What is involved with setting up a cyber security training program?

Security awareness training should be available and encouraged for all computer users in your company. There are new variations of sophisticated threats like ransomware developed every day, and sometimes the human at the keyboard is the last defense and the biggest risk.  Having your computers and data infected can be a very disruptive and expensive event that can stop your workflow, and grind productivity to a halt. At White Mountain, our clients are offered an ongoing training and monitoring system that will help keep users up to date on the latest threats, as well as a platform to demonstrate that they understand, and know how to practice safe computing. In addition to classroom and online video training,  White Mountain Cyber Security User Training includes: Ongoing, scheduled course curriculum, customized by user Management reports on each users progress and participation Ongoing, automated email Phishing tests, customized for your business Positive reinforcement as well as remedial coursework based on users ability to spot fake emails Handouts and tools to help secure personal mobile devices, social media accounts, and home computers If you would like more information or would like to get a copy of our free Cyber Security Toolkit, give us a call today! At White Mountain, we make Security Training EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

How did you know our IT guys name is Larry?

Please let Larry know that we weren’t talking about him, (or were we?). All kidding aside, it really can be problematic to have a single internal, shared resource responsible for IT systems. A staff member that is not dedicated to IT, and does not have an IT background, usually doesn’t have the time, and almost never has the experience or resources, to do it well (no offense to Larry). We routinely meet companies that have operated this way and tell us that it seemed to work well for them until it didn’t. And when it stops working well, it almost always ends badly. The good news is that White Mountain can provide a much higher level of service, typically for less than the cost of a part-time employee.  Give us a call today to learn more about the White Mountain Advantage! At White Mountain, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

Outsource Your IT to the Pros and Stop Doing IT the Hard Way

First, we might need to explain the nature of break-fix IT services. This is what you normally get when you take your technology to traditional tech support. They?ll take a look at your technology, tell you what?s wrong, and provide their services for a hefty cost. They won?t take measures to help you mitigate your technology problems down the road. After all, their livelihood depends on your technology breaking down, so why should they have your budget?s best interests in mind? The other type of IT service seeks to do exactly that; managed IT wants to prevent issues from becoming major problems that cause downtime. This enables your business to save money and time by not having to deal with near-constant technology troubles. The idea is to use preventative maintenance in order to detect minor issues, and resolve the overarching cause, before they can escalate into costly problems that could derail your budget. Some examples of effective managed service offerings include: Server hosting: Your server units are used for the storage and transportation of critical data, so it makes sense to take proper care of them. However, the average small or medium-sized business might not have the staff or skillset necessary to care for or accommodate the physical server component. Businesses will often outsource this responsibility to guarantee the consistent uptime of crucial systems. Network security: Do you know the difference between viruses, malware, trojans, phishing scams, and other online threats? This is one of the many reasons why organizations would rather outsource their network security to cyber security professionals. Managing and maintaining a security solution that includes a firewall, antivirus, spam blocker, and content filter, can be tiring and knowledge-intensive. Remote maintenance and management: Often times, business professionals might be able to effectively use technology, but don?t notice telltale signs of degradation. Many of these signs can be spotted remotely, and the patches can swiftly be administered without a costly on-site appointment. Backup and disaster recovery: Small businesses need to preserve their data at all costs. It?s been proven that businesses that fail to restore their data following a loss incident are likely to go out of business within one year. This is why so many organizations turn to outsourced managed IT services to handle data backup. With Backup and Disaster Recovery (BDR), backups can be taken as often as every fifteen minutes, and data can be rapidly deployed in the event of a data loss incident. Does your business have trouble managing and maintaining its critical technology assets? With White Mountain IT Services, we try to make it as easy for you as possible. To learn more about any of the above services, and more, reach out to us at (603) 889-0800.

Tip of the Week: How to Find Out and Track Your Net Worth

How to Find Out Your Net WorthThankfully, your net worth takes more into consideration than just your paycheck. A good definition of net worth is the value of all assets, minus the total of all liabilities. Put another way, net worth is what you own minus what you owe. Generally speaking, this is why your net worth increases over time, due to the fact that you?ll owe less and less on the debts you pay. When determining your net worth, start by making a thorough list of what you own and what you owe. What You Own Home (its current value) Other real estate Automobiles and other vehicles like RVs and ATVs (leased vehicles don?t count) Jewelry and collectibles Household items, like furniture, appliances, etc. Retirement accounts, bonds, stocks, mutual funds Cash value of life insurance The balance of checking and savings accounts Cash What You Owe Home mortgage principal Other mortgage principal Auto loans Student loans Credit card debt Other loans Once you have all of these items in order, you?ll next plug this information into an online net worth calculator. http://cgi.money.cnn.com/tools/networth/networth.html http://www.creditcardfinder.com.au/net-worth How to Track Your Net WorthNow that you know your net worth, you can use a spreadsheet tool to keep track of its growth–in a similar way to how you keep track of your monthly budget. Here are four ways that tracking your net worth can benefit your financial situation. Financial Progress: We all want to evolve and progress in anything in life, it?s human nature. It’s even better when you grow your money and can look back to the month or year previous and see how far you’ve come. Confidence Builder: For example, if you saved an extra $1,000 in your emergency fund or watch your 401K increase due to a bigger contribution, it will make you feel proud of what you?ve been able to accomplish. Avoid focusing on just assets: If you have 200K in assets but 100K in debt, you?re just lying to yourself. It’s important to factor both into the calculation. Loans: Your net worth can be a factor if you plan on applying for a loan in the near future. In the same way that it?s beneficial to keep track of your personal net worth, there are benefits to keeping track of your company?s assets. The average SMB likely needs more than a calculator and a spreadsheet to do this, which is why there are so many enterprise-level accounting solutions on the market. To learn more about what?s available for your accounting department and how technology can further your company?s goals, give us a call at (603) 889-0800. P.S. Some businesses struggle to reliably budget out their IT, especially with surprise bills when technology goes down and unexpected updates need to take place. If you are frustrated with the unforeseen nature of your current IT, reach out to White Mountain IT Services to discuss a managed, proactive approach.

What Is Involved With A Lock-down Procedure?

When there is a change in IT Support staff that has access to your IT management systems and passwords it is important to quickly revoke access, change passwords review your security systems.  We suggest having a lock-down procedure in place to guide you through the process and ensure that nothing is missed. In addition to the obvious things like keys to building and passwords, here are a few other items to be sure you consider; Firewall administrator access Domain name registration accounts Email and web hosting accounts All remote access and VPN software Change the Point of Contact records for all vendors like the phone company, internet provider, etc. All online, cloud, or hosted services Let all employees know about the change, even the branch offices! Encryption keys and passwords for backups Remove them from all internal email distribution lists Access control and security systems Of course, this is all much easier if you have professional IT management systems in place so that everything is fully documented before you need to change it. When the only person who knows what to change, and how to change it is the one who just left, it can be a daunting task. If you want help getting in front of this, before it becomes an emergency, or if you are currently in need of an emergency lock-down, give us a call. At White Mountain, we make changing IT Service vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. What is involved with a lock-down procedure? What types of things should be documented? What is a comprehensive data backup system? What should be included in an Acceptable Use Policy? What are employee onboarding and separation procedures? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?