Recent Blog Posts
Eat, Drink, and Smoke Somewhere ElseFor many users, eating, drinking, and smoking at their computer is a way of life. This is a big no-no as far as proper computer maintenance is concerned. Crumbs make their way into the keyboard and even to the insides of the computer itself, grease from fingers gets all over everything, and then there?s the risk of accidentally spilling food and drink on the machine. All things considered, it?s better to dine elsewhere. Smoking, too, isn?t good for computers. Computers utilize fans to circulate air and keep the machine cool. If that air is filled with smoke, then a disgusting, tar-like residue will coat the inside of the machine. In addition to this residue being just plain nasty, it causes performance issues. Give Your Computer a Good CleaningIt?s common sense to clean a dirty computer, but not every user understands just how often they should bust out the cleaning supplies. How often one should clean their PC actually varies a lot, depending on factors like environment, lifestyle, how much the computer is used, etc. One tool to help users determine how often they should clean their machine is an online calculator from ComputerHope. Generally speaking, giving a computer a thorough wipe down every two years is adequate, but heavy PC users will want to do this more often. Also, another common-sense rule that we feel the need to mention is to always power down your computer before popping the case open to clean it. If you are unsure how to do this, you can ask one of our IT professionals by giving us a call at (603) 889-0800. Give the Computer its SpaceBe mindful of where your computer?s fans and vents are located, and be sure to place your PC in such a way that the machine has ?room to breathe.? If any of these vents are obstructed, the machine will overheat and potentially cause critical damage and even data loss. Additionally, placing a PC or laptop on a cushy surface like a carpet or blanket should be avoided, or else risk overheating and the intake of too much dust and dirt. Give Your PC a Good DustingDusting your PC should be done more frequently than the thorough cleaning we mentioned earlier. While a small layer of dust can be annoying, a significant amount of dust can actually risk coating the insides of your PC and cause overheating and performance issues. The best way to dust off your PC is by using compressed air, found in cans at most electronics stores. Whatever you do, do not apply cleaning liquid directly to your PC. Liquid of any kind and electronics don?t mix, period. For more great tips on how to take care of your technology, subscribe to White Mountain IT Services?s blog.
What is an Uninterruptible Power Supply?If you?re unfamiliar with what a UPS device is, consider this technical explanation from Wikipedia: An uninterruptible power supply, also uninterruptible power source, UPS or battery/flywheel backup, is an electrical apparatus that provides emergency power to a load when the input power source, typically mains power, fails. A UPS differs from an auxiliary or emergency power system or standby generator in that it will provide near-instantaneous protection from input power interruptions, by supplying energy stored in batteries, supercapacitors, or flywheels. The on-battery runtime of most uninterruptible power sources is relatively short (only a few minutes) but sufficient to start a standby power source or properly shut down the protected equipment. Essentially, a UPS device protects your company?s electronics from the ill effects of an unexpected power loss and unpredictable power fluctuations, which can lead to, but isn?t limited to, data loss. These power inconsistencies can be caused by a host of different factors, like natural disasters, unreliable power grids, a faulty IT setup, and more. In events like these where power is lost, a UPS device jumps into action and buys you enough time to properly shut down your IT equipment. To clear things up, a UPS device is different than a backup generator. Whereas a backup generator will supply enough power to continue operations, a UPS device only supplies enough power to allow for equipment to be properly shut down. Additionally, a UPS device provides extra power when not enough electricity is being supplied, as well as protects equipment from electrical surges. In several of the UPS models, the device automatically signals and shuts down the equipment in the event of a power loss. What Kind of UPS Should You Get?As mentioned, there are a variety of UPS devices on the market. You can get a single UPS device for a single PC, or you can get an enterprise-level UPS device designed to safeguard your entire IT infrastructure. Therefore, getting a UPS device for your organization should be a well-researched decision. To that end, White Mountain IT Services can work with you to select a perfect UPS device for your business continuity needs. In addition to selecting an adequate UPS device for your company, White Mountain IT Services will take the time to select for your business the other pieces of the business continuity puzzle. This includes having a data backup and recovery plan, as well as an enterprise-level firewall to protect you from threats that can compromise your data. White Mountain IT Services can provide all of these IT solutions for your business, and more. To take advantage of the best IT solutions for your business, give us a call today at (603) 889-0800.
