Should we be considering moving to the cloud?

The short answer is yes before you spend any money on new servers, you should consider how cloud-based systems could help your business. White Mountain is an IT management and support company, not a server sales company.  We routinely help clients evaluate the best use of technology, minimizing the cost of ownership without adding complexity.  White Mountain has been providing full cloud desktop platforms to our client for many years and can help you objectively evaluate options, and plan a migration to the cloud if it is the right fit for your business. Today’s cloud services can offer a very competitive alternative to having servers and computers on-site.  Client’s who are best served by moving entirely to the cloud, literally remove all of the PC’s and servers, and each user has an inexpensive $200 “cloud terminal”. Rather than being in the never-ending cycle of buying, installing, maintaining and repairing computers and servers, everything is provided as a simple monthly user fee.  Your costs scale almost directly with the growth of the company. Some of the benefits of moving to the cloud include: Never buy another server! Expensive, high-end options become affordable (or included for free) Redundancy & fail-over Virtualization Real-time backups Disaster recovery Secure remote access Per-user software licensing Easy access from Windows, Mac, tablet, smartphone Easy security logging and auditing Standardization, so user support is easier End-user devices become inexpensive and easy to swap Systems and costs scale up and down as your needs change Call today to see if moving some, or all of your systems to the cloud is the right move for your business. At White Mountain, we make moving to the cloud EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

What should be included in a written security policy?

Depending on the industry that you are in, and the data security and compliance regulations that may apply to you, a security policy can be quite involved. At a minimum, every business should have a written security policy to demonstrate that the company takes data privacy and security seriously and has systems in place to protect it. Without having a policy in place, that all employees have seen and agree to abide by, it may be problematic should a problem develop in the future. A basic security policy should include: Password policy  (click HERE for password policy tips) Acceptable Use Policy for email, internet browsing, social media, etc. (click HERE for AUP tips) Access and control of proprietary data and client data Access to company data from remote locations, or on non-corporate devices Physical security protocols for doors, dealing with visitors, etc. Understanding data classification, what is critical and private data? How to deal with and report lost or stolen devices How to handle and report a suspected security breach or data loss Requirements and expectations for Security Awareness Training  (click HERE for cybersecurity training tips) Use of third party cloud or file sync services such as Gmail, Dropbox, etc. Requirements for encryption and computer locking procedures There are very specific requirements that your business may need to adhere to, and there are tools and templates available to help get started. If you would like to see some sample policies and talk about how we may be able to help you put a plan in place, give us a call today! At White Mountain, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

What is involved with setting up a cyber security training program?

Security awareness training should be available and encouraged for all computer users in your company. There are new variations of sophisticated threats like ransomware developed every day, and sometimes the human at the keyboard is the last defense and the biggest risk.  Having your computers and data infected can be a very disruptive and expensive event that can stop your workflow, and grind productivity to a halt. At White Mountain, our clients are offered an ongoing training and monitoring system that will help keep users up to date on the latest threats, as well as a platform to demonstrate that they understand, and know how to practice safe computing. In addition to classroom and online video training,  White Mountain Cyber Security User Training includes: Ongoing, scheduled course curriculum, customized by user Management reports on each users progress and participation Ongoing, automated email Phishing tests, customized for your business Positive reinforcement as well as remedial coursework based on users ability to spot fake emails Handouts and tools to help secure personal mobile devices, social media accounts, and home computers If you would like more information or would like to get a copy of our free Cyber Security Toolkit, give us a call today! At White Mountain, we make Security Training EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

How did you know our IT guys name is Larry?

Please let Larry know that we weren’t talking about him, (or were we?). All kidding aside, it really can be problematic to have a single internal, shared resource responsible for IT systems. A staff member that is not dedicated to IT, and does not have an IT background, usually doesn’t have the time, and almost never has the experience or resources, to do it well (no offense to Larry). We routinely meet companies that have operated this way and tell us that it seemed to work well for them until it didn’t. And when it stops working well, it almost always ends badly. The good news is that White Mountain can provide a much higher level of service, typically for less than the cost of a part-time employee.  Give us a call today to learn more about the White Mountain Advantage! At White Mountain, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

Outsource Your IT to the Pros and Stop Doing IT the Hard Way

First, we might need to explain the nature of break-fix IT services. This is what you normally get when you take your technology to traditional tech support. They?ll take a look at your technology, tell you what?s wrong, and provide their services for a hefty cost. They won?t take measures to help you mitigate your technology problems down the road. After all, their livelihood depends on your technology breaking down, so why should they have your budget?s best interests in mind? The other type of IT service seeks to do exactly that; managed IT wants to prevent issues from becoming major problems that cause downtime. This enables your business to save money and time by not having to deal with near-constant technology troubles. The idea is to use preventative maintenance in order to detect minor issues, and resolve the overarching cause, before they can escalate into costly problems that could derail your budget. Some examples of effective managed service offerings include: Server hosting: Your server units are used for the storage and transportation of critical data, so it makes sense to take proper care of them. However, the average small or medium-sized business might not have the staff or skillset necessary to care for or accommodate the physical server component. Businesses will often outsource this responsibility to guarantee the consistent uptime of crucial systems. Network security: Do you know the difference between viruses, malware, trojans, phishing scams, and other online threats? This is one of the many reasons why organizations would rather outsource their network security to cyber security professionals. Managing and maintaining a security solution that includes a firewall, antivirus, spam blocker, and content filter, can be tiring and knowledge-intensive. Remote maintenance and management: Often times, business professionals might be able to effectively use technology, but don?t notice telltale signs of degradation. Many of these signs can be spotted remotely, and the patches can swiftly be administered without a costly on-site appointment. Backup and disaster recovery: Small businesses need to preserve their data at all costs. It?s been proven that businesses that fail to restore their data following a loss incident are likely to go out of business within one year. This is why so many organizations turn to outsourced managed IT services to handle data backup. With Backup and Disaster Recovery (BDR), backups can be taken as often as every fifteen minutes, and data can be rapidly deployed in the event of a data loss incident. Does your business have trouble managing and maintaining its critical technology assets? With White Mountain IT Services, we try to make it as easy for you as possible. To learn more about any of the above services, and more, reach out to us at (603) 889-0800.