Blog

Can You Spot the Bait in a Phishing Attack?

Can You Spot the Bait in a Phishing Attack?

Hackers are always trying to find creative and new ways to steal data and information from businesses. While spam (unwanted messages in your email inbox) has been around for a very long time, phishing emails have risen in popularity because they are more effective at achieving the desired endgame. How can you make sure that phishing scams don’t harm your business in the future?

Continue reading

The Cisco Vulnerability Requires Multiple Patches

The Cisco Vulnerability Requires Multiple Patches

Virtual private networks are vulnerable to an exploit that was recently brought to light. Cisco has announced that this exploit undermines its ASA, or Adaptive Security Appliance tool. If this issue isn’t patched immediately, you could find your organization vulnerable through remote code exploitation.

Continue reading

Tip of the Week: Which Browser Provides the Best Security?

Tip of the Week: Which Browser Provides the Best Security?

For most users the Internet browser is one of the most utilized applications on their computer or mobile device. With the influx of aggressive problems, it is mighty useful to know which Internet browser is the best for keeping your data, identity, and network secure. Today, we will take a look at the five most popular Internet browsers found on desktop and laptop computers and decipher which are the most reliable.

Continue reading

Is Your Password Security Up to Par?

Is Your Password Security Up to Par?

Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be guessed by just about anyone, can you really call it a security measure? New insights from SplashData show that passwords aren’t being considered as much as they need to be.


SplashData collected and examined passwords that were leaked in 2017, resulting in the most common passwords being “123456” and “password.” These also happened to be the most cracked passwords for the past four years. The University of Phoenix’s annual cybersecurity survey has also provided some interesting insights:

  • Only 42 percent of Americans use different passwords across different websites.
  • Only 35 percent regularly update their passwords.
  • Only 24 percent update their passwords before they have to travel.

Furthermore, 43 percent of adults have experienced a data breach over the past three years, and 29 percent of workplaces have password protection as an official part of their cybersecurity policies. While these statistics aren’t the best situation, it’s important to understand why this is the case. One of the biggest issues regarding password security is that people don’t have enough confidence in their ability to remember complex passwords. This is augmented by the fact that multiple passwords are needed to ensure all accounts are secure. You can use some tips and tricks to remember them, though.

Passcodes
A random string of letters, numbers, and symbols simply isn’t user-friendly or easy to remember. When you’re restricted by length and content requirements, implementing a password that is easy to remember is borderline impossible. Since you don’t want to use just a single word either, you can boost the security of your password by lengthening it into a passphrase--sort of like a secret phrase that you, and only you, should know.

For example, the phrase “starwars” was one of the most used passwords in the SplashData survey. If information on a user’s social media profile indicates that they are a Star Wars fan, a cybercriminal could use this information to guess the password and cause all sorts of trouble. By lengthening your password into a full sentence, like “I really like star wars,” you can drastically improve security for your account.

Substitution
If security is a further issue, you can improve the strength of your passwords by replacing numbers and symbols for specific letters. For example, the previous example of “I really like Star Wars” can be changed to “1 really l!ke St@r W@rs.” This makes it more difficult for a hacker to guess the password.

Implement a Password Manager
The security industry is completely aware of how difficult passwords are to remember. This is why password managers have become a major implementation of any security-minded organization. Instead of having to remember multiple complex passwords, a password manager provides a secure vault for storage of any complex passwords, all of which are controlled by a master password.

Does your business need help with cybersecurity? White Mountain IT Services has the solution. To learn more, reach out to us at 603-889-0800.

Continue reading

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Continue reading
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions