these messages out of your inbox in the first place, eliminating the need to comb through them. If your business is sick of dealing with spam and the necessity of cleaning up inboxes, White Mountain IT Services can help. Through proactive technology solutions, we can vastly improve the way that your organization functions. To learn more, reach out to us at (603) 889-0800.