Blog

Wireless Charging Just Got an Upgrade… But is That Good?

Wireless Charging Just Got an Upgrade… But is That Good?

Wireless charging seems to be a perfect idea - imagine if someday, our devices would never run out of charge? This may be why such aggressive progress has been made toward building a better battery charger. However, not everyone is convinced that wireless charging will have the effects that are desired of it.

Continue reading

Tip of the Week: Changing Your Network Profile

Tip of the Week: Changing Your Network Profile

The Windows operating system has different settings for connecting to different networks. While this may seem like a minor detail, it actually can have considerable ramifications to your cybersecurity, not to mention that of your business. For this week’s tip, we’ll discuss how to use your network profile to stay secure, based on your situation.

Continue reading

Has Malware Made a Home in Your Router?

Has Malware Made a Home in Your Router?

Hackers and cybercriminals, like most people, tend to gravitate towards high-reward activities. In this case, that means that focus is turning to creating malware that attacks the router, potentially infecting the users that leverage it to connect wirelessly to the Internet. Researchers at Kaspersky Lab recently discovered an example of such a malware, so today, we will review this threat and how to best protect your network.

Continue reading

How to Calculate if That Print Job Was Really Worth It

How to Calculate if That Print Job Was Really Worth It

There are a few sounds that are familiar to any office: keys clacking away, coffee being sipped (or slurped), and the rattling, squawking hum of the printer. Yet this image presents a crucial question: do you know how much your printer is costing your business each time it is used? In today’s blog, we’ll review how you can calculate this investment.

Continue reading

Tech Term: Chromebook

Tech Term: Chromebook

It seems like everywhere you go, you can see a Chromebook. These specialty laptops have a few features that make them highly desirable in some circumstances, and poorly suited to others. Seeing as ‘Chromebook’ is our Tech Term for this week, why not take a few moments and examine them a little closer?

Continue reading
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions