Recent Blog Posts

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here?s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don?t know? While it might be tempting to give them the benefit of the doubt–after all, maybe they know a friend of yours–it?s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a ?follow? feature, and limit who can send you friend requests. Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may actually be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it?s best to stay safe and avoid these in any way possible. First, you need to log into your Facebook account. If you?re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom. This opens up the General Account Settings page. In the left column, you?ll see several sub-categories for Facebook?s settings. Click on Privacy first. Under the Privacy Settings and Tools page, you?ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you?ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though. Now, let?s say that you want to give people another option to see what you post, even if they aren?t currently friends of yours. Maybe you have articles about your industry that you?d like to share, but you don?t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only. Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily enough. For more information about how to keep your organization secure, reach out to White Mountain IT Services at (603) 889-0800.

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

This is by no means the first time HBO has moved to increase the show?s security. During last year?s season, fewer of the actors were given scripts and code words for certain characters and scenes were developed, just in case. HBO also put a stop to distributing screeners, or advance copies of the program, to members of the press to view so they can write their reviews. Now that the show has overtaken the books, the importance of secrecy and security has increased even more. This year, the cast was required to enable and set up two-factor authentication on their email accounts, where they exclusively received digital copies of the script that they were not allowed to print out. This is according to Nathalie Emmanuel, who plays the character Missandei on the show. Emmanuel added that even any rehearsal notes the cast members received were restricted to the set, signed for and returned before the actors were permitted to leave. For good reason, too. The series is a cultural juggernaut, and has generated its showrunners a vast amount of money. It is–in all senses of the word–a business, and if it was to lose its critical data or trade secrets (like who?s next to be violently eliminated from the Game of Thrones), their audience would have less of an incentive to tune in, and viewers would swiftly shift their support to a different project. In this way, it is just as important that you ensure that your business? data is secured as well. Otherwise, the same scenario would likely happen, your ?audience? replaced by your customers and clients. Two-Factor Authentication requires a user to not only know their password to log into their email or online accounts, but also have their mobile device on hand to type in a texted code. Even if someone were to guess the password, it would still require the mobile device to log in. Many businesses are adopting this to comply with various regulations, but it?s also quickly becoming a best practice for security. Are you excited about this season of Game of Thrones? Let us know in the comments what you think–but no spoilers, please!

Need A Simpler Way To Manage Data? Try A Cloud Server

That?s right–we?re talking about migrating your data to a cloud-based server infrastructure, one built specifically for your organization and hosted by a third party. By outsourcing the management of your server infrastructure to a managed service provider, you?ll be able to take advantage of the many benefits that they offer your organization. Cloud Servers Eliminate CostsHaving physical servers in your office comes with various costs. These include operational expenses such as air conditioning and electricity, as server units consume significant amounts of energy and generate enough heat to warrant cooling systems. When you migrate to a cloud server, your data infrastructure is stored online in the cloud via a virtual server. This server is managed by the IT provider, eliminating any costs associated with upkeep on your business?s part. Cloud Servers Promote FlexibilityStoring your data on cloud-based servers also allows for more flexibility within your organization. By storing data and applications in the cloud, you can then access all of it through any connected device that has been approved by IT. This makes it easier for your business to get work done, and also promotes the possibility of remote work for especially busy workers, like business owners or those who do a lot of traveling for conferences or meetings. Cloud Servers Break Down BarriersOne of the biggest uses for virtual or cloud-based servers stems from one of the largest frustrations of using technology for business: legacy applications. As new technology is released, compatibility issues often arise between applications and operating systems. Your organization might rely on a legacy app that isn?t compatible with more recent server operating systems, forcing you to run multiple machines with various OSes installed. Partitioning with virtual servers means that you can consolidate your data and applications onto a single unit and emulate each OS for your various applications? needs. Not only can you cut down on costs associated with running multiple servers, but you?ll simplify your network in the process as well. Does your business want to start leveraging cloud servers to its advantage? If so, reach out to White Mountain IT Services. Our professional technicians can assist your business with consultation, implementation, and migration. To get started, call us today at (603) 889-0800.

