Should we be considering moving to the cloud?

The short answer is yes before you spend any money on new servers, you should consider how cloud-based systems could help your business. White Mountain is an IT management and support company, not a server sales company.  We routinely help clients evaluate the best use of technology, minimizing the cost of ownership without adding complexity.  White Mountain has been providing full cloud desktop platforms to our client for many years and can help you objectively evaluate options, and plan a migration to the cloud if it is the right fit for your business. Today’s cloud services can offer a very competitive alternative to having servers and computers on-site.  Client’s who are best served by moving entirely to the cloud, literally remove all of the PC’s and servers, and each user has an inexpensive $200 “cloud terminal”. Rather than being in the never-ending cycle of buying, installing, maintaining and repairing computers and servers, everything is provided as a simple monthly user fee.  Your costs scale almost directly with the growth of the company. Some of the benefits of moving to the cloud include: Never buy another server! Expensive, high-end options become affordable (or included for free) Redundancy & fail-over Virtualization Real-time backups Disaster recovery Secure remote access Per-user software licensing Easy access from Windows, Mac, tablet, smartphone Easy security logging and auditing Standardization, so user support is easier End-user devices become inexpensive and easy to swap Systems and costs scale up and down as your needs change Call today to see if moving some, or all of your systems to the cloud is the right move for your business. At White Mountain, we make moving to the cloud EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

What should be included in a written security policy?

Depending on the industry that you are in, and the data security and compliance regulations that may apply to you, a security policy can be quite involved. At a minimum, every business should have a written security policy to demonstrate that the company takes data privacy and security seriously and has systems in place to protect it. Without having a policy in place, that all employees have seen and agree to abide by, it may be problematic should a problem develop in the future. A basic security policy should include: Password policy  (click HERE for password policy tips) Acceptable Use Policy for email, internet browsing, social media, etc. (click HERE for AUP tips) Access and control of proprietary data and client data Access to company data from remote locations, or on non-corporate devices Physical security protocols for doors, dealing with visitors, etc. Understanding data classification, what is critical and private data? How to deal with and report lost or stolen devices How to handle and report a suspected security breach or data loss Requirements and expectations for Security Awareness Training  (click HERE for cybersecurity training tips) Use of third party cloud or file sync services such as Gmail, Dropbox, etc. Requirements for encryption and computer locking procedures There are very specific requirements that your business may need to adhere to, and there are tools and templates available to help get started. If you would like to see some sample policies and talk about how we may be able to help you put a plan in place, give us a call today! At White Mountain, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

What is involved with setting up a cyber security training program?

Security awareness training should be available and encouraged for all computer users in your company. There are new variations of sophisticated threats like ransomware developed every day, and sometimes the human at the keyboard is the last defense and the biggest risk.  Having your computers and data infected can be a very disruptive and expensive event that can stop your workflow, and grind productivity to a halt. At White Mountain, our clients are offered an ongoing training and monitoring system that will help keep users up to date on the latest threats, as well as a platform to demonstrate that they understand, and know how to practice safe computing. In addition to classroom and online video training,  White Mountain Cyber Security User Training includes: Ongoing, scheduled course curriculum, customized by user Management reports on each users progress and participation Ongoing, automated email Phishing tests, customized for your business Positive reinforcement as well as remedial coursework based on users ability to spot fake emails Handouts and tools to help secure personal mobile devices, social media accounts, and home computers If you would like more information or would like to get a copy of our free Cyber Security Toolkit, give us a call today! At White Mountain, we make Security Training EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

How did you know our IT guys name is Larry?

Please let Larry know that we weren’t talking about him, (or were we?). All kidding aside, it really can be problematic to have a single internal, shared resource responsible for IT systems. A staff member that is not dedicated to IT, and does not have an IT background, usually doesn’t have the time, and almost never has the experience or resources, to do it well (no offense to Larry). We routinely meet companies that have operated this way and tell us that it seemed to work well for them until it didn’t. And when it stops working well, it almost always ends badly. The good news is that White Mountain can provide a much higher level of service, typically for less than the cost of a part-time employee.  Give us a call today to learn more about the White Mountain Advantage! At White Mountain, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

My IT Person Is The Only One That Knows My Systems, Won’t It Be Painful To Switch?

It is not as difficult as it might seem.  If your systems are currently working, we can easily back them up, lock down the network, and then document everything about your infrastructure.  If your systems are not currently functioning properly then it is already painful and your business is at risk, the sooner you make the change, the better.   If you are currently having a conflict with your IT vendor, or are not sure that they will be cooperative with the transition, we will work with you to build a plan to minimize the possibility of downtime and interruptions, even without their help. We often find that even when a new client has told us that things were “ok” with the previous vendor, when they see how much of a difference having professional IT management can make, they are relieved and excited about the change.  I can’t tell you how often a new client tells me that they wished they had made the change years ago! Our systems and process are very transparent, as a client, you have access to our systems, records and all of the documentation about your network.  With White Mountain, you are as involved as you want to be and will never feel that you are being left in the dark.  Don’t settle for a vendor who uses knowledge as job security. Let us help you get the situation resolved. At White Mountain, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you.   Frequently Asked Questions Here are some common questions that we hear from companies your size. What is involved with a lock-down procedure? What types of things should be documented? What is a comprehensive data backup system? What should be included in an Acceptable Use Policy? What are employee onboarding and separation procedures? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?