Tip of the Week: Easily Manage Virtual Desktops in Windows 11

Setting Up Virtual Desktops in Windows 11 It?s really easy to set up different virtual desktops with different work experiences in the new Windows OS. You can set it up right from the taskbar. First, you need to make sure your Task View Icon is on. To turn it on, right-click on your taskbar and it will bring up the Taskbar Settings option. Click on that and toggle on the switch to the right of ?Task View?. This should give you the Task View icon on your taskbar.  Now you need to hover your cursor over the Task View icon on your taskbar. From here you will see a preview of all the current virtual desktops you have in use. To open a new virtual desktop simply click on the ?+? sign in the New Desktop tile. You can also use the keyboard shortcut Windows + CTRL + D to open a new desktop.  That?s it. You now have a whole other desktop interface to open files and applications. You can rename, close, and move the desktop priority by right-clicking on the desktop tile as you hover over an individual desktop tile.  In Windows 11, you can now rename and change the background of your virtual desktops as well. This will allow you to easily differentiate which desktop is which.  Using the virtual desktop option in Windows 11 can be very rewarding for users who want to efficiently navigate their desktop experience. For more great tips and tricks, stop back to our blog regularly. 

A Cool New Security Technology May Make the Password a Thing of the Past

The Password Might Be Over?? A potential replacement for the password is on the rise, and many individuals in the technology sector believe that it could bring about a whole new way of approaching cybersecurity: the passkey. Passkeys are stored credentials, like passwords, but instead of being stored in your brain or in a password manager, it is stored on a device, being retrieved automatically when the user needs to log into a system. Most security attacks are launched at users to obtain their passwords, but if the users don?t know their passwords, they can?t give them to hackers. This technology works by using Bluetooth technology, with the key being generated over the connection to a user?s smartphone. The phone then signs the user into the system, cutting out any need for a user-generated authentication measure. For passkeys to be seen as a viable alternative to current methods of authentication, they must be supported across multiple different platforms and systems. This means that they would have to become the new standard for every website, browser, password manager, and so on, which is a daunting task, to say the least. Users would also need their devices on them at all times to use their accounts, making the passkey somewhat inconvenient for access. Some Major Technology Companies Are Considering Passkeys Even big names like Google, Apple, and Microsoft are interested in the passkey as a concept. In fact, Google has already launched a beta passkey platform to use with their Chrome browser and Android Mobile OS. The beta is available through Google Play Services, and the plan is to eventually use Google?s Password Manager to provide the necessary passkeys, using biometrics to provide access and authentication. With the security landscape changing so radically all too often, you can never count yourself too secure to fall victim to a cybersecurity attack. To get your business? network audited and protected, reach out to White Mountain IT Services at (603) 889-0800.

Keyboards Get Pretty Gross, Here?s the Safest Way to Clean It

Of course, there are different types of keyboards that we regularly deal with, so we?ll cover both. How to Clean a Laptop Keyboard 1. Turn Off the Laptop: While it?in theory?would be perfectly possible to clean your keyboard with your laptop on, why risk potentially altering or losing some important data in the process? Better to turn off the device and eliminate the possibility. 2. Give It a Good Shake: Carefully but firmly holding your laptop, shake it out over the trash to dislodge any debris. If you can, lightly tap the device to help coax out any stubborn bits. 3. Use Canned Air: For the debris that still won?t budge, it?s time to bring out the big guns. Use a can of compressed air to continue cleaning your keyboard, holding it at a 75 degree angle. 4. Wipe Off What?s Left: Finally, with a microfiber cloth and cotton balls lightly dampened with rubbing alcohol, wipe down the keyboard to clean the top of the keys. Make sure you allow the keyboard to dry completely before powering the laptop back up. How to Clean a Standard Keyboard 1. If the Keyboard is Wired, Unplug It: Similarly to the laptop, you don?t want your keyboard to be receiving power as you?re cleaning it. If it?s a wired keyboard, detach it, and if it?s wireless, power it down. 2. Take Off the Keycaps: Did you know that the tops of the keys (the keycaps) can be removed from a mechanical keyboard? Doing so makes it easier to give your keyboard a really deep clean. If you have access to a keycap puller, use it to remove the caps. Don?t attempt this on a laptop, however. Hint: Take a picture of the keyboard layout before you begin to make it easier to put them back once you?re done. 3. Use Canned Air: Again, use a can of compressed air to clean the keyboard of any debris clinging to the switches. 4. Take a Toothbrush to the Tough Stuff: If there?s more stubborn grime clinging to the keyboard and switches, use a soft-bristled toothbrush to carefully remove it. 5. Wipe Off What?s Left: Again, lightly dampening a microfiber cloth, wipe off any remaining grime. 6. Optionally, Soak Keycaps, and Reassemble: If you want to get rid of every bit of oil and grime possible, soak your keycaps in soapy water and?once they have completely dried?put the keyboard back together. Maintaining Your Technology is More than Just Cosmetic Of course, while keeping your hardware clean is important, keeping your IT maintained will require a bit more. We can help with that! Give us a call at (603) 889-0800 to learn more about what we can do.

