3 Vital Technologies for Remote Workers

Here are three of the top technologies necessary in order to ensure your mobile workforce stays as productive as possible, even while working remotely. Voice over Internet ProtocolIf your remote employees have no way to communicate with your in-house staff, things will get ugly fast. Email is too unreliable to be your business?s primary method of communication with remote staff, so what?s the small business to do? Voice over Internet Protocol, or VoIP, is a growing trend in the business environment, and for good reason. Organizations can dodge the long-distance charges and other overpriced telephone provider rates, that are often lump many services into a single package. With a VoIP solution from White Mountain IT Services, you pay for exactly what you want. You can have a powerful, scalable telephony solution that?s designed to be an operating expense rather than a capital investment. You pay for the services you want, and our rates are 100 percent transparent. Cloud ComputingCloud computing might still be an emerging technology, but it?s grown to be an imperative feature of the modern business?s data infrastructure. Organizations need access to their data anytime and anywhere, especially if they want to keep the productivity up while working remotely. Remote workers can access important information from the comfort of their home office (or wherever they work). White Mountain IT Services can assist your business with the integration and management of a cloud computing platform. Just like VoIP, our cloud solution is completely scalable to meet the specific needs of your organization. Remote Access SoftwareWith communication from VoIP and information/application access handled by cloud computing, what?s left to tackle for the remote employee? If they have an in-house PC, they might need to access certain applications in order to fulfill their work requirements. If this is the case, remote employees need remote access software to access information stored locally on their work PCs. Once again, White Mountain IT Services has your remote access needs covered. We can equip your business with the tools required to access information easily and efficiently, even while out of the office. For more information about how White Mountain IT Services?s remote technology solutions can improve your business?s operations, give us a call at (603) 889-0800.

Tip of the Week: Windows 10?s Default Settings May Invade Your Privacy, Here?s How to Change It

As most of you are probably aware, government agencies clearly don?t need the help of Microsoft?s products to collect information. In fact, many users of Google solutions like Gmail and Google Drive have surely already been exposed to data collection. Despite this, many privacy advocates have some major concerns, many of which are completely founded. Here are three of the default settings of Windows 10 that arguably violate user privacy. Advertising IDOne pet peeve of some Windows 10 users is the advertising ID function. Each user is automatically assigned an ID which is tied to the user?s email address. Windows 10 collects data about the user and uses this information to customize advertisements that might show themselves while browsing the Internet. CortanaDue to the nature of Cortana, it needs access to various essential data in orderto deliver the services it?s meant for. Still, it collects far more than what she needs to. In order to replicate the experience of having a personal assistant, Microsoft has Cortana collect as much as it can in order to provide the best user experience. This presents privacy issues for some, but they?re likely no more intrusive than Cortana?s competitors: Siri and Google Now. Windows Modern AppsAt the heart of this privacy conflict is the use of Windows Modern and Universal Apps. Each of these apps is capable of collecting your location, just like the Windows 8.1 versions did. Ultimately, though, it?s the way that these apps report this information to Microsoft?s servers that?s causing so much trouble for users. For example, when using the very useful OneNote app, the content of the notes are synced with the Microsoft servers. While many users are more than willing to sacrifice some of their privacy in return for better services, others aren?t so liberal when it comes to their computing information. The fact that Windows 10?s default privacy policy deliberately collects and shares information with Microsoft?s partners seems almost criminal to privacy advocates. Still, there are ways you can mitigate the amount of information that you share with Microsoft, but at the cost of some of Windows 10?s more dynamic features. First, you need to access the privacy menu, which can be found in the start menu. Simply open the start menu, then click on Settings and select Privacy from the pop-up. If there?s one thing to be said about Windows 10, it?s that there are a ton of options. All of the above settings offer increased performance capabilities, at the expense of the user?s privacy. The first suggestion we have, if you feel as if Microsoft doesn?t need to know every movement you make on your home PC, is to disable the targeted advertising ID. Next, you can turn off SmartScreen Filter to keep Windows Store from syphoning links to Store items. Some users will want to leave this feature on, but turn off the others. For instance, ?Send Microsoft info about how I write,? is a fancy way of saying ?keylogger.? Despite its uses being directly linked to Cortana?s functionality, it?s still somewhat intimidating. Click on Location and you?ll be taken to a list of applications that collect information about your location. Services like weather, traffic, news, and Cortana all collect this data and use it to provide relevant information to the user. This only […]

