Before You Act on a Hack, Know the Extent of the Breach

Before you do anything else, it?s important to remain calm and not to make any rash decisions concerning your systems, like going public with your hack immediately following the breach. Before informing those who were affected, you need to know who actually was affected. This includes determining how deep the breach has gone, how much data was stolen or destroyed, and whether or not there are still underlying issues within your IT infrastructure, waiting to resurface. Understand the Full Scope of the AttackBefore jumping to conclusions, begin by assessing what exactly happened to your IT systems. Was it a data breach, and if so, how did the intruders get in? Did they infiltrate through a spam email, or did they brute force their way into your network? Was it the cause of user error, or the result of a neglected vulnerability in your software solutions? These are all important questions that need to be asked, and you need to know the full impact of the hacking attack before anything can be done about it. Check Which Data, If Any, Was StolenThe next part of handling a data breach is checking what data was affected by it. Did the hacker make off with any valuable information, like Social Security numbers, credit card numbers, account usernames, passwords, or other credentials? If you know which files have been accessed, you?ll have a good grasp on the extent of the damage. However, if health records have been compromised, you might be more trouble than you?d care to admit. Give Your IT Department Room to Clean Up the MessYour business needs to conduct a full investigation into the hacking attack, and take preventative measures to ensure that the system has been completely purged of the threat. This includes having an environment available for work while your IT is busy containing the problem and resolving it as quickly as possible. This also includes having the resources available to do so; your budget should be ready to deal with hacks whenever possible. Find the Real IssueSometimes smaller hacking attacks are used as distractions to the real problem. For example, a virus that infects a PC could simply be a distraction to hide a trojan, which may allow the hacker to later access your network. If this happens, any attempts to clean up your systems might be rendered useless, especially if you haven?t found the trojan. You could just be inviting another hacking attack, which is counterproductive and costly. Keep in mind, sometimes your business might not be the target, but instead just unfortunate enough to be a victim. Phishing attacks, malware, and other threats travel virally, spreading between contacts and getting picked up on unsafe websites by users. Know Your Compliance LiabilityDepending on the types of files that have been exposed to hackers, you might have a full-fledged violation of compliance laws on your hands. This can lead to expensive fines that can break your budget. Knowing where you stand on compliance, as well as what?s involved for reporting it, is a crucial step in handling a data breach. White Mountain IT Services can help your business handle any potential data breach, and our trusted IT professionals can assist with implementing new solutions to prevent future breaches. To learn more, give us a call at (603) 889-0800.

A Fascinating Look at How the Internet Has Changed the Stock Market

Wall Street, BC (Before Computers)Even before the advent of the computer, Wall Street was well known for utilizing technology. The ticker tape is a shining example; a fascinating device which gave a real-time and continuous printout on the performance of the market. When combined with a nearby telephone, these two technologies gave the average Joe the ability to buy and sell securities on a whim. This helped pave the way for near-instantaneous trading, which was largely responsible for the dynamic growth experienced by the stock market during the twentieth century. Make Way for the ComputersLater, the quotation board was adopted, retiring the iconic ticker tape machines. In the 1980s, modern computing tactics took front and center, thanks to the introduction of the Quotron. With this technology, brokerage houses gained the power to instantaneously manage large hedge funds by quickly reacting to market fluctuations. The Internet Changes EverythingWhen the Internet revolution hit, using computers connected over a network wasn?t something new to Wall Street. In fact, as early as the 1970s brokerages had been using Electronic Communications Networks (ECNs) to make their own computer systems more efficient. However, before computer networking could significantly change the operations of a behemoth institution like Wall Street, significant capital first needed to be invested in order to build the infrastructure–a longtime task that was actually funded by significant technology investments being poured into the stock market. With the rise of the Internet came online brokerages such as ETrade and Ameritrade. However, the major influence of such online tools which gave individual players unparalleled control over their investments is only part of the story. In 1994, two economists, William Christie and Paul Schultz, published a paper titled, ?Why do NASDAQ Market Makers Avoid Odd-Eighth Quotes?? where they outlined a deliberate anomaly where market makers were manipulating the spread (the difference between the buy and sell prices of NASDAQ securities) to secure these individuals a higher profit margin. You may recall this event leading to a full-scale investigation and subsequent rule changes by the Security and Exchange Commission (SEC) to protect the smaller investors that made use of these online trading services. Eventually, even the traditional brokerages such as Charles Schwab and TD Waterhouse offered online trading that could be accessed by anyone. Like with every good bubble, the crazy market growth fueled by Internet technologies (with frenzied spending seen particularly in 1999 and 2000) eventually popped. It took a few long years for the EU and US markets to rebound from the pop of the dot com bubble, but confidence in the markets was eventually restored, thanks to a realization that the Internet was much more than a fad and could be effectively utilized by companies to boost their sales base. Online Trading at High SpeedNo longer faced with the limitations of dial-up modems, today?s Internet speeds make it possible for investors to execute trades in incredibly short intervals–millions of times faster than what can be made by human decision making. This has led to the phenomena of quantitative trading, which uses complex algorithms to do trades so fast that a half a cent here and a half a cent there can lead to millions of dollars changing hands over millions of trades. However, this technological development helped contribute to another major dip in the market, […]

