Where You Store Your Data Makes a Big Difference

For example, storing your data locally has several benefits, but only if it?s done in an efficient manner. The same can be said for storing your data in a cloud; while it has valuable uses, this is only if you?re taking the correct approach to cloud computing. When to Store Data LocallyMany organizations will host their own data infrastructures in their internal network. This means that workstations that have access to the network will be able to access the information stored within. However, this also means that your workstations need to be physically connected to the server. This complicated cabling and networking can be cumbersome, but it also provides a relatively quick connection to your business?s internal data. Storing your data locally in-house allows you to implement security solutions that are designed to prevent threats from accessing your data, which is crucial for any small business. When to Store Data in the CloudA better question to ask would be, ?when is it not okay to store data in the cloud?? The cloud is one of the best ways you can deploy data to your entire organization without physically connecting all of your system?s workstations to a central data-holding server. With the cloud, any information stored can be shared and deployed via an Internet connection, allowing anyone with the correct permissions to view it. If you have data that needs to be accessed by many employees, then the cloud is the ideal way to store your data. Depending on the cloud solution you implement, you?ll have varied control over the security and deployment of your data. Businesses that relish this control will want a private cloud that?s either hosted in-house or through a managed service provider, while organizations that don?t need comprehensive control will appreciate the functionality of the public cloud. When to Store Data Off-SiteOff-site data storage is effective for a number of reasons. For one, off-site data storage is similar in nature to the cloud; your data is there, and it?s available when you need it most. It?s helpful to store backups of your data infrastructure in off-site data centers so that you can take advantage of them in the event of a data loss disaster, like a natural disaster or hacking incident. Backup and Disaster RecoveryThere?s a reason that so many great solutions rely on the cloud, and it?s because it allows for near instantaneous access to your business?s data. In particular, this is important for your data backup system. When you face a data loss disaster, you need to take quick action to ensure that you minimize downtime. With a backup and disaster recovery (BDR) solution from White Mountain IT Services, your data is immediately deployed to the BDR, which temporarily takes the place of your server in the event of a hardware failure or crippling disaster. This kind of convenience isn?t available without storing your data off site. For more information about data storage, the cloud, and BDR, give White Mountain IT Services a call at (603) 889-0800.

How to Enable AutoRecovery for the Microsoft Office Suite

Fortunately, Microsoft Word and other parts of the Office suite, like Excel and PowerPoint, all have the option to perform what?s called an AutoRecovery. By strategically taking advantage of AutoRecovery, you can reduce the risk of losing progress on a file. Enabling AutoRecover in OfficeBy default, AutoRecovery is enabled in Office. However, if for some reason it?s not enabled, you can manually turn it on. Go to File > Options > Save, and near the top you?ll see the option to Save AutoRecover information every x minutes. Right underneath, there will be another option, Keep the last autosaved version if I close without saving. Make sure that both of these boxes are checked, and enter in the number in the field for the first option. After that, all you have to do is click OK. Depending on whether or not you?ve saved the file you?re looking to auto recover, the next steps might vary. If you had saved a file, but you experienced a sudden power-down that led to unsaved changes, you have a chance to get them back. Open the file you were working on, then go to File > Info. Under Manage Document you should see the version that you?re looking for. Then, all you have to do is select Restore in the yellow bar at the top of the page, and your file will overwrite any previously saved versions. However, if you haven?t saved the file you were working on last, you have to follow a different procedure. Click File > Info > Manage Documents > Recover Unsaved Documents. If you?re working in Excel, you could select Recover Unsaved Workbooks, and in PowerPoint you can click Recover Unsaved Presentations. Once you select the file that you want to recover, click Open. Finally, in the yellow bar at the top of the screen, choose Save As; and remember to hit Save next time! Other SolutionsEven if Microsoft Office has built-in autosave features, your organization will still largely rely on other comprehensive data backup and disaster recovery measures. One of the best ways to approach your business?s backup and recovery needs is to implement a backup and disaster recovery solution (BDR) device from White Mountain IT Services. BDR not only takes rapid backups multiple times a day, but it also quickly deploys that data to your infrastructure for easy recovery. Furthermore, the BDR can act as a temporary server, so your productivity doesn?t skip a beat while you look for a replacement system. It?s the ultimate solution to destroy costly and frustrating downtime. For more information about Microsoft Office or BDR, give us a call at (603) 889-0800.

