White Mountain IT Services Blog


What Do Small Manufacturers Need To Know About CMMC 2.0?

ComplianceThe DoD (Department of Defense) unveiled significant updates to the Cybersecurity Maturity Model Certification (CMMC) on November 4, 2021. This notice addressed a changeover from the older, more complex CMMC 1.0 architecture to the newer, more user-friendly CMMC 2.0. 

An in-depth analysis of the changes between the latest and previous iterations of CMMC is provided in this article.

Please take note that CMMC may be mentioned in future proposals as soon as August 2022 and at the latest as of November 2023.

Continue reading

Does Your Company Need a Work From Home Policy?

The use of remote access has skyrocketed as a result of the coronavirus epidemic. Many businesses are finding it lets employees connect more easily. They will want to keep it in the cases where it works best.

Remote access has to be done right to produce good results. If it's done haphazardly, productivity and security will suffer. Employees will complain about inconsistent treatment. What's needed is a comprehensive, fair policy. It will let employees know what their company offers and what is expected of them. A good remote access policy gives management and employees guidance in unusual situations.


Continue reading

Does Your Business Need a Data Classification Strategy?

Data Classification

"Banks don't give every employee keys to the vault."

It was an obvious statement, but, in this instance, applied not to banks but owners of smaller businesses and how they treat the security of their data. A survey of that topic reported in GetApp had found that almost half of employees of small businesses had more access to data than required for their jobs.

But it got worse. Businesses reported that 12 percent of their employees had access to all data. And so hypothetically one resentful employee, trying to get even or trying to turn a buck, could download proprietary information, including essential technology, and walk out with it. Another target could be customer information, including Social Security numbers. Lists of B2B purchasers, their addresses, preferred products, credit information. Literally, any data.


Continue reading

Does Your Company Need a Bring Your Own Device (BYOD) Policy?


BYOD (Bring Your Own Device) is one of the most practical approaches to the modern mobile workforce. In fact, most employers would need to enact policies to stop the team from using their own phones and laptops for work. But there's a difference between employees texting to coordinate and interfacing with business data through their personal devices. If you choose to make employee-owned devices a relied-upon and integrated part of your business architecture, there are a few important factors to consider.

You will need to decide if BYOD policies are a good fit for your company. If so, you will then determine how to implement safe and fair BYOD policies across the board. Let's dive into the benefits, concerns, and implementations.  


Continue reading

The Ultimate Social Engineering Survival Guide

 Social_Engineering.pngSocial engineering is a term that gets thrown around often, but what does it mean? In short, social engineering is the art of manipulating people into performing actions or divulging information.

Social engineering has become more prevalent with the rise of social media use. That's because it's easier to reach many people and collect information about them.

This article will outline everything you need to know about social engineering and what organizations can do to prevent social engineering attacks and minimize their effects.


Continue reading

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.


Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

White Mountain IT Services


33 Main St, Suite 302
Nashua, NH 03064


121 Riverfront Drive
Manchester, NH 03102


Client Help Desk


Open Positions