Tip of the Week: 10 Google Easter Eggs – Because the Internet Isn?t Distracting Enough

Of course, we?re not talking about the colored eggs hidden in the yard every spring. No, we?re referring to the fun surprises Google has added to their search engine. By entering a specific search query into Google.com, you?ll encounter a Google Easter egg. Over the years, Google?s hidden a few dozen Easter eggs. Here?s how to access White Mountain IT Services?s 10 favorite eggs! Type ?Atari breakout? and click ImagesThis will turn all of the searchable images into a playable game of the classic video game Super Breakout. Be sure to turn on your speakers to enjoy the nostalgic sound effects. Type ?Askew?This clever Easter egg will tilt your search results just enough to be noticeable. Don?t worry, after you leave the page your screen will be back to normal. Type ?Festivus??Festivus for the rest of us!? Festivus is a made up holiday originating from the television show Seinfeld. By searching for ?Festivus,? you?ll find out exactly what the holiday is all about, while being treated to a traditional Festivus pole located on the left side of your screen. Type ?Google in 1998?Computer users with fond memories of the 90s will appreciate this one. This Easter egg will provide you with a fascinating glimpse of what Google looked like–almost 20 years ago! Type ?Zerg rush?Players of the popular video game StarCraft and ?n00bs? alike will appreciate this egg. Essentially, this search causes Google?s letters to attack the search results, and the only way you can stop them is to frantically click each one until they disappear. However, characteristic of the game?s Zerg rush, doing so will only cause more Zerg-like letters to appear, until you?re overwhelmed and your precious search results are destroyed. Also, notice the handy-dandy score counter on the right side. Type ?flip a coin,? or ?roll a die?Google will display an animated die or coin that will provide a random result with each search. If you don?t have an actual coin or die on you, this is a great alternative. Type ?[actor?s name] Bacon Number?The Bacon number here relates to the classic game ?Six Degrees of Kevin Bacon,? not the sweet meat. In the game, you?re supposed to figure out how many films separate an actor from another movie with Kevin Bacon in it. Although, we think that automating the game like this kind of takes the fun out of it. Type ?fun facts?Feeling curious? This egg will provide you with a random fact card. As a bonus, this is an easy way to play a game of trivia with your friends. Type ?The answer to the ultimate question of life the universe and everything? (no punctuation)Fans of The Hitchhiker?s Guide to the Galaxy will of course know the answer to this. Type ?Google Pacman?In yet another nod to video games, Google made a playable game of Pac-Man as a doodle in 2010 to celebrate the game?s 30th anniversary–a doodle responsible for costing the US economy $120 million in lost productivity, or 5 million wasted work hours, upon its release. Thankfully, Google decided to keep the game up. Good news for bored office workers, not so much for the economy. These are our top 10 favorite Google Easter eggs, there are actually many more to be found. Can you think of one or two eggs that we didn?t go over? […]

