Tip of the Week: 4 Ways to Not Annoy Everyone With Your Smartphone

Keep the Phone Off the Dinner TableWhen we sit down to eat, most people consider it a social experience. As such, it?s expected that you are mentally present and engaged in any conversations. This isn?t hard to do, but when you can?t take your eyes off your phone, it?s considered rude. Even checking your phone every now and then for notifications is frowned upon. Solution: Leave your phone be during dinner. Don?t put it on the table, as even its very presence is sure to make someone lose their appetite. Fun Facts: A restaurant in Iowa, Sneaky?s Chicken, offers a 10 percent discount for diners who don?t bring their treasured phone to their meal. Also, Bucato, in Los Angeles, has a dedicated ?cell-phone section.? Keep Your Voice Down if You?re in PublicIt?s perfectly acceptable to use your phone if you?re in a room with other people, but only if you keep your voice at a manageable level. You know there?s something wrong when other people around you can?t concentrate, or have to talk over you in order to continue a conversation. In this case, poor call connections are often the culprit and users will resort to talking louder so the person on the other end can hear their voice. Unfortunately, this usually draws the ire of the room, especially when the one on the phone doesn?t realize what they?re doing. This is why it?s always important to be aware of the volume of your voice, which is easier said than done half the time. Solution: Just step out of the room. It?s as simple as that. Don?t Use Your Phone at Cash RegistersYou can use your phone while you shop, but one of most cashiers? pet peeves is using your device while they are ringing you out. You might not be planning on having a lot to talk about with the cashier, but when you continue talking on the phone, even during checkout, it shows that the cashier isn?t worth your time. Naturally, people don?t like feeling this way, and it makes the cashier feel awkward for interrupting your ?important? phone business. Solution: You could just hang up the phone, but if it?s important, at least take the time to apologize to the cashier ringing you out, and focus as best you can on them. That way, they know they have what little attention you can afford them. Stop Leaving Long VoicemailsContrary to popular belief, voicemails are not meant to include every detail of the reason you?re calling. Voicemails should rarely, if ever, exceed one minute in length. Any longer, and voicemails can simply overwhelm people. People will often need to scramble to find a pen and paper, and if it?s an especially long message, they?ll have to listen to the whole message again to make sure they didn?t miss anything. Great. Solution: If you have a lot of information to share, just leave a message asking for the person to call you back. Just leave your name, callback number, and the reason you?re calling; you know, what every voicemail system asks for, and nothing more. Believe it or not, some people really don?t understand how to be considerate when using their phones. This is why it?s so important to share these tips and make the world more enjoyable for […]

Alert: Hackers Posing as IT Support and Hijacking Computers

First off, if you happen to find yourself a victim of a hack attack such as this, whatever you do, DON?T CALL THE PROVIDED PHONE NUMBER! The blog Delete Malware explains what will happen if you do: ?If you call [the number] they won’t actually remove adware from your computer. They will hijack your computer and steal all of your bank information and passwords.? Yikes. At this point, the origins of the malware can?t be pinned down, which makes it rather confounding because it?s been known to activate and display the blue screen of death while browsing popular websites like YouTube and Facebook. However, what the user sees isn?t the real Microsoft blue screen of death–which takes up the entire computer screen. Instead, this particular malware only affects the Internet browser, as indicated by the exposed browser tabs and URL form as seen in this screenshot. Thankfully, the threat isn?t as severe as the real blue screen of death. In most cases, you can move on from this annoyance via the Task Manager (Ctrl + Alt + Delete), or by rebooting your machine. Still, it?s inconvenient for anyone when this happens in mid project, and it can result in losing unsaved work or even downtime. Plus, it?s not like rebooting your machine will rid the virus from the system. Without proper removal, it will lie dormant and pop up again at another random time. Actually, the fake blue screen isn?t the biggest threat here. It?s all an elaborate ruse to play on one?s fears and get them to call the provided phone number. This is all to give the hackers an opening to take control of the PC, giving them the chance to do far worse damage than wasting the few minutes it takes to reboot. It?s a classic social engineering scam where users are tricked into forking over their sensitive information after overreacting to a perceived threat. You?ve likely seen social engineering before with spam emails designed to convince you that you?re guilty of something like missing a court date or getting a speeding ticket. Although, upon further review, its spam messages are usually fairly easy to determine, which makes them easy enough to ignore. What makes this particular scam different is that you can?t ignore it like spam messages, especially when it locks up your browser. Upon encountering malware such as this, you should immediately call the real IT professionals at (603) 889-0800. We?ve got the tools it takes to analyze your system to determine the nature of the threat and properly remove it. In a situation like this, one thing that the hackers are hoping for is that the victim won?t know enough about who oversees their company?s IT that they?ll believe the number to be real. This is a dang shame because it sullies the good name of IT workers the world over. To protect your system from hack attacks like this, you?ll want to have a proactive security measure in place, like the security monitoring service provided by White Mountain IT Services. For all of your organization?s IT needs, call the real IT professionals at (603) 889-0800.

