Recent Blog Posts

Lock Your Doors and 2 Other No-Brainer Tips to Protect Your Data

While it might seem like it?s all in good fun (depending on how well pranks go over in your office), a worker pranking you by messing with your workstation?s desktop or settings could have far-reaching repercussions. Furthermore, you need to ensure that you?re practicing this same level of caution with every aspect of your office?s physical and digital security. Here are three best practices you can take when it comes to keeping your technology from being compromised by physical users. Log Off of Your PC Before Leaving ItYou might know that you should always log out of your accounts when you?re not using your PC, you should also lock or log off of your PC before stepping away from it. If you don?t, you run the risk of your co-workers messing with it in ways that you can?t possibly imagine. Plus, if your office is one which strangers frequent, like customers and delivery workers, it?s especially important to lock or log off of your PC before leaving it. You need to be cautious of everyone, especially those who don?t work for you. Besides the fact that it?s a best practice for security reasons, logging out of your PC is good for it. It gives it a chance to rest up for the next time you use it. Keep Mobile Devices Out of SightWhile it might not seem to be a big deal to leave your laptop or your smartphone on your desk, someone else might feel like taking advantage of your trusting nature. A mobile device that?s right out in the open is a welcome sight to most thieves. It only takes a moment for a co-worker to snatch your device to make a quick buck, so you need to take precautions by always putting away your devices when they?re not in use. A locked drawer or closet will suffice; or, if it?s actually yours and not the company?s, just take it home with you. Lock the Office Doors When You LeaveThis probably sounds like we?re stating the obvious, but it?s surprising how many organizations lock the front door, but don?t make sure that the windows, side-doors, and other entrances are secure from potential intruders. All access points need to be protected from a potential break-in. Being reliant on security measures like access codes, cards, and keys isn?t the best way to protect your assets, but it?s better than relying on remembering to lock the door. Still, you want to limit the number of employees who can unlock the office. For instance, a worker might lend their security code to a co-worker without a second thought. They might see nothing wrong with it, but what if that worker has some suspicious agenda? At that point, it?s a matter of holding employees accountable for their actions, so it?s best to be safe and just nip the risk in the bud before it?s too late. All three of these practices can be enhanced with an enterprise-level surveillance system. Having a surveillance system is a solid way to prevent threats from accessing your organization?s office, as well as helping you monitor what?s going on around the office. White Mountain IT Services can recommend the proper system and set it up for you so it doesn?t cripple your company?s network. What are some of your favorite ways […]

SHOCK: 66% of Fired Employees Able to Access Their Former Company’s Cloud Data

As reported by SailPoint, at least a quarter of your employees will take copies of corporate data with them when they leave your organization. This survey dealt specifically with cloud computing usage, and was issued to around 3,000 employees worldwide. As explained by SailPoint president Kevin Cunningham, ?The survey results are an eye-opener of how cloud applications have made it easy for employees to take information with them when they leave a company.? If you think about it, this number isn?t so surprising. With the popularity of Bring Your Own Device (BYOD) policies increasing over time, employees are able to make off with copies of your business?s precious files, even unintentionally, much easier than before. In fact, one out of every five employees has the intention of uploading corporate data to the cloud via Google Docs, Dropbox, or another service, and share this information with those outside the organization. It can feel disheartening that your trusted team would consider doing this, but it?s important to realize that not all employees will do so. The staff you really need to watch out for are the ones who storm out of your office in a fit of rage. Here are some more statistics from the survey: 66 percent of employees said they were able to access a business’ cloud storage applications after they left their last job. 60 percent said they were aware that their employer strictly forbids taking intellectual property when they leave the company. Only 28 percent said their employer’s corporate policies describe who can access mission-critical software-as-a-service (SaaS) apps. How does your IT department plan on handling this issue? Employees potentially stealing sensitive data isn?t something that should be ignored. You need to enact policies that restrict access and user permissions in order to minimize the chance that a rogue employee will contribute to corporate sabotage. It?s vital that you take initiative to restrict your network from terminated employees as soon, or possibly even before, they find out they won?t be working for you anymore. If you?re concerned about rogue employees leaving with your hard-earned data, or if you want to bolster your network security practices in general, give White Mountain IT Services a call at (603) 889-0800.

The Best Way to Prevent Hackers from Finding Holes in Your Security

When you?ve gone quite a while without a hacking incident, it?s easy to feel that the waters of the Internet are pristine and free of corruption; however, this isn?t necessarily the case. Deep down, in the murky depths of the Internet, there?s questionable activity at every turn, and some hackers might even have their sights set on your organization. You might think that your company is small-time compared to the large businesses that have been hacked in recent times, but in all actuality, your organization holds a wealth of information that hackers want to take advantage of. For example, you probably have the credit card numbers of your clients stored away somewhere on your infrastructure for when they make purchases. Your human resources department holds the Social Security numbers of all your employees in their files. Despite the fact that you?re a small business, hackers will see this as more than enough of a reason to hack you. Of course, they might just be taking a chance and hoping to find something good; but either way, you should be prepared to fend them off. Hackers will often try to attack your organization through cracks in your defenses. If you use older hardware or software that?s prone to experiencing breaches of security, you will be in for a rude awakening when a hacker breaches your network. You always want your organization?s systems to be in tip-top shape, be it through purchasing reliable new hardware or applying updates to your infrastructure. The best way to ensure that your organization is secure from hackers is to keep track of these weaknesses and resolve them as quickly as possible. The problem with this is that it?s difficult to keep track of multiple systems, especially if you?re not an IT expert by trade. This is why small and medium-sized organizations often outsource this responsibility to White Mountain IT Services to make sure that it?s performed properly. One way to make sure that you?ve got all of your bases covered is with a comprehensive network consultation. By indiscriminately analyzing every part of your technology infrastructure, you can find out a lot about your current security situation. Or, better yet, have an external party perform the consultation. By doing so, you get an unbiased assessment that?s sure to give you hints on how you can prepare your network for the worst. All you have to do to take advantage of this offering is call White Mountain IT Services. We offer a network consultation that?s designed to identify weak points in your security, as well as components that might be on their way toward a hardware failure. Give us a call at (603) 889-0800 to learn more.

