Recent Blog Posts
In the case of the password, it?s often beneficial to know what not to do in addition to what you should do. What Makes for a Bad Password? Bad passwords are a little bit of a misnomer these days, especially as passwords are simply not the ideal way to protect important information anymore; rather, they should be a part of a multi-factor authentication solution. But alas, that?s not why we are here today. Passwords are still popular methods of protecting accounts, so we have to go over what makes them effective or ineffective. Passwords are bad when they are not as secure as they need to be, which could be for a variety of reasons. Maybe they aren?t as complicated as they should be, or maybe they are simply repeated over too many accounts. Passwords can be a hindrance to account security, but they can also be boons when created properly. Let?s discuss how you can make strong, complex passwords. Creating Strong Passwords Be sure to keep the following practices in mind for creating strong passwords: Don?t Repeat Your PasswordsIt doesn?t matter how strong a password is when it?s your single line of defense for multiple different accounts. All it takes is one instance of a data breach to expose that password to hackers, leading to multiple accounts being vulnerable. You can increase your security substantially by simply using different complex passwords for each of your accounts. Make Them ComplexWhat do we mean by complex passwords? It?s simple; they should be easy enough to remember, but difficult to guess. You can use a passphrase, for instance, using random words that you?ve put together. Throw some numbers and symbols in there too for good measure. Never Include Personal DetailsYou shouldn?t include personal details in your passwords because depending on how much information you share publicly on social media, the information could be used against you. Remember, the password should be easy to remember, but difficult to guess, and if there is information about you known to the hacker, they can potentially guess the password. Use a Password ManagerThe average user has countless passwords that they use to secure their accounts, so keeping track of multiple, complex passwords is a tall order even for the most dedicated employee. A password manager can make it easier to keep track of them all, and for those who have trouble with recycling passwords, many of these managers have built-in password generators. A password manager works by securing multiple passwords in an encrypted vault protected by a master password, so instead of remembering multiple passwords, you just have to keep track of one. Need a Hand with Cybersecurity? White Mountain IT Services is happy to help you navigate the challenges associated with cybersecurity. To learn more about what we can do for your business, contact us today at (603) 889-0800.
Look, we?re just as sick of talking about hackers and such as you are sick of hearing about them?we?d much rather spend more time discussing how you could make your business better instead of warding off the leeches who are just trying to steal the spoils of your hard work. Unfortunately, here we are. Fortunately, there are a few things that you can do to help protect your small business, its data, and its infrastructure. Put More Effort Into Using Quality Passwords It?s pretty standard for computing systems to require a username and password login before access will be granted, giving you your first opportunity to tighten your defenses. Make sure that your team both understands how to create a secure password, and how important it is that they are diligent in doing so. Developing a unified password strategy will help to do this. The three elements of this process are as follows: Password creation – First, it is important that the passwords being used are secure. Best practices dictate that the best passwords and passphrases are those that are easily remembered, but wouldn?t necessarily be guessed. Your secret code can be further strengthened by sprinkling in different cases and alphanumeric switching. Password management – The average user?provided they are following best practices?will ultimately need to remember dozens of passwords. This practically impossible task becomes far easier to manage with a quality password management system?an encrypted vault that allows you to securely store your passwords behind a singular credential. Multi-factor authentication – Many modern accounts feature multi-factor authentication (also known as two-factor authentication) as an additional means of protecting verified access. With MFA enabled, anyone trying to log into one of your accounts will need to provide the correct username, password, and additional proof of identity, whether that?s a generated code or a biometric scan. The point is, improving how effective your identity authentication measures are, the more of a challenge for a cybercriminal to overcome. Maintain Your Software Secondly, you need to make sure that you are attending to any vulnerabilities that present themselves via the software your business utilizes, primarily because the software hasn?t been updated and patched appropriately. While zero-day threats may not have a patch released yet, this is just a fraction of the vulnerabilities that hackers regularly utilize. Whatever size it may be, a security-focused company will always prioritize patching and updating their software?and that?s inclusive of every piece of software a company uses, from productivity to security to communications. Naturally, this takes some time, which is why it is an integral part of the managed services provided by White Mountain IT Services as a part of our professional agreements. Not only is it important to do for your security, it also makes it far easier for us to do our jobs. Effectively, it?s a win-win. Patch and Update Software Another frequent form of infiltration into any network is accomplished through exploiting vulnerabilities in the business? infrastructure. This happens when the software that a business depends on is not patched and updated promptly. Sure, there are situations where no patch is available for a vulnerability (known as zero-day threats), but these are much less likely than cyberattackers using known vulnerabilities that haven?t been patched yet. There are dozens of steps that can be taken to prevent hackers from […]