Tip of the Week: Use Poetry to Protect Your Data

It?s clear that the average PC user won?t choose passwords that are as secure as they should be, primarily because users will prioritize ease-of-remembrance as one of the best qualities of a password. As explained in an essay from the University of Southern California, written by Marjan Ghazvininejad and Kevin Knight, it?s best to use randomly generated 60-bit strings (basically, a series of 60 ones and zeros), and convert these strings into words or phrases. This concept is based on a XKCD comic that depicts the pains of remembering complex passwords. The idea behind the comic is that you can take a string of numbers, like 10101101010100101101010101010, and convert segments of the string into English words. For example, the above string would read, ?correct horse battery staple,? which is ridiculous and doesn?t make any logical sense. However, if used as a password, users can create a mental image or a story to associate with the password, helping them remember it. Ghazvininejad and Knight suggest that, unlike the 44-bit string in the above example, users should opt for a 60-bit string, and give the password a poem-like structure. Doing so could make the password easier to remember. In other words, to put it in very simple terms, the idea is to make the password as easy to remember as possible for the user, while making it extraordinarily difficult for a computer to guess. By today?s standards, the 44-bit string would take around an hour to crack, while a 60-bit string would take well over a decade. That?s the kind of password security that your organization wants. If you don?t feel like getting overly technical with 60-bit code strings, it?s possible that you can use lines from existing poems to create a password. The creators of the passpoem, however, don?t suggest that you do so. There are millions of poems on the Internet, and the chances of this type of password getting hacked are much higher than if the string of characters were truly random. Still, using a line from your favorite poem is likely much more secure than a simple password like ?MOM385? or ?password,? so the idea shouldn?t be dismissed completely. You still need to be aware of the issues that come with this password strategy; for example, the risk of dictionary-type attacks could become a problem, even with using a long password. It?s up to you to know the complications and risks that come with your preferred password management policy. One of the biggest pain points about password management is that you need multiple/different passwords for all of your different accounts. When you have multiple complex passwords, it can be difficult to remember them all. This is what makes a password management system so effective. White Mountain IT Services can help your business get set up with the best password manager on the market. To learn more, give us a call at (603) 889-0800.

Gmail Now Notifies Users if an Email Comes From a Shady Source

Gmail will soon inform users of whether or not messages were sent to them over an unencrypted network, in the hopes of improving online security for all users (and providers) of webmail. It?s a way of increasing awareness, as well as emphasizing the necessity of encryption for sensitive online services. While Gmail already takes advantage of an HTTPS encryption protocol for its own mail service, this is only a small step toward increasing the security of online email services. The HTTPS only encrypts the browser?s connection with the server, rather than all of the traffic to and from senders and receivers. In other words, unless the email provider is taking full advantage of encryption while messages are in transit, external parties could potentially be snooping around looking for information that doesn?t concern them. Providers like Google, Comcast, Microsoft, Yahoo, and some others, are taking advantage of protocols that can limit outside intervention by using STARTTLS. As explained by ZDNet: A lot of providers don’t support STARTTLS, meaning that any email encrypted by the sender can’t be read when it’s received on the other end. This so-called opportunistic encryption works when both email providers support STARTTLS. If one doesn’t, then the other provider falls back to an unencrypted form. Therefore, the most important aspect of this new email encryption protocol is the fact that it will encourage email providers to offer the same security measures that big names like Google and Microsoft do. While this new encryption notification policy can improve the way you read and interpret emails, you don?t want to rely on this method to keep your business?s communications solution safe. What you want to integrate is a comprehensive security protocol that?s capable of defending your business?s infrastructure from a variety of both internal and external threats, like viruses, malware, and spyware. While a firewall and an antivirus solution can go a long way toward limiting your business?s exposure to threats, you want a more powerful solution that encompasses all aspects of network security. The perfect solution for a small or medium-sized business is the Unified Threat Management tool, which combines a firewall and antivirus solution with preventative measures like content filtering and spam blocking capabilities. Such a comprehensive solution is optimized for maximum protection from threats of all types. For more information, give us a call at (603) 889-0800.

Windows 10 On Pace to Surpass Windows 7 By 2017

Gartner predicts that Windows 10 will be used by half of all businesses come January 2017, which means that it will be one of the most widely used Windows versions so far. This is somewhat surprising, considering how its adoption rate thus far has been relatively tame. Businesses still like using their familiar Windows 7 operating system, and thus, feel little need to upgrade at the present moment. However, there are several noteworthy factors that will affect the adoption rate for Windows 10 over the next few years. For one, Windows 7 is slated for its end of support date in January 2020. This means that eventually, just like previous versions of Windows, like XP, Microsoft will cut the cord on its aging operating system. This means that users of Windows 7 will be forced to upgrade to something more recent, and considering the fact that Windows 8 and 8.1 are as unpopular as ever, Windows 10 is the natural choice for a replacement. According to ZDNet: Gartner said many organizations are planning to begin pilots for Windows 10 in the first half of 2016, and will broaden their deployments later in the year. It expects that at least half of organizations will have started some production deployments by the beginning of 2017, with an eye to completing their migrations in 2019. In other words, it will be quite some time before most businesses adopt Windows 10, but they?re still making plans to do so in the near future. In fact, up until very recently, the Windows 10 adoption rate was staggering, surpassing both Windows 7 and Windows 8. Granted, these figures fail to take into account the primary reason adoption has been so incredible: the free download. This free download is only for the first year that Windows 10 is available to consumers, but businesses want to make sure that they?re going to run into minimal resistance when upgrading to their new operating system. Just because everyone else is waiting to take advantage of the latest Windows operating system, doesn?t mean that you have to. You can get a leg up on the competition by upgrading to Windows 10 early, before your competitors decide to finally make the switch to Microsoft?s latest operating system. Doing so will give you access to great new features that will help you fully utilize your business?s technology solutions, as well as provide the peace of mind knowing that your tech is up to date and ready to go. It?s still recommended that you consult an IT professional before making this commitment, as legacy applications and other complications can arise that will need to be addressed by experts. White Mountain IT Services can answer your business?s questions about Windows 10, including how and when you should make the switch. To learn more, give us a call at (603) 889-0800.