How to Avoid These 4 Common Social Engineering Scams

Social engineering attacks are highly dangerous, especially since they can come in many different shapes and forms. Hackers tend to appeal to human emotions that are easily exploitable, but the primary concern for social engineering hacks is the fact that these vulnerabilities can?t be patched or augmented with security solutions. The only thing keeping your data safe from social engineering hacks is how your team deals with them, and whether or not your employees are gullible enough to hand over sensitive information. Types of Social Engineering HacksThere are many ways that hackers can take advantage of end users. It?s important to keep in mind that social engineering hacks are almost always in the form of phishing attacks, which are targeted attempts designed to garner information from specific individuals. The following types of social engineering attacks are most common: Familiarity: Humans have relationships with other humans. It?s part of what makes us who we are. Hackers will use these relationships to lure users into a false sense of security, persuading users to hand over sensitive credentials. Information: Hackers will pose as reputable organizations, like banks, colleges, financial companies, and so on, in an attempt to get you to hand over personal information. These institutions will never ask for your credentials through an email, so if you receive a message that asks for information like this, you can identify it as a scam. Authority: Some users have reported receiving messages from government institutions or local authorities that they have been accused or found guilty of crimes, and that there?s a fine that must be paid. This appeals to the fear people have that they will get in trouble, and people tend to make irrational decisions when under the duress of fear. Consultation: In many cases, the user will be contacted by someone who claims to be a member of their company?s IT department. They might abuse their false identity to pull information from your employees. Since your employees are likely to trust your IT department, they?ll be more willing to hand over sensitive information. The best way to counter social engineering and phishing scams is to educate your staff on how to handle potentially dangerous situations. They should be educated in how to approach spam and suspicious phone calls. One particularly important detail that you should always emphasize to your staff is that important information, like Social Security numbers, credit card numbers, and other personal credentials typically won?t be requested via email. Another great method of discerning potential social engineering scams is by cross referencing phone numbers and email addresses with those you currently have on file. This helps you identify fakes before it?s too late. For more information on security best practices, White Mountain IT Services is always here to help. Just give us a call at (603) 889-0800 to learn more.

Tip of the Week: Access Windows 10 Safe Mode for PC Troubleshooting

What is Safe Mode?Safe Mode is a way of booting your computer with limited configuration in an attempt to troubleshoot basic issues, like device driver complications. You may have witnessed the option to boot Windows in Safe Mode before; for example, when you experience an unexpected power down, you might see a black screen that prompts you to either boot Windows normally, or boot it in Safe Mode. Windows 10 reportedly boots up too fast to allow for the normal Safe Mode access, so you have to take a roundabout way to activate Safe Mode. Enabling Safe Mode in Windows 10By default, Windows 10 will boot in Safe Mode if it?s having a consistent problem while booting up. In order to allow the option for Safe Mode, however, you need to set it up in Settings beforehand. Select Settings from the Start menu, and select Update and Security. Click in the Recovery tab and you?ll see an item titled Advanced startup. Click the Restart now button and your system will restart, allowing you to open your PC in safe mode. Once your computer reboots, you?ll be prompted to Choose an option. Here, you want to click on the Troubleshoot option. Then, select Advanced options. Navigate to the Startup Settings, which will prompt you to restart your computer and make changes to the following options: Enable low-resolution video mode. Enable debugging mode. Enable boot logging. Enable Safe mode. Disable driver signature enforcement. Disable early-launch anti-malware protection. Disable automatic restart on system failure. Once the computer restarts, you?ll be prompted to use the function keys (the F keys at the top of your keyboard) to navigate the list of Startup Settings. For example, to enable Safe Mode, you would use F4. If this process sounds confusing, we?d be happy to walk you through it. Of course, if you?re experiencing trouble with your PC, why not let the tech experts at White Mountain IT Services give you a hand? It?s much easier and less time-consuming to let our trusted technicians handle your technology troubles. To get started, give us a call at (603) 889-0800.

5 Tips to Minimize the Risk Associated With Mobile Devices

BYOD is a great new trend that can improve innovation, employee morale, and the productivity of your staff. This is only true, though, if you approach BYOD in a safe and secure way that manages to contain and control the flow of your business?s data. Implementing such a plan isn?t easy, and there?s much that needs to be checked off before you can confidently start using BYOD. There are several factors that need to be considered before implementing your own BYOD strategy. Identify potential risks: The first step to integrating a BYOD plan is to identify what parts of the plan can pose a problem for your business. Where is there potential for data leakage to external parties? More often than not, your team will be using devices that they already own, so it?s important that your organization doesn?t run into security discrepancies. Define a clear BYOD policy: If you?re going to implement BYOD, then you need to map out a complete plan that encompasses your entire infrastructure. Consider why you?re implementing BYOD in the first place. Is it to improve workplace productivity, or is it to make your network more mobile? Whatever the reason for your BYOD policy, it should be designed to optimize your goals. Consider regulations and compliance issues: Certain data needs to be protected and secured from hackers, or else your business will become the target of major fines from violating PCI, HIPAA, and other compliance regulations. This means being prepared to deploy your business?s information in such a way where this data is at minimal risk. Keep track of used devices: You can?t have devices entering and leaving your network on a whim. If your team is going to be bringing their own devices to use for work, you should keep track of who brings in what devices, and how they are accessing data stored on the network. Train your staff: Perhaps most important of all is that you take the time to properly train your staff on what it means to bring their own devices into the workplace. You should be clear that, if they?re going to be using their mobile devices, you expect them to make intelligent decisions about how and why they use the data stored on these devices. Regardless of how you decide to implement BYOD, there will be a couple of technologies that you won?t want to leave behind. For example, a mobile device management solution is a great way to limit access to information on the company network, while allowing you to remotely wipe devices that may be compromised, lost, or stolen. Another technology crucial to allowing your team to get the most from BYOD is cloud computing, which lets them access important information and applications via the Internet from any approved device. If your business is ready to take on the challenge of implementing BYOD, White Mountain IT Services would be happy to help. Give us a call at (603) 889-0800 today to get started.