Technology Is Always a Thing Before we get into the question at hand, we?d be remiss if we didn?t mention that modern society is basically an example of how innovation fuels progress. I mean the spoon and the wheel were examples of technological improvement. If you consider that the whole of modern computing happened in the past century (mostly the last half century), you?d have to consider that things like the advent of electricity, the manufacturing of the first microprocessor, and the invention of modern networking were all new technologies that have allowed our society to get to where we are today. Now to the Question at Hand So has technology made us happier? Whether it has or hasn?t, the Internet seems to have made people happier. One poll found that 90% of respondents admitted that their lives have improved due to the Internet?s existence. That probably isn?t a surprise, but it does say something about how society has changed. People rely on the Internet, especially in the mobile age. We interact with the people around us over mobile phones and video conferencing, many of us work via the Internet, and every part of our lives has some type of technology tied to it. People can now never leave their houses and live a relatively normal life (not that it is recommended at all). But does this ubiquitous technology make us happier? There?s no way to know, but we can break down the major parts of a person?s life to come up with what will do for an answer in this space. For our purposes, we?ll consider work, leisure, relationships, and other social interactions. Work Most of us use technology for our jobs. In fact, a lot of our jobs wouldn?t be here if it weren?t for the underlying technology. Many younger workers, who have entered the workforce over the past 10 years, seriously consider the merits of an organization?s commitment to technology as a factor when choosing whether or not to apply to a company. For older workers, there has been a learning curve but with the advancements in technology, hosted systems, and automation, most people can do more actual ?work? than ever before. This improves employee morale and leaves workers with more time to themselves, a consideration that has come to be known as ?work-life balance?. With all this considered we?d have to admit that technology has made today?s average worker happier than in the past. Leisure Technology has a marked effect on the way people spend their leisure time. Activities that were once universally popular like family outings at the park, going to the mall, and even going for a leisurely drive have all been pushed out of the social lexicon because the technology that surrounds us at all times has changed the way people view these activities. For example, before we had ubiquitous technology fueled by a seemingly unlimited number of applications, people would go for a drive. They would take a day when they didn?t have anything to do and they would drive. Technology doesn?t like aimless tasks. If every task has a purpose then an aimless trek in your car is taboo. This can be said for most things. There is a reason why every video game developer puts in worthless achievements into their […]
First, you have to choose whether you want to copy an existing worksheet into the same workbook or to a new Excel file. You can do both with relative ease! Copy Your Worksheet Within the Workbook To copy a worksheet, all you have to do is right-click the sheet tab of the target worksheet and use the menu which appears. Select Move or Copy?, and after you have done so, you should select Create a copy from the options available. Select OK, and that?s it! You now have your copy, which you can edit and rename as you see fit. Copy Your Worksheet to a Different Workbook Copying a worksheet to a different book is a bit more involved, but still manageable. First, you might notice that Excel has this function built right into its user interface, but you will need to have both the current workbook and the target workbook open. On your original worksheet?s window, right-click the sheet tab. Then, you select the Move or Copy? option using the To Book option to locate the new target. You?ll see a list of open workbooks to select from, so find the one you want and make sure Create a copy is selected. Once you?re ready, click OK. You can also drag one worksheet to another, if you have both workbooks open. To do so, under the View tab, select View Side by Side from the Window group. Doing this tells Excel to split the view in two, allowing for an easier time doing this. You can then click and drag the sheet tab you want to copy from one workbook to the other while holding down the Ctrl key. Without the Ctrl key, you?ll just move the sheet over. We hope this tip helps you cut down on some of the time you might waste moving data around unnecessarily. To learn more tips and tricks to make the most of your technology, be sure to call us at (603) 889-0800.
Let?s dive into Elastic Security Labs? claims and what they could mean for Mac users. Macs Do Get Malware?Just Not As Much Research from Elastic Security Labs shows that 54% of malware impacts Windows devices, whereas 6.2% of malware are found on macOS devices. On the other hand, 48% of macOS devices are infected by the same app?an app called MacKeeper. MacKeeper is a utility that provides tools to help maintain a computer?s privacy and security. In order to do so, the app needs to have considerable security and access permissions. The most dangerous thing here is that MacKeeper is a legitimate software, and it has fallen prey to malware that utilizes it against the user. For the sake of security, we recommend you remove it from your device. Follow the steps below to do so. Deleting MacKeeper from macOS Navigate to the Finder app Select Applications Locate MacKeeper Make sure you have This Mac selected and click the plus sign Open the dropdown by selecting Name Select Other Tick the checkbox next to System Files Click Name and select System Files Change aren?t included to are included Right-click and select Move to Trash for all files in the folder Right-click the Trash icon and select Empty Trash With this threat out of the way, you can breathe a little easier when using your macOS device. Although, you?ll still want to make sure you have some sort of security protection on your Mac. If you need assistance with your technology, be sure to contact us at (603) 889-0800.