VoIP is growing more popular in businesses all over the world, and for good reason. It makes communicating with both internal and external parties exceedingly easier, especially if your office has limited space to conduct meetings. Here are three benefits that you get from using VoIP as your preferred conference calling solution. VoIP Uses Your Internet ConnectionBack in the day, picking up the landline phone and calling your employees was the best thing you could do for collaboration barring face-to-face meetings, conference calling was a pain in the neck. Now, however, it?s so much easier to communicate, and it?s all thanks to the Internet. Voice over Internet Protocol allows your employees to transmit their voices across an Internet connection in much the same way the traditional telephone system works, but without all of the complex landline cabling. Additionally, cable companies are generally stingy with the services they offer, packaging them together in an effort to get you to pay more for services that you might not necessarily want or need. Since VoIP only uses your Internet connection, you won?t have to worry about additional charges. If you want any additional services, however, VoIP solutions are very flexible. Plus, you?ll never have to worry about long-distance phone calls for your remote team (if you have one). This also means that limitations for trunks (the number of physical phone lines you have leaving the building) are a thing of the past. As you grow, your phone system won?t limit your team from making outbound calls. VoIP is More MobileWith a traditional phone system, you?re tethered to your desk. Even if you have a cordless phone, you can only go so far away from the receiver before it stops working. With VoIP, you?re essentially using a web or desktop application that transfers your voice through the Internet, allowing you to access the system anywhere, anytime. You can even use your smartphone with a VoIP solution, if you so desire, making for a familiar experience. Depending on the VoIP solution, you can also just use a headset on your desktop or laptop. Considering how versatile and mobile VoIP is compared to traditional phone systems, you can potentially allow your team to work remotely. By giving your team the tools to help them stay productive at all times, you?re paving the way for greater success and workplace fulfillment. VoIP Has Ideal Add-OnsOne of the best features of a VoIP solution is that they often come with video conferencing capabilities. Just like how the average consumer uses Skype to video chat with their friends, a VoIP solution has video conferencing capabilities that allows users to speak ?face-to-face? without being in the same room (or even the same country). This helps your team stay connected even if they?re scattered all over the world. Taking advantage of VoIP can be a life-changing event. White Mountain IT Services can walk you through the entire setup process, from start to finish. We can even host your VoIP solution off-site so that its maintenance and management are a hands-off experience for you. To learn more, give us a call at (603) 889-0800.
When targeted by a DDoS attacks, the organization?s network is overloaded with traffic. This is a deliberate action that is perpetrated by a party looking to take down your organization?s network. It is typically performed by a botnet that has been created by hackers. It quickly shifts from being an unruly inconvenience to a major operational problem, as these robots take down your ability to access your data and applications. One major difference between a DDoS attack and your traditional hack is that the former can be carried out by almost anyone. There have been tales of individuals, including young people, successfully bringing down company networks. We?re here to tell you that you don?t have to give up to a seemingly relentless DDoS attack. By understanding your network, its traffic, and what to do if you are at the unfortunate end of one of these attacks, you won?t have to deal with the downtime that is typically associated with this type of interruption. Understand Your NetworkDo you know how much traffic comes through your network? If you don?t, you can?t immediately assume that you?ve been the target of a DDoS attack. In order to best detect abnormalities with your network traffic, familiarizing yourself with your typical network traffic is a must. Beyond the DDoS attack, by understanding your organization?s network, you will be in a much better position to react to the most common issues your network may face. With this information, the minute you see traffic that looks out of place, you can react to the issue quicker, avoiding costly downtime. Be ReadyThe unpredictable nature of DDoS attacks leave many IT administrators unprepared. Identify your critical systems and take action to protect them from being compromised. There is definitely a reason why you are under attack, but it’s extremely difficult to know what that reason is. Even if you are facing dire circumstances, it is essential that operations are sustained. One way this can be mitigated is by hosting some or all of your organization?s computing infrastructure in the cloud. If yours is like most small and medium-sized businesses, you can?t afford to accept large chunks of downtime. To ensure your organization is protected, one solution is to call the certified technicians at White Mountain IT Services. We have the knowledge of industry best practices and years of experience warding off cyber criminals. For more information about how we can help your organization protect itself from web-based threats, call us today at (603) 889-0800.
Back Up With Care Although this sounds like a safe-driving motto, it actually applies to ransomware, a type of data kidnapping. This type of malware infiltrates your system by way of social engineering techniques, then encrypts your important files, rendering them inaccessible until you pay the “data-nappers” a ransom. The Cyber Threat Alliance Analysis of Crypto Wall v.3, found that CW3, a recent ransomware, impacted the operations of hundreds of thousands of worldwide internet users and resulted in over $350 million dollars being handed over. Please see our recently published Crypto Alert for more information about the dangers of ransomware. Resolution #1 If you want to call the bluff of “data-nappers”, back up your files religiously. A little redundancy goes a long way. So does constantly reminding your staff to exercise caution and forethought when using the internet. Ignore Phishers Phishing schemes that worm their way into your system clothed in the guise of official, authentic-appearing email messages are growing more sophisticated with each passing year. They have to, since they are often intended to trick CEOs and other high-ups into opening them. Once they do, network-wide havoc ensues, spreading viruses, and exposing sensitive data. Resolution #2 Take time to conduct educational meetings for all employees, institute a strict security policy, and if you don’t already have one, look into a real-time monitoring and scanning system with blocking capabilities. Keep Swatting Those Bugs Most likely your company makes use of off-the-shelf software solutions rather than employing someone to develop your own programs. The code behind these popular software suites was written years ago and contain vulnerabilities that regularly, rise to the surface. Hackers are often the first to catch on, and before software developers have a chance to issue a patch, quickly exploit these freshly exposed holes to gain access to user’s files. Resolution #3 As soon as they become available, download software patches to repair the vulnerable hole. Does your business take data and cyber security seriously? Do you encourage and promote security awareness and safe computing practices? Get the conversation started with our FREE Cyber Security Toolkit. We have compiled a series of free downloads and links that include educational tools such as: Security awareness posters. Hang these in the lunch room and rotate them throughout the year, keep security on peoples mind every day. Educational videos. Many users don’t really understand the role that they play in keeping your network safe, or NOT SO SAFE. Whitepapers, handouts and info graphics. More tools to use at company meetings and training sessions. Links for free software and tools to keep your users home computers and mobile devices safe. General tips and guidelines for safe computing best practices. Interested in a free Cyber Security Review? If you have questions about network security, or you are facing a compliance review or audit, contact us today at 603-889-0800 for a free confidential conversation about how White Mountain can help.