3 Ways to Know if Your Company?s Better Off With a Private Cloud

The private cloud, as we describe it, is an infrastructure that?s hosted in-house or remotely by a managed provider. This cloud system is managed and maintained by your own dedicated IT technicians, or if it?s hosted remotely, by White Mountain IT Services?s trusted IT staff. The main reason a business would want to host their cloud solution in-house is that you get complete and total control over how you want to manage your data. The public cloud, on the other hand, is a more hands-off experience. You get the ease-of-use that your business deserves while the heavy lifting is done by the service provider. Despite this seemingly great benefit, some businesses find that they?d prefer to have more control over their data and its security; hence, they want to use a private cloud solution. Here are a few ideas to consider before going all-in with a private cloud solution. Are You Confident in Your Staff?s Abilities?The integration and management of your cloud solution?s infrastructure, especially a privately hosted one, is knowledge-intensive. If you have dedicated IT personnel in your office, you?ll want to make sure that they?re trained on the proper maintenance and management that an in-house private cloud demands. If you don?t have the assets of an in-house IT department, you can still take advantage of a private cloud solution. White Mountain IT Services can host and maintain your cloud solution for you. It?s one of the many benefits of working with a managed service provider for your company?s cloud needs. Are You Dedicated to Data Security?Data security is one of the biggest things that people want to get out of their cloud solution, and the private cloud is far more dynamic than the public cloud in this area. The main idea is to ensure that your cloud solution is protected by some sort of secondary security solution, like a Unified Threat Management (UTM) device. Granted, the public cloud is relatively secure (although there are exceptions), but the private cloud allows you to put other measures into effect that can further enhance your data?s security. Are You Focused on Data Control?Data control is another pivotal part of choosing a cloud solution for your organization. Businesses who want complete and total control over their data, and are unwilling to budge on this issue, will want to utilize a private cloud. Since a private cloud is often hosted in-house, you know with certainty that your business is handling your data. If you are on the fence about any of these three pain points revolving around a private cloud implementation, you should consider integrating a hybrid cloud solution that combines the ease of use of the public cloud with the security and control that a private cloud offers. As reported by Processor magazine, ?It?s also safe to assume that hybrid cloud environments will advance as both private cloud infrastructure and public cloud offerings share the market.? This means that you can invest in the future by looking into a hybrid cloud solution. Don?t be left behind by the ever-growing nature of today?s technology; instead, embrace it, and use the power of cloud computing to send your profits skyward. To get started with a cloud solution, give White Mountain IT Services a call at (603) 889-0800.

Tip of the Week: 4 Ways to Not Annoy Everyone With Your Smartphone

Keep the Phone Off the Dinner TableWhen we sit down to eat, most people consider it a social experience. As such, it?s expected that you are mentally present and engaged in any conversations. This isn?t hard to do, but when you can?t take your eyes off your phone, it?s considered rude. Even checking your phone every now and then for notifications is frowned upon. Solution: Leave your phone be during dinner. Don?t put it on the table, as even its very presence is sure to make someone lose their appetite. Fun Facts: A restaurant in Iowa, Sneaky?s Chicken, offers a 10 percent discount for diners who don?t bring their treasured phone to their meal. Also, Bucato, in Los Angeles, has a dedicated ?cell-phone section.? Keep Your Voice Down if You?re in PublicIt?s perfectly acceptable to use your phone if you?re in a room with other people, but only if you keep your voice at a manageable level. You know there?s something wrong when other people around you can?t concentrate, or have to talk over you in order to continue a conversation. In this case, poor call connections are often the culprit and users will resort to talking louder so the person on the other end can hear their voice. Unfortunately, this usually draws the ire of the room, especially when the one on the phone doesn?t realize what they?re doing. This is why it?s always important to be aware of the volume of your voice, which is easier said than done half the time. Solution: Just step out of the room. It?s as simple as that. Don?t Use Your Phone at Cash RegistersYou can use your phone while you shop, but one of most cashiers? pet peeves is using your device while they are ringing you out. You might not be planning on having a lot to talk about with the cashier, but when you continue talking on the phone, even during checkout, it shows that the cashier isn?t worth your time. Naturally, people don?t like feeling this way, and it makes the cashier feel awkward for interrupting your ?important? phone business. Solution: You could just hang up the phone, but if it?s important, at least take the time to apologize to the cashier ringing you out, and focus as best you can on them. That way, they know they have what little attention you can afford them. Stop Leaving Long VoicemailsContrary to popular belief, voicemails are not meant to include every detail of the reason you?re calling. Voicemails should rarely, if ever, exceed one minute in length. Any longer, and voicemails can simply overwhelm people. People will often need to scramble to find a pen and paper, and if it?s an especially long message, they?ll have to listen to the whole message again to make sure they didn?t miss anything. Great. Solution: If you have a lot of information to share, just leave a message asking for the person to call you back. Just leave your name, callback number, and the reason you?re calling; you know, what every voicemail system asks for, and nothing more. Believe it or not, some people really don?t understand how to be considerate when using their phones. This is why it?s so important to share these tips and make the world more enjoyable for […]