File Digitization Brings a New Element to Your File Management

The long and short of digitization is that most businesses have attempted to do this over time rather than all at once, something which has created a lot of unknowns and unanswered questions. In fact, many of these companies started this process before the cloud, when it was expected to require floppy disks, CDs, and flash memory. Defining Document Digitization The big strategy involved with document digitization is to eliminate the need for printing, paper, and physical storage, to instead rely on cloud storage and access for all of your document needs. You can store your files in a digital space while also sending and backing up all files in the cloud. This is far easier than attempting to store and back up physical documents. For certain practices and organizations that rely on their documentation, like legal and medical fields, a secure digital place to store files is absolutely crucial. It helps with the retrieval of personal data, and it helps them provide better services and care to their customers?particularly in high-stress scenarios. How Does It Work? First, you?ll need to know that digitization is different from the development of digital documents. Digitization is the act of taking your current physical documents on file and converting them into digital media. These documents aren?t necessarily scanned in; rather, they are adapted to a digital form, allowing them to be searched and indexed within your management system. This is important because it allows you to reap considerable benefits from being able to find documents when you need them most. You?ll need to determine how each of your documents will be classified, but it makes the digitization process easier. Your system will also require standardization in a well-considered order. All of this makes sure that the process for indexing will be as seamless as possible. You?ll have a redundant, reliable, and secure database to house your documents. White Mountain IT Services can help equip your business with such a tool. To learn more about what we can do for your business, call us today at (603) 889-0800.

What Can We Learn from T-Mobile?s Latest Data Breach?

Unfortunately, there?s not much good news to accompany the bad. What Happened with This Breach? The hackers responsible utilized a common tactic and targeted an Application Programming Interface, or API. An API is a code that allows an application to securely connect to the Internet and communicate with other apps, and is what allows various things?like smart appliances and payment applications?to function properly. While APIs are generally made to be secure, they are not infallible?something that T-Mobile has found out the hard way. As a result, quite a bit of sensitive information was made available?not financial information, fortunately, but still, a lot of data was breached. T-Mobile apparently discovered the hack on January 5th, but only after the breach had been active for over a month, the API first letting those responsible in on November 25, 2022. While the hack was apparently resolved on January 19th, or as the company reported, ?the malicious activity appears to be fully contained at this time,? its investigations have continued. What Can (and Should) Businesses Learn from T-Mobile?s History? Unfortunately for the telecom, T-Mobile has had a pretty consistent track record of suffering from breaches and hacks. This particular breach was preceded by an even larger one in August 2021, which itself followed attacks in 2020, 2019, 2018, and 2015, with millions of dollars paid out in settlements. Do you see the important takeaway here? While API attacks are tricky to catch, it is important that your business does all it can to catch as many attacks as possible. On top of that, you need to do everything you can to protect yourself and your data from any kind of harm. Fortunately, White Mountain IT Services is here to help. Give us a call at (603) 889-0800 to learn more.