Getting to the Root Cause of an IT Issue Means Seeing the Big Picture

The benefit of being able to quickly diagnose IT problems is obvious; the problem will get addressed and resolved in a timely manner, and a solution to the issue can be found that will help prevent any future IT outages. In the world of IT support, getting to the bottom of an issue is known as performing a root cause analysis (RCA). Such an analysis begins by asking basic troubleshooting questions, which usually begins by looking directly at the performance of the technology in use. Although, as IT networks expand to become more complex and businesses grow to have more managers making IT-related decisions, a company?s RCA approach will naturally become that much more complicated. Consider what it takes to perform an RCA for a small enterprise having one server and a few workstations, compared to a medium-sized enterprise taking advantage of advanced technologies like virtualization and cloud computing in addition to a robust in-house IT network. In the latter example, getting to the root of a problem involves looking at more systems and questioning more parties. Therefore, getting an accurate RCA from more complex IT systems requires a higher degree of expertise from the IT technician overseeing the troubleshooting process. This is also where a case can be made about why it?s important to involve IT in matters where executives are making IT-related decisions. This is due to the fact that root causes of an IT outage often go beyond equipment malfunctioning and extend to poor policies being put in place by management. If the root cause of an IT outage is a poor policy, then any good IT technician will be able to spot this and inform management accordingly. For example, let?s take a look at a hardware replacement policy. Any good IT technician understands that hardware doesn?t last forever. It must be replaced periodically to prevent catastrophic failures that can lead to data loss. Before an inevitable hardware failure, most solutions–like servers, workstations, and networking components–will start to show signs of wear and tear. Unless these solutions are being monitored properly by an IT department, these signs could fly under the radar and eventually result in much more damage than if they were addressed properly. A good IT technician will be able to identify and resolve issues on your network before they become major problems. This type of proactive maintenance is something that is often neglected, especially amongst smaller organizations that have limited budgets and no internal IT department. In cases like this, it?s beneficial to outsource this responsibility to a trusted managed service provider like White Mountain IT Services. We can monitor your network to ensure that any issues are addressed before they cause major problems, like downtime, hardware failure, and data loss. To learn more about how managed IT can help your business succeed, reach out to us at (603) 889-0800.

How Much Does Stolen Data Go For? Less Than You Might Think

Where (and How) Data is SoldWhen your data is stolen, it will more than likely be put up for sale on the dark web. The dark web is only accessible via specialized identity-cloaking software. Many of the pages offering stolen data and illegal services look just like a ?normal? sales website would, complete with buyer ratings. These dark websites offer caches of stolen data that other criminals would find useful, and sing cryptocurrency like Bitcoin, anyone can buy stolen identities or credentials. Let?s assume for a moment that you fell victim to a cybercriminal that managed to steal the information for a variety of corporate bank accounts and credit cards. A buyer can access the seller?s page and specify what information they are looking for, which will influence the price of the information. Buyers can request specific information such as: The kind of credit card, like Visa, MasterCard, etc. The card?s security codes Any associated login credentials The card?s expiration date The name that appears on the card The card holder?s credit score The Social Security Number associated with the card The card holder?s date of birth History of where the card has been used The original owner?s mother?s maiden name. Once the purchaser has selected which information they want, the cost is calculated and the data can be downloaded. The CostLike any business transaction, the price for stolen data is subject to the laws of economics. The less that the data is currently available, the higher the price will be. Alternatively, if a recent hack has flooded the black market with a massive supply of the desired data, then prices are apt to decrease significantly. Due to the rapid changes that this black market experiences, these prices vary wildly. On average, the data from a stolen credit card will cost someone somewhere between $13 to $21. These cards are typically bought will a comprehensive (or very nearly) set of the associated information, denoted as ?fullz? in dark web jargon. Pricing for other types of data is a little different. Many cybercriminals are mostly interested in online payment service accounts, which are priced based off of account balances. Bank account information can vary from $100 for a $2,000-account, to $1,000 for a $15,000-account, while electronic medical records can bring a cybercriminal $350 each. What This MeansThese days, it?s more important than ever to secure your company?s data against theft. Cybercriminals tend to reach for the low-hanging fruit when selecting a target. White Mountain IT Services can help you put the security measures in place to keep your data secure and off the dark web. Give us a call at (603) 889-0800.

Tip of the Week: How to Set Your Windows Apps to Automatically Open in Full Screen

The first thing you want to do is find any shortcut on your desktop. By shortcut, we are referring to any icon on your screen that opens up a program, such as Microsoft Word or your Internet browser. Once you?ve found the icon, go ahead and right-click it. Scroll down to the bottom of the dropdown that appears and click on Properties. This opens up the Properties window, which will be–by default–on the Shortcut tab. Next, look for the Run dropdown menu. It will be a few selections down from the top of the Shortcut tab. You?ll notice that it is set to Normal Window, but when you click the down arrow, you?ll be given the choice of Normal Window, Minimized, or Maximized. If you click on Maximized, any time you open this program in the future, it will be in full screen mode by default. Go ahead and click Apply, then close the window. If you want, go ahead and give it a shot to see it work like magic before your eyes. It might not seem like it will save you a lot of time, but it will certainly be convenient. It?s a classic example of how spending a few moments to optimize something can make things easier. For more ways to take full advantage of your business?s technology assets and optimize your workflow, subscribe to White Mountain IT Services?s blog.

Introducing Biocompatible Ferroelectret Nanogenerators: the Most Advanced T-Shirt You?ll Ever Wear

Developed by MSU Associate Professor of Electrical and Computer Engineering Nelson Sepulveda and his team, these devices can generate power as they are bent and folded. The devices are called biocompatible ferroelectret nanogenerators, or FENG for short. Power is generated by the device?s many layers as energy is introduced via other sources, such as the user?s motion. This could potentially lead to the ability to charge a device by simply moving around with FENG technology. Furthermore, there are potential security applications to this new tech. Since FENG material is so sensitive, it can be used as a microphone that would make it practically impossible to trick a voice-recognition system. On the other side of the coin, FENG can also be used as a speaker. It?s also very possible that FENG technology will help lead to the discoveries that allow us to use more efficient devices, for longer. This could potentially allow business to be done for longer in the day, without fear of losing precious charge. What do you think? Do you see FENG becoming the status quo anytime soon? Let us know in the comments!