Lightning Fries 0.000001% of Google?s Data

Yes, that?s right. The mighty Thor, Norse mythology?s god of thunder and lightning, rained down his mighty judgement upon one of Google?s Belgium-based data centers. Whether or not he was tricked by his brother Loki, the Norse god of mischief, into frying the data center is yet to be determined. It?s safe to say that the data center, which was used primarily to host Google?s Cloud Platform, sustained heavy damage; precisely what you might expect from four consecutive lightning strikes. Despite Thor mistaking Google?s data center to be the mighty jaws of J?rmungandr, the infernal serpent of Midgard, about 5% of the disks in the center could no longer read or write data. This translates to roughly a 0.000001% loss of the center?s data, on which Google reported that ?in these cases, full recovery is not possible.? While it might seem like such a small perchange, much less than even 0.5%, is a negligible amount of data and hardly worth mentioning, the odds are is that it isn’t your data that was lost. Depending on how much information you have stored up from your time as a business, losing even a fraction of your data can be a complete and total detriment. When you lose files, especially important ones, it could have far-reaching effects on your operations infrastructure. So, naturally, it?s imperative that your organization has some type of backup and disaster recovery plan put into place. Of course, a technology juggernaut like Google (as you might expect) did, in fact, have measures put in place to protect against freak accidents like a singular lightning strike. However, it?s unlikely that any data loss measure can protect from the immense amount of natural energy produced by four lightning strikes. So, the lesson we all can learn from this situation is that your business always needs to be prepared for disasters that can?t be predicted. Despite the completely absurd chance that this situation were to happen again, Google assures users that they?re taking steps to make sure that such a catastrophic loss of data is avoided in the future. Of course, if there?s one thing that?s for certain, it?s that mankind only has finite ways to combat the awesome power of nature. A backup and disaster solution from White Mountain IT Services can help your organization avoid unnecessary data loss in the event that natural forces, like floods, hurricanes, and even lightning strikes. Give us a call at (603) 889-0800 for more information.

CryptoLocker is the Worst Video Game Ever

For those of you who don?t know, CryptoLocker has been a major threat to all computer users, and will likely continue to be a major player in the hacking world for quite some time. In fact, ransomware in general has seen an incredible increase in the past few years, making it easier than ever to become a target. This, compounded by the anonymity offered by various emerging online technologies like cryptocurrency and a network called Tor, makes it exceptionally difficult to locate and capture these criminals. While this type of malware is incredibly dangerous to business owners who absolutely need access to their mission-critical data and applications, hackers are finding gamers to be a particularly lucrative ?market.? A new strain of CryptoLocker attacks gamers almost exclusively, according to Bromium Labs, essentially making them pay money for games that they?ve already previously purchased. The malware is distributed through an unidentified WordPress-based site, but the URL that distributes the malicious flash file is always changing, making it difficult to locate. Upon visiting the malicious website, the user downloads the malware unexpectedly. In fact, according to ZDNet, the majority of files targeted by this particular strain of CryptoLocker consists of games. So, if you know any gamers out there that indulge in games like Minecraft, World of Warcraft, League of Legends, or just about any other title distributed through the Steam PC-gaming platform, you should probably warn them about this danger. The researchers claim that this malware can also detect company-specific malware, like those from EA Sports, Valve, Bethesda, and more. The point of this article is to show that malware can and will evolve to survive in any way it must. This means that it will likely continue to adapt to changes in the technology industry, all to make everyone?s lives miserable. Don?t let this happen to your organization. Give White Mountain IT Services a call today at (603) 889-0800 to protect your business?s infrastructure from CryptoLocker and all forms of malware.

Tip of the Week: 4 Immediate Actions to Take After Your Mobile Device Has Been Stolen

Unfortunately, bouncing back from a stolen device isn?t as easy as just buying a new one. It?s the data stored on the device that makes it so valuable, which is why a recent survey by IDG Research shows that 50 percent of phone-theft victims would pay $500 to get their phones back, and one-third would pony up a cool one grand. If that?s not enough of an incentive for thieves to step up their game, consider how much you would pay to get back a stolen device with sensitive corporate data on it, especially if the thief was savvy enough to take full advantage of the information on the device. And here?s the million dollar question (potentially), ?What do you do next if you discover that a mobile device containing corporate data has been lost or stolen?? While there?s a nice selection of security apps and preventive solutions that will help you remotely wipe your phone and even track its location, let?s assume that you?ve lacked the foresight to install these helpful apps and the only thing keeping a thief from having their way with your data is a puny lockscreen. What then? After you?ve panicked and ran around the office like a crazy person, stop, take a deep breath, and go into damage control mode by following these four steps: Contact Your Device?s Service ProviderYour service provider has the ability to cut off service to the phone so that it can?t be used under your name. Depending on the make, model, and service plan, they might be able to remotely ?brick? your phone, which is like a kill switch that will remotely render the device useless. Without such a kill switch, a thief will be able to swap out your SIM card so they can still use the phone, and they?ll still have access to any data actually stored on the phone?s memory. Change Your PasswordsIf a thief accesses your phone?s data, they?ll be able to view every online account connected to the device, which could potentially be dozens and dozens of accounts. Once you learn that your device has been stolen, you?re in a race with the thief to change your passwords before they can figure them out. And be sure to change the passwords to something complex so they won?t discover your passwords simply by rummaging through your phone. Report the Incident to the AuthoritiesReporting the incident to local law enforcement officials will give them a record they can use to spot trends and potentially catch the criminal. Additionally, it will give them a chance to return the phone to you, should it ever be recovered. Contact Everybody AffectedNow comes the tough part: admitting to your staff and your clients that a device has been compromised and has put their identity at risk. In some cases, you may be legally obligated to report this incident to them, which means it?s not something that you should try to cover up in an effort to save face. In fact, if you did try to cover this up and didn?t tell clients that their identities may be at risk because of the negligence of your company, then it will come back to bite you when this information comes to light. At the end of the day, most people will appreciate […]