Next time you run into a PC problem that you just can?t wrap your head around, try out these six troubleshooting tips. Keep things simple: You?d be surprised by how often some of the most common problems with technology can be resolved by simply restarting it. Reset the hardware or application, check to see if the machine is plugged in properly, shut the machine down, or reboot it. After all, there?s no real reason to go through in-depth troubleshooting practices if the problem can be easily resolved with a restart. If others tried it, try it anyway: Sometimes you?ll be passed a problem that?s been tested by other people within your organization. Thinking it will help you narrow down the problem, they?ll list off what they have or haven?t done. While this might be helpful, you should trust your own judgement – perhaps they didn?t perform a process correctly, or maybe they say that they?ve tried it, but really haven?t. Don?t leave any stone unturned. PEBKAC (user error): This issue, ?problem exists between keyboard and chair,? is a common reason why you might be unable to diagnose what the real problem is. ZDNet estimates that about 80 percent of problems are due to user errors, which means that the one at fault might not be technology at all. In these cases, it?s important to accept that you might be wrong and work towards whatever the solution might be. Replicate the issue: In order to best understand a problem, sometimes it?s helpful to try to remake the issue. After all, if you know how a problem starts, you might be able to best learn how to fix it. Ask your end-users how the symptoms showed up, and what they were doing when disaster struck. Fix vs replace: Your IT budget needs to be considered when you?re choosing to either implement new technology or to fix recurring issues with your old solutions. You need to understand where the fine line between fixing or replacing lies. It makes no sense to purchase new technology if there?s still life left in your current solutions. On the other hand, hardware refreshes can be considered when you?re looking for ways to improve operations and get rid of old technology that?s no longer functional or needed. Seek professional assistance: If you can?t resolve a problem on your own, you need to realize that it?s often more advantageous to seek out professional help, rather than waste valuable time and resources by doing it yourself. Remember, there?s no shame in asking for help when it?s needed. Businesses often do this with their IT, as it can get quite technical and challenging for those who aren?t specifically trained on its best practices. Instead, outsourcing it eliminates this responsibility so that you can focus on your business. White Mountain IT Services can be your outsourced IT experts. To learn more, reach out to us at (603) 889-0800.
The Pokemon series has long been known as one of Nintendo?s most popular gaming franchises, and with the release of Pokemon Go, the series has finally made its way to everyday mobile device users. It?s currently ranked as the #1 most downloaded free app on the Apple Store, as well as the Google Play store. The game was such a hit that Nintendo?s stock increased exponentially overnight, and the app has over 26 million users worldwide – more than Tinder, Twitter, Google Maps, and other mobile apps. However, like many extremely popular things, hackers have taken this and exploited it to do their bidding. Prior to the app?s release worldwide, many impatient fans downloaded the APK (Android application package) from third-party websites and ?side-loaded? it onto their devices. This can only be done by going into Android?s settings and allowing app installation from unknown sources. Normally, this is a red flag for any security-minded mobile device user, as some malware is known to infect devices and download apps without the permission of the user; yet, some Pokemon fans just couldn?t wait, and downloaded the APK without thinking of the consequences; like downloading a backdoor. Considering how many countries outside the United States, Australia, and New Zealand, are still waiting for access to Pokemon Go, many have chosen to just use the APK to get the app on their device, rather than wait for the official release. One particular source of the APK provides a modified version of Pokemon Go that, upon installation, installs a backdoor onto the device, which allows for remote access to the device and provides full control over the victim?s phone. The infected version of Pokemon Go is so well-done and inconspicuous that the user likely won?t know that their device has been infected. Security firm Proofpoint suggests that it?s entirely possible that, should infected devices connect to your network, networked resources can also be put at risk. Take a look at the DroidJack-infected app?s permission request, and see for yourself just how strange they might look. https://www.proofpoint.com/sites/default/files/users_content/10/pokemon-fig2.pnghttps://www.proofpoint.com/sites/default/files/users_content/10/pokemon-fig3.png When downloading any app, it?s crucial that you drive this best practice into the heads of your employees: be sure to pay attention to the permissions required by the apps that you download. For example, there?s no real reason why Pokemon Go would need to make phone calls, edit and send text messages, modify your contacts, and record audio. All of this is just asking for disaster. While exploitation of the APK hasn?t been observed in the wild, it represents a dangerous development in mobile applications, one which shows hackers taking advantage of wildly popular smartphone apps, and turning them into catalysts to spread their malware and influence. There are two lessons to be learned. Don?t download apps from unknown sources, even if they?re just games, and make sure that your employees know what your policy on mobile apps is on your in-house network. Also, be sure to examine a new app?s permissions, and only download them from the Apple store or Google Play store. Among your millennial workforce, there may be many users of Pokemon Go, so it?s your responsibility to reach out to them, and educate them on these best practices. After all, ?Gotta catch ?em all,? doesn?t refer to malware infections.
Simply fill out the form on our “Contact” page, or give us a call to set up a private consult. We will provide more detailed information about our company and services, and we will discuss your current situation, as well as your short and long term goals. If it looks like we may be a good fit for each other, we will provide a ballpark estimate to give you an idea of what our services may cost. If that all sounds good, we move forward with a basic audit of your environment and gather more detail about your priorities and needs. We will follow up with a custom proposal, as well as a few client references for your review. There is no cost or obligation involved, and the process can take as little as a few days. If you decide that we are not a fit, or if the timing is just not right, we promise not to bug you with endless sales calls. We will respect your time and privacy, and will be there when you are ready! And remember, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. Isn’t my IT Manager also my CIO? Can you really help me manage my existing IT staff? What is the IT management platform that you mention? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?
The short answer is YES, we can help protect your business. It is very rare that an outside vendor or employee would ever intentionally cause your business harm or disruption, but we understand that it is your job to protect the businesses and minimize risk. As the adage goes, “It’s better to be safe than sorry.” If you feel that things don’t seem right, we can help in several ways. The first step is to have a private & confidential conversation to discuss the situation and assess the risks to the business. The risk assessment will prepare the foundation for an action plan outlining the steps required for a rapid lock-down. As you can imagine, having been in business for over thirty years, we have helped with similar situations before. Often we have responded with an overnight data backup, lock-down, and extraction; and sometimes, we have even helped clear up a misunderstanding which resulted in getting a relationship with an existing vendor back on track. Either way, we are happy to help. And remember, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?
If your systems are currently working, we can easily back them up and then document them, if your systems are not currently functioning properly then it is already painful and your business is at risk, the sooner you make the change, the better. We often find that even when a new client that we are onboarding has told us that things were “ok” with the previous vendor, when they see how much of a difference having professional IT management can make, they are relieved and excited about the change. I can’t tell you how often a new client tells me that they wished they had made the change years ago! Our systems and process are very transparent, as a client, you have access to our systems, records and all of the documentation about your network. With White Mountain, you are as involved as you want to be and will never feel that you are being left in the dark. Don’t settle for a vendor who uses knowledge as job security. Let us help you get the situation resolved. At White Mountain, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. Isn’t my IT Manager also my CIO? Can you really help me manage my existing IT staff? What is the IT management platform that you mention? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?