Tip of the Week: The Easiest Way to Share Files Between 2 PCs

Before we show you how to do this, let?s backtrack a bit and go over some of the most common ways that files are shared between two PCs. Via external memory device, like a USB thumb drive. Via email. Via a cloud data storage service. All three of these options are easy to use, yet, they each have their drawbacks. For example, thumb drives are prone to getting lost or stolen, and both email and the cloud are dependant upon a working Internet connection controlled by a third party. One solution that has neither of these drawbacks is a home network. Setting up a network for two or more of your computers is easy to do and doesn?t require a server unit, switches, and all the other IT gear like what your network at the office needs. Instead, if your personal computers are both connected to the same Internet router, then you?ve got what it takes to share a file between the two machines by simply dragging and dropping. Use My Network PlacesMy Network Places is essentially a file on your PC shared between your two computers. You will be able to spot which PC is connected with the shared file because it will be designated by the PC?s assigned name. Once you spot the folder (use the Windows search bar to find it), drag and drop the file you want to share into it. You will then be able to access this shared content in My Network Places on your other computer. Create a Windows HomegroupAnother option for your home-file-sharing needs is to setup a Windows Homegroup. This is actually a better option than using My Network Places because it provides greater security. To set this up, type ?homegroup? in the Windows search box and hit Enter. If Windows can?t find any existing homegroups on your network to choose from, click Create a homegroup. Now select what kind of content and devices you want to share in this homegroup and click Next. Windows will now generate the homegroup and provide you with a password to access it. Be sure to record this password in a place that?s safe. To access your newly set up homegroup on your other computer, search for ?homegroup? in the Windows search bar to bring it up. You will next be notified that a new homegroup has been set up. Now, click Next > Enter the password > click Next again > and your two devices will be able to easily and securely share files. You can even add multiple devices and users to this homegroup if you need to. Sharing files over your home network is easy, but it gets more complicated when you?re dealing with multiple workstations on your office network. For assistance with your company?s networking needs, give White Mountain IT Services a call at (603) 889-0800.

Agent Chrome Goes Incognito in Google City

The mission itself? It might require any number of things; it could require hijacking his own computer and accessing his secret account at the same time as his personal one, or maybe he needs to infiltrate an enemy base and retrieve something without them knowing (or his fianc??s surprise birthday present). He could even let other people use his accounts without them viewing history from his own account. But, as always, there is one objective that looms overhead, and drives the mission – to remain undetected. That?s what Operation Incognito is all about; Agent Chrome must dive deep into the underworld of Google City and remain undetected the entire time. But for Agent Chrome, it should be a piece of cake, for he has White Mountain IT Services on his side to make this feat easier done than said. With all of Agent Chrome?s unique gadgets and White Mountain IT Services?s technical prowess, his mission will be a success. Chrome starts Operation Incognito by navigating his way through the treacherous task bar, laden will several apps and traps to slow him down, like laser surveillance systems (pop-up blockers), enemy lackeys (Google Hangouts), and other distractions. His mission: to purchase an anniversary gift, without being detected by his significant other. Finally, he makes his way toward the control mechanism of Google City itself: the Customize and control Google Chrome apparatus. Upon further investigation, he notices that the apparatus gives him the option to go undercover with the aptly named New Incognito Window selection. Without reading the description (or rather, warning) that pops up on the screen, he feels he has little to fear, and jumps right into the action once more, searching for an anniversary gift. However, he fails to notice the cameras in the corner of the room following his every move. A huge explosion occurs and fifty men, armed to the teeth, ambush Agent Chrome. He wonders how it could be that he was discovered so easily, but the warning message comes back to bite him. Just because he?s incognito doesn?t mean that people can?t see him. He should have been more careful planning out his entry and his escape, because now he?s in a hairy mess that probably won?t be resolved without more chaos (and explosions). However, he can?t forget the reason why he came here in the first place. But he has no time! He has secret agents coming at him left and right, each clad in black turtlenecks that he feels would look oh-so-lovely on himself. He tries to fend them off, all while trying to communicate with White Mountain IT Services to tell us that he needs reinforcements. Before long, a pile of unconscious men surround Chrome, and they have called in the big guns – literally, very big guns, and he is forced to flee. The system of the building has initiated a code-red, and has recognized him as a threat. Explosions and sirens ring through the building, and the security system is trying to lock him in and shut down, preventing his escape. In order to prevent this he should have accessed the Google City files themselves in his own system and made Incognito his default form of browsing. He decides it?s not too late to give it a try. He cuts to the right (Right-click) in the main hub (Desktop) and […]