Reminder: Windows 10 Free Upgrade Period Ends July 29th

Budget ConstraintsThe first is the fact that Windows 10 is (still) a free upgrade, unlike upgrading to Windows 7 or 8.1 from Windows XP. At the time, businesses were fretting over the impossible strains that they would be placing on their budget all at once. The other issue associated with Windows XP was that hardware running Windows XP was also old and out of date in the first place. Upgrading multiple workstations is another major cost that organizations dragged their heels with, and many paid the price once the end of support date finally arrived. In comparison, Windows 10 is a free upgrade for users of Windows 7 and 8.1, which many businesses upgraded to following Windows XP?s end of support. Keep in mind that Microsoft is only offering free upgrades to Windows 10 until July 29th, 2016 – one full year following its release to the public. Now is as good a time as ever to upgrade, especially considering the fact that, at the present moment, it costs your business nothing (well, almost nothing) to invest in Windows 10. Legacy ApplicationsWhen moving applications and internal software solutions over from Windows XP, organizations had to perform extensive research and dedicate resources to guarantee application compatibility with more modern operating systems. This process could take quite a bit of time, which was something that XP users didn?t have much of. Thanks to Windows XP?s end of life forcing users to upgrade, most of the heavy lifting for application compatibility has already been done. This means that, in theory, a Windows 7 or 8.1 upgrade to Windows 10 will be much easier to perform than an XP-to-Windows 7 upgrade. This doesn?t mean that you should upgrade without first taking a moment to consider compatibility again, though. It?s important to discuss the migration process with trusted technology professionals, and to thoroughly test compatibility in a controlled environment before committing wholeheartedly to a migration procedure. Windows 10 is now on over 300 million active devices. Does this figure include your business?s workstations and mobile devices? If not, your business should consider doing so before Windows 10?s free upgrade deadline arrives. The latest technology solutions can be an immense boon for your business, and one which sets your organization apart from similar businesses in your chosen service area. To learn more about migration, contact White Mountain IT Services at (603) 889-0800.

Wireless Retinal Implants Give Functionally Blind People a Second Lease on Sight

Granted, this technology is still relatively new, so it hasn?t yet developed to the point where it can cure every form of blindness, but it?s certainly a step in the right direction. In particular, the Argus device is designed to help patients suffering from retinitis pigmentosa. This is a hereditary condition causing light-sensitive cells in the retina to depreciate to the point where the victim will eventually be unable to see anything but the brightest of lights. Though this device cannot perfectly give back a person?s sight (at this time, it can only provide black and white images), it can at least restore some functions of the retina, which greatly improves the patient?s ability to see. The Argus is able to achieve this by sitting directly on the retina and receiving images wirelessly from a special camera mounted on a pair of retrofitted glasses. The device will then convert these images into electromagnetic pulses and send them to the human brain via the optic nerve, much like how a normal retina works. To achieve this connection to the optic nerve and retina, electronic equipment must first be implanted into the human body. This procedure perhaps presents the designers of the Argus with their greatest challenge, due to the body not being a very hospitable place for electronics. The body?s salt content causes electronics to corrode over time. This means that the designers must make the device small enough to not be obtrusive, yet sturdy enough to withstand these conditions. The first version of the Argus only had 16 electrodes, which provided the patient with limited sight. The newest versions of Argus come equipped with 60 electrodes, vastly improving sight capabilities. Eventually, Second Sight wishes its product to be able to provide color vision to its patients. What does this device look like in action? Watch this video. Looking to the future, this implant technology can be developed to treat many different kinds of blindness, such as optic nerve damage, diabetic retinopathies, glaucoma, and more. However, it may still be some time until we see this day, due to this technology having to directly connect to the brain. The advancements of technology are something to be optimistic about. When you look at devices like the Argus, it feels like it?s only a matter of time before technology is able to solve the worst of our problems. Agree? Disagree? Share your thoughts with us in the comments.