Recent Blog Posts

Tip of the Week: How to Make Sure Your Meetings are Productive

Blue Jeans Network is a cloud-based video conferencing company. For this study, they crunched the numbers of more than five million video meetings that took place in 177 countries, of which more than a third had an in-person component. For Blue Jeans Network, this is an annual exercise, and when they compared their latest study to studies of previous years, some pretty interesting trends begin to emerge. The Majority of Meetings Take Place at the Most Unproductive TimeAt what time of the day are you most alert and at your very best? If you?re like most of us, it?s not during the middle of the afternoon–which is the world?s most popular time for meetings (somewhere around 3 p.m.). This time of the day happens to be after the coffee has worn off and people feel the most dull-brained. Solution: Schedule your meetings in the morning when alertness is at a peak so that everyone will be engaged. Late Meetings are the NormMeetings wouldn?t be so bad if everyone showed up on time. Yet, at almost every meeting, there seems to be that one late person who causes everyone else to sit around and twiddle their thumbs–and get paid for it! In fact, according to the study, 81 percent of meetings start late, up 30 percent from the previous year. When you multiply every person?s time wasted while waiting for Johnny-come-lately, you might conclude that the benefits of the meetings are offset by everyone?s downtime. Inc. describes how starting meetings late is a self-perpetuating problem: If you arrive five minutes late to a meeting and it hasn’t started yet, you’ll figure you haven’t missed anything, so you’ll likely do the same next time, or maybe show up even later. Meanwhile, the punctual people who’ve sat around waiting for you will figure they have better uses for their time, and next time they’ll come five minutes late as well, or maybe even later. Solution: Be strict about your meeting?s start time and have consequences for latecomers. Miserable Weather Means More MeetingsOne revealing trend from the study shows that, when the weather?s bad outside, you?re twice as likely to find yourself in a meeting inside. This shouldn?t be too surprising; after all, few people want to be indoors when the weather is gorgeous outside–much less sit in a meeting. However, what?s surprising is that, according to the study, more meetings take place when the weather is really bad. ?Meetings were up by as much as 26 percent during the recent Texas flooding, and an impressive 35 percent during the Boston blizzards last winter.? Solution: Apparently, if scheduling meetings are left up to feelings, more meetings than perhaps are necessary will take place when the weather is poor. Instead, make sure to have regularly-scheduled meetings and resist the urge to have extra meetings, simply because it?s cold outside. Workers spend so much time in meetings that it?s in your company?s best interest to manage how they?re run and how often they take place. Otherwise, you?ll end up having ?meeting for the sake of meetings,? and nobody wants that. By taking advantage of technologies like VoIP, video conferencing, and cloud-based collaboration tools, you can run your meetings as efficiently as possible. Schedule a meeting today with White Mountain IT Services to learn more.

Have You Considered Virtual Private Networks for Your Business?

What is a VPN?Your network is an infrastructure where your business?s data and applications can be accessed in an instant. It?s designed to offer access to aspects of the workplace that are necessary for operations to continue. A virtual private network allows users to remotely access the network across an Internet connection. As defined by Gartner?s IT Glossary: A virtual private network (VPN) is a system that delivers enterprise-focused communication services on a shared public network infrastructure and provides customized operating characteristics uniformly and universally across an enterprise?. Technology providers define a VPN as the use of encryption software or hardware to bring privacy to communications over a public or untrusted data network. As you might expect, this type of communications solution is designed to help users access information in a secure manner from potentially unsafe connections, like hotel WiFi or Internet connections found in public places like cafes, restaurants, airports, and more. What are the Benefits?As with most technology solutions, a VPN offers significant benefits that improve operations and increase your data security. Here are some of most important benefits that a VPN can offer for small and medium-sized businesses: Restrict access to information on a per-user basis: Not everyone in your network needs to have access to the same information. For instance, your accounting department is the only one who needs access to the pay rates and financial information for your organization, and human resources should be the only one with access to personally identifiable information of your employees. A VPN allows you to set up barriers for how you want your information to be accessed by employees. Allow secure network access for remote workers: As previously mentioned, public WiFi and hotel hotspots aren?t the best ways to connect to private or sensitive information. Viruses and malware are often commonplace on these connections, as they are easy ways to infiltrate unsuspecting users. Multi-device compatibility: VPNs can be accessed by users of all types of devices, from laptops to smartphones. This allows users to access information on your private network from multiple avenues, allowing them to access this information in a way which allows them the most productivity. A VPN can go a long way toward improving the way you tend to your day-to-day responsibilities. In fact, it even has the potential to change the way you work entirely. Give White Mountain IT Services a call at (603) 889-0800 for more information about how you can take advantage of VPN technology.