Alert: Hackers Posing as IT Support and Hijacking Computers

First off, if you happen to find yourself a victim of a hack attack such as this, whatever you do, DON?T CALL THE PROVIDED PHONE NUMBER! The blog Delete Malware explains what will happen if you do: ?If you call [the number] they won’t actually remove adware from your computer. They will hijack your computer and steal all of your bank information and passwords.? Yikes. At this point, the origins of the malware can?t be pinned down, which makes it rather confounding because it?s been known to activate and display the blue screen of death while browsing popular websites like YouTube and Facebook. However, what the user sees isn?t the real Microsoft blue screen of death–which takes up the entire computer screen. Instead, this particular malware only affects the Internet browser, as indicated by the exposed browser tabs and URL form as seen in this screenshot. Thankfully, the threat isn?t as severe as the real blue screen of death. In most cases, you can move on from this annoyance via the Task Manager (Ctrl + Alt + Delete), or by rebooting your machine. Still, it?s inconvenient for anyone when this happens in mid project, and it can result in losing unsaved work or even downtime. Plus, it?s not like rebooting your machine will rid the virus from the system. Without proper removal, it will lie dormant and pop up again at another random time. Actually, the fake blue screen isn?t the biggest threat here. It?s all an elaborate ruse to play on one?s fears and get them to call the provided phone number. This is all to give the hackers an opening to take control of the PC, giving them the chance to do far worse damage than wasting the few minutes it takes to reboot. It?s a classic social engineering scam where users are tricked into forking over their sensitive information after overreacting to a perceived threat. You?ve likely seen social engineering before with spam emails designed to convince you that you?re guilty of something like missing a court date or getting a speeding ticket. Although, upon further review, its spam messages are usually fairly easy to determine, which makes them easy enough to ignore. What makes this particular scam different is that you can?t ignore it like spam messages, especially when it locks up your browser. Upon encountering malware such as this, you should immediately call the real IT professionals at (603) 889-0800. We?ve got the tools it takes to analyze your system to determine the nature of the threat and properly remove it. In a situation like this, one thing that the hackers are hoping for is that the victim won?t know enough about who oversees their company?s IT that they?ll believe the number to be real. This is a dang shame because it sullies the good name of IT workers the world over. To protect your system from hack attacks like this, you?ll want to have a proactive security measure in place, like the security monitoring service provided by White Mountain IT Services. For all of your organization?s IT needs, call the real IT professionals at (603) 889-0800.

