This year, for the month of June, the total number of gamers using Windows 10 for Steam, in both 32-bit and 64-bit format, reached 44.6 percent. This presents an increase of 3.41 percent from the previous month, and a 1.54 percent increase from the month before that. It?s safe to say that Windows 10 is ?picking up steam,? so to speak, but it seems that the free* upgrade is likely playing into these gamers? decisions to make the upgrade to Microsoft?s latest operating system. And, well, why wouldn?t it? Gamers want to take advantage of this opportunity to improve their experience while they still can. *FREE WINDOWS UPGRADE EXPIRES THIS FRIDAY! Of course, not all Steam users utilize Windows 10. 36.97 percent of Steam users have Windows 7 installed on their PCs, which is down 2 percent from last month. Windows 8 and 8.1, however, make up about 12 percent of Steam users. Altogether, Windows users account for about 95.5 percent of gamers on Steam, while OS X retains about 3.6 percent, and Linux snags a paltry 0.8 percent. Whether you?re a gamer or not, there?s no denying that there?s at least one lesson to be learned from these statistics, and it?s that the latest operating system for your Windows computer is needed if you want to get the most out of it. Gamers are often known for their meticulous attention to PC performance and specifications, so it?s no surprise that we see such a huge increase in Windows 10 statistics concerning PC gamers. If anything, this should be a testament to how valuable the latest software solutions can be for your business?s workstations. Gamers take their hobby seriously, and they want only the best and brightest way to experience their entertainment. Why shouldn?t you try your hand at experiencing greater productivity and efficiency with Microsoft?s latest operating system? If you haven?t yet upgraded to Windows 10, the fact remains that it?s a great operating system that can keep your business running throughout the near and not-so-distant future. White Mountain IT Services?s technicians can help your organization implement it in the best way possible. It?s important that you assess your current needs and ensure that Windows 10 is compatible with your legacy applications and software solutions. In this scenario, it?s best to have the expertise of a professional to lean on. To get started, reach out to us at (603) 889-0800. And who knows? Maybe Windows 10 will help your business achieve its next high score.
Data leakage is a primary concern for any business using employee-owned mobile devices in the workplace. Every business has sensitive information that cannot be exposed under any circumstances, and it?s the business owner?s responsibility to make sure that policies are put into place to protect this data. A study by Bitglass reveals that 72 percent of many different types of organizations, including financial, technology, healthcare, government, and education, believe that BYOD should be supported for at least some of their employees. In terms of mobile device management, however, only a meager 14 percent of these organizations use some way of protecting corporate data with device encryption. This is a significant disparity, and one that should be considered when your organization implements a BYOD strategy. You can?t allow your business to be the next to fall victim to mobile security threats. With a mobile device management solution from White Mountain IT Services, your business can have full control over the devices that your employees want to use for their work roles, as well as the flow of data that?s stored on them. Below are some of the many features available for a mobile device management solution: Whitelisting and blacklisting apps: Some applications will request access to information stored on a mobile device, but some won?t have any real reason to have access it. For example, a flashlight app has no business accessing your phone?s contacts or geographical location. By whitelisting and blacklisting apps, you can minimize your data?s exposure to threats. Role-based user access: One of the easiest ways to minimize danger to your organization?s data is to limit who has access to it. By integrating role-based user access, you can allow your team to access data that they need to do their jobs properly, and keep them accessing that which they don?t. Remote wiping: Sometimes the best way to prevent a data breach is by remotely wiping data from a lost or stolen device. You shouldn?t rely on the device showing up, especially if it were left in a public place like a bus or subway station. You should always be prepared for a worst-case scenario like this. For more information about BYOD and our mobile device management solution, reach out to White Mountain IT Services at (603) 889-0800.
Imagine this scenario; you have your entire IT infrastructure hosted in the cloud, including your mission-critical applications and data. This information is required in order for operations to continue. Now, imagine that your local Internet service provider has suffered a catastrophic outage for your region due to some unforeseeable circumstance. Now, your office is left high and dry with no Internet access. This presents a problem with no clear resolution, especially if most of your infrastructure is only accessible via the cloud. Unless you also have a backup of your infrastructure stored locally on your in-house network (which isn?t a bad idea), you won?t be able to access any information stored on the Internet. One simple way to bypass the problems associated with a downed Internet connection is to equip your office with 4G-enabled laptops or smartphones that can act as temporary hotspots. However, if you do this, you better be sure that your phone carrier supports this immense amount of data expenditure. In many cases, it?s better to just let your team work remotely if they?re capable of doing so. The most reliable choice would be to have any team that can work remotely do so until the problem is resolved. Working remotely during the incident might be a valid opportunity to eliminate downtime associated with your Internet access. As reported by ZDNet, ?It’s true that businesses are increasingly allowing for remote work and disaster planning is a good argument for it. It may even be worthwhile as an exercise. Require employees to have a plan for working offsite and schedule a day for everyone, or perhaps one department at a time, to do so. You might learn something about productivity while you’re at it. 9/11 proved that it’s possible your offices may be out of commission for a while. Do you really want to have to make up your plans on the spot when that happens?? If your business needs help implementing technology to keep your team connected at all times, you can count on White Mountain IT Services to find a solution. We can work out ways to help your employees access information regardless of the circumstances, all so you can keep downtime to a minimum. Furthermore, we can provide your business with the technology solutions required to ensure that your team can work off-site when needed. For example, a virtual private network (VPN) allows your team to securely access your business’s sensitive information from any wireless connection, allowing your team to access mission-critical files even if the in-house wireless network is down. If you?re concerned about not being able to communicate with your team while they?re off-site, we can make it much easier by helping you implement a unified communications solution that?s designed to work seamlessly, as long as you have an Internet connection. You can communicate in real time with both instant messaging and Voice over Internet Protocol telephony solutions that will make you feel like your team is right next door, even if they aren?t. For more information about how White Mountain IT Services can help bring your business back from the brink of downtime, give us a call at (603) 889-0800.
What Brute Force Attacks AreBasically, you can imagine a brute force attack as a method which involves the rapid input of passwords and usernames in succession. They?re designed to crack encrypted data by finding a usable password. Most brute force hacking attacks are performed by an algorithm and can input a ridiculous amount of credentials every second. The reasoning behind the name, ?brute force,? is due to the brutal assault on the system, rather than taking a more discreet or intellectual path to hack the system. There are many different types of brute force attacks, but one of the most popular ones is the dictionary attack, in which passwords are generated with a dictionary, using popular words, in order to access the system. Why They?re DangerousAccording to a McAfee Security Report from 2015, brute force attacks account for about 25 percent of all online hacks, second only to Denial of Service attacks. One of the reasons why they?re so popular is that they can be used as a straightforward way to infiltrate privileged accounts and steal sensitive information. These attacks are typically used to access accounts and steal credentials like credit card numbers, Social Security numbers, and other data that could be used for financial gain. Furthermore, brute force attacks can be used to install what?s called a rootkit on a device, or turn a PC into a bot. Most often, brute force attacks will be seen as a jumping-off point for other types of threats to terrorize the targeted machine. What You Can DoHaving a security solution put into place that can lock users out based on IP location or failed login attempts can be a great way to protect against brute force attacks. However, both of these methods can be bypassed if the hacker is using a botnet. Since the botnet consists of several infected computers from all over the world, they will have different IP addresses and be identified as individual users, rendering the aforementioned security practices moot. Another useful technology to have to protect against brute force attacks is two-factor authentication. By providing another layer of security, in addition to the required password, brute force attacks will be rendered useless. Without the secondary credential that gets sent to a smartphone or email address, any attempts to brute force an account with a password will be pointless. This is why it?s always recommended that you use two-factor authentication. Your business should be prepared to handle all types of online threats, especially those that can lead to more dangerous or destructive results. White Mountain IT Services can provide your organization with security solutions that are designed to maximize your network?s protection against brute force attacks, and other online threats that could have an impact on your business?s operations. To learn more about what we can do for your company, give us a call at (603) 889-0800.
Why You Need Backup and Disaster RecoveryEvery organization should have a sound plan to recover any data that?s lost due to unexpected disasters. It?s been proven that organizations that fail to recover lost data within 7 days of the incident, typically go out of business within one year. There are many reasons why data backup and disaster recovery solutions need to be implemented. Here are just a few of the threats that could uproot your business and disrupt operations. Natural disasters: Floods, fires, electric storms, tornadoes, hailstorms, and so on, all have the potential to not only destroy your physical infrastructure, but also your business?s data. Therefore, if you?re in a region that?s prone to extreme weather conditions, you need to consider backup and disaster recovery. Cyber attacks: Data breaches are well-known culprits of data loss. It?s not easy to predict what a virus or malware will do, but most often, they?re designed to steal your data, delete it, or lock it away until a ransom is paid. In all of these cases, it?s best to have your data backed up so it can be safely restored. User error: The biggest threats often come from those who are supposed to have access to your data, not just those who don?t. If an end-user accidentally deletes a file, moves it somewhere it doesn?t belong, or hands over credentials to a hacker on accident, your data is put at risk. Hardware failure: The inevitable part of working with technology is the fact that it will eventually fail and be rendered obsolete. This can happen when you least expect it, and the costly downtime can be a major setback for your business – not to mention the data that could be lost if a server were to go down. What You Should Look ForNot all backup and disaster recovery services will be the same, nor should they be. You need a solution that?s customized to meet the specific needs of your business. Here are some of the best features to look for in a BDR solution, and why they?re critical for the continued functionality of your business. Cloud and off-site backup: You don?t want to store your data backups on in-house tapes. Rather, you want them secure in an off-site location, like the cloud or a data center. This way, you can know that your data is stored in a compliant location that can?t be damaged by natural disasters. Quick recovery time: You want to be able to rapidly deploy your business?s data to your infrastructure in order to minimize downtime. Tape backup can make this part of the recovery process long-winded and wasteful, but BDR can automatically deploy your data through the cloud, making recovery practically instantaneous. Comprehensive backup: Furthermore, you want to make sure that your data is as recent as possible. Tape backup is inefficient for this purpose, while BDR can take backups of your data as often as every fifteen minutes – maybe even more often. For more information about BDR and business continuity, contact White Mountain IT Services at (603) 889-0800.