The Average Large Business Spends Nearly $15 Million on Cybersecurity

For reference, we don?t expect you to shell out this huge amount of dough for network security solutions. Still, the fact that large businesses feel this threatened by malicious online entities should be enough to convince the small business owner that hackers mean business. While a large business might have the funds to integrate powerful security solutions, the small business owner is often at the mercy of a limited IT budget that might not accommodate the up-front costs of integrating high-level security protocol. To make matters worse, hackers use all kinds of malware, viruses, and other threats to make their movements diverse and somewhat unpredictable. According to a recent study, ZDNet reports: Attacks involving malicious code, malware, viruses, worms, trojans, and botnets accounted for 40 percent of this cost, followed by 16 percent for denial of services, 14 percent for phishing and social engineering, 12 percent for Web-based attacks, 10 percent for malicious insiders and 7 percent for stolen devices. It?s clear that hackers are taking advantage of numerous avenues to infiltrate and infect the mission-critical systems of businesses. Therefore, the need for a comprehensive security solution cannot be stressed enough. Protecting the sensitive information of both your clients and your employees is an investment that you, as a business owner, cannot skimp on. The issue with this kind of protection is that businesses often cannot afford the up-front costs of such an investment. Thus, the best way to handle network security is by taking a proactive stance that prevents issues from turning into huge problems in the first place. This means keeping threats out of your system using tools that are designed to detect and eliminate issues before they become bigger problems. The security solutions you integrate should be compounded with the proper education of your staff, including giving them ample training to identify and respond to threats. A Unified Threat Management (UTM) solution is a quality answer to this conundrum. A UTM offers a firewall solution to analyze the data that flows in and out of your network, ensuring that no viruses or malware easily infiltrate it. It combines this with an enterprise-level antivirus solution that?s designed to detect and eliminate threats before they bring harm to your network. Additionally, the UTM comes with features designed to limit your employees? access to insecure content with a web content filtering solution and comprehensive spam protection for your email. For more information about security solutions designed to protect your business and its critical assets, give White Mountain IT Services a call at (603) 889-0800.

Mobiles Devices: A Love/Hate Relationship For Businesses

While there are plenty of risks involved with using mobile devices in the workplace, this shouldn?t dissuade you from trying to take advantage of a technology that can help your organization achieve greater productivity. Here are three ways your business can protect its data while still taking advantage of mobile devices in the workplace. Virtual Private NetworksEmployees often need to access sensitive information while on the move, and this can be a problem if there aren?t relatively secure WiFi connections available. Any normal motel connection could be compromised by a skilled hacker, so it?s a best practice to outfit mobile devices with access to a virtual private network that it can be connected to, even while out of the office. This mitigates the chances that a mobile device accidentally gives away any important information. Remote Device WipingIf you?re allowing employees to use their own mobile devices in the workplace, you have to consider the ramifications of losing these devices, or having them be stolen. Smartphones are fairly hot targets for thieves simply because of how compact they are, and because they often hold sensitive information and access to accounts like email. Hackers will go to great lengths to steal information from mobile devices, even so far as physically stealing your device if they can get their hands on it. If you have the power to remotely wipe your company?s mobile devices, you can get rid of any data on lost or stolen devices before hackers steal it. Whitelist and Blacklist ApplicationsIf your employees are using smartphones to get more work done outside the office, they?ll naturally be using certain applications that help them complete their workload. However, they might also download apps that aren?t used for work, like games, social media apps, and more. The issue therein is the possibility that malicious applications, or those that could hurt your business?s reputation, gain access to your sensitive data. Apps ask for permission to access this information, and if the user agrees to terms that are absolutely ridiculous (like a flashlight app asking for your physical location), chances are that there?s something fishy going on. You want the ability to limit which applications have permission to access important data. White Mountain IT Services can equip your business with a comprehensive mobile device management solution that allows you to get maximum productivity out of your mobile devices, without compromising the integrity of your data infrastructure. Give us a call at (603) 889-0800 to learn more.

4 Benefits to Cloud Computing That You Can?t Afford to Ignore

While it?s also important to consider your current IT infrastructure before making any drastic changes to your technology, you should also be aware of what cloud computing can help your business accomplish. Here are four ways that cloud computing can improve the way you do business. Growth ManagementA good cloud computing solution is capable of helping your business better manage its growth. The primary reason for this is that cloud solutions are generally scalable to meet the specific needs of a business, allowing for custom solutions that can be changed or updated with ease. Businesses might experience peak periods or go through hiring spurts, which means that their infrastructure is subject to change, making cloud computing an attractive choice. Increased ProductivityTaking advantage of cloud computing for your applications means that you can make them available to whoever needs access to them from a number of different devices. An example of this is hosting your productivity suite, like Microsoft Office or Google Drive, on a cloud server where they can be accessed by your team from any location. This helps them stay productive by improving access to mission-critical systems. Cost ReductionsIt?s a well-known fact that introducing brand new technology to your IT infrastructure can be a costly endeavor, and one that?s not kind to your budget if unplanned. One of the key benefits of cloud computing for small businesses is the decreased need for expensive hardware like servers and workstations. By hosting your IT infrastructure in the cloud, you can reduce the energy costs of operating this equipment, and consolidate your systems and make them easier to manage. Enhanced MobilityIn much the same way that cloud computing allows businesses to access their applications from remote locations, cloud computing helps organizations access data from various locations on a number of different devices. In other words, organizations don?t have to feel restricted by the office anymore. Employees can work anywhere, anytime, be it from the comfort of their own home or while abroad on a business trip. More than anything else, the cloud allows companies to be more flexible with their assets and finances. Your business can benefit from the cloud, too. Contact us at (603) 889-0800 today and ask our professional IT technicians how the cloud can improve the way you do business.