Tip of the Week: Use Poetry to Protect Your Data

It?s clear that the average PC user won?t choose passwords that are as secure as they should be, primarily because users will prioritize ease-of-remembrance as one of the best qualities of a password. As explained in an essay from the University of Southern California, written by Marjan Ghazvininejad and Kevin Knight, it?s best to use randomly generated 60-bit strings (basically, a series of 60 ones and zeros), and convert these strings into words or phrases. This concept is based on a XKCD comic that depicts the pains of remembering complex passwords. The idea behind the comic is that you can take a string of numbers, like 10101101010100101101010101010, and convert segments of the string into English words. For example, the above string would read, ?correct horse battery staple,? which is ridiculous and doesn?t make any logical sense. However, if used as a password, users can create a mental image or a story to associate with the password, helping them remember it. Ghazvininejad and Knight suggest that, unlike the 44-bit string in the above example, users should opt for a 60-bit string, and give the password a poem-like structure. Doing so could make the password easier to remember. In other words, to put it in very simple terms, the idea is to make the password as easy to remember as possible for the user, while making it extraordinarily difficult for a computer to guess. By today?s standards, the 44-bit string would take around an hour to crack, while a 60-bit string would take well over a decade. That?s the kind of password security that your organization wants. If you don?t feel like getting overly technical with 60-bit code strings, it?s possible that you can use lines from existing poems to create a password. The creators of the passpoem, however, don?t suggest that you do so. There are millions of poems on the Internet, and the chances of this type of password getting hacked are much higher than if the string of characters were truly random. Still, using a line from your favorite poem is likely much more secure than a simple password like ?MOM385? or ?password,? so the idea shouldn?t be dismissed completely. You still need to be aware of the issues that come with this password strategy; for example, the risk of dictionary-type attacks could become a problem, even with using a long password. It?s up to you to know the complications and risks that come with your preferred password management policy. One of the biggest pain points about password management is that you need multiple/different passwords for all of your different accounts. When you have multiple complex passwords, it can be difficult to remember them all. This is what makes a password management system so effective. White Mountain IT Services can help your business get set up with the best password manager on the market. To learn more, give us a call at (603) 889-0800.

Gmail Now Notifies Users if an Email Comes From a Shady Source

Gmail will soon inform users of whether or not messages were sent to them over an unencrypted network, in the hopes of improving online security for all users (and providers) of webmail. It?s a way of increasing awareness, as well as emphasizing the necessity of encryption for sensitive online services. While Gmail already takes advantage of an HTTPS encryption protocol for its own mail service, this is only a small step toward increasing the security of online email services. The HTTPS only encrypts the browser?s connection with the server, rather than all of the traffic to and from senders and receivers. In other words, unless the email provider is taking full advantage of encryption while messages are in transit, external parties could potentially be snooping around looking for information that doesn?t concern them. Providers like Google, Comcast, Microsoft, Yahoo, and some others, are taking advantage of protocols that can limit outside intervention by using STARTTLS. As explained by ZDNet: A lot of providers don’t support STARTTLS, meaning that any email encrypted by the sender can’t be read when it’s received on the other end. This so-called opportunistic encryption works when both email providers support STARTTLS. If one doesn’t, then the other provider falls back to an unencrypted form. Therefore, the most important aspect of this new email encryption protocol is the fact that it will encourage email providers to offer the same security measures that big names like Google and Microsoft do. While this new encryption notification policy can improve the way you read and interpret emails, you don?t want to rely on this method to keep your business?s communications solution safe. What you want to integrate is a comprehensive security protocol that?s capable of defending your business?s infrastructure from a variety of both internal and external threats, like viruses, malware, and spyware. While a firewall and an antivirus solution can go a long way toward limiting your business?s exposure to threats, you want a more powerful solution that encompasses all aspects of network security. The perfect solution for a small or medium-sized business is the Unified Threat Management tool, which combines a firewall and antivirus solution with preventative measures like content filtering and spam blocking capabilities. Such a comprehensive solution is optimized for maximum protection from threats of all types. For more information, give us a call at (603) 889-0800.