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

First, the benefits. Your team will likely get more done if they are using devices that they are comfortable with. After all, forcing someone to use a company-provided iPhone when they have a Samsung device that they are perfectly comfortable with will do nothing but cause friction and make for a frustrating experience. Plus, this also saves you from investing in company devices for your employees, which can be of significant expense. Furthermore, employees just like the freedom of using their own devices. Since nobody likes being told that they can?t do something–namely, use their phones in the workplace–it makes sense that you avoid the problem altogether by implementing BYOD. However, it?s still important that you implement BYOD in a way which makes sense from a security standpoint, without hindering the ability of your employees to work properly. We?re here to help you design a BYOD strategy that makes sense for your organization. Application BlacklistingNot all applications found on the Google Play Store will have your best interests in mind. You want to ensure that your employees won?t download just any application to their device, primarily because they might accidentally expose any of business? sensitive data on their device. While you could trust that your employees won?t be downloading suspicious apps, you might be surprised to hear that these apps can be rather sneaky with how they access certain data on your device. For an example, look at the typical flashlight app. While it might need access to your camera for use of the flash, it certainly doesn?t need access to any other information, like your contacts or messages. The apps will request permissions, so you?ll have an opportunity to deny them, but it?s best to prevent this outright with application blacklisting. In general, it?s best not to download apps to your device unless they have been approved by IT. Remote WipingWhat happens if one of your employees loses their device? You never know who could find it. It could be a do-gooder who wants to return it to its proper owner, but more likely than not, it will be someone who either wants to keep the phone for themselves, or sell it to make a quick buck. From there, your imagination can run wild, dreaming up all of the worst-case scenarios. A hacker could steal information about your business from it, or someone could steal the identity of your employee, putting the rest of your organization at risk. Remote wiping dodges this bullet by eliminating data on the device when it is lost or stolen. User Access RestrictionNot all users need access to the same information in order to do their jobs properly. For example, your human resources department might need access to sensitive information, like dates of birth or Social Security numbers, but the typical user certainly doesn?t. On the other hand, only accounting needs access to bank account routing numbers and other financial credentials. You need to make sure that your BYOD policy implements such solutions to ensure that sensitive information isn?t available to just any employee. This means that anyone who loses their device will only give the device?s finder access to any information they were privy to in the first place. While it might only be a small consolation to consider, it?s certainly better than […]

Save Time and See Results with Managed IT

Enter outsourced IT, the perfect solution to free up time so you can get back to doing what you do best, leading your company to economic security. How much time exactly will outsourcing your IT save you? That all depends on how involved you currently are with managing your company?s IT. The best way to put a hard number to this is to analyze the individual IT tasks that you?re currently overseeing. Then, once you?ve listed these tasks out, compare the results with the services provided by an outsourced IT company like White Mountain IT Services. The IT services that you can outsource to us include: Unlimited remote and on-site support Active Directory administration and maintenance File, folder, and share administration Security administration Network policy enforcement and administration Managed anti-virus and spyware monitoring, maintenance, and removal Backing up data as often as every 15 minutes Backing up open documents without interruption Restore deleted or corrupt files quickly Automatically protect your organization from inappropriate workplace content Intrusion prevention to stop hackers before they reach internal servers and desktops Protocol control to reclaim network bandwidth from applications that normally evade firewall rules If you?ve got a hand in managing even some of these basic IT tasks, then imagine what your schedule would look like if you didn?t have to touch these tasks ever again; or, anything on this list for that matter. By going this route with your IT, the amount of time you will save, even by eliminating only the small maintenance tasks on your day, will add up to a significant portion of time that you can invest in more lucrative endeavors. At the end of the day, you as a busy business owner must take an honest look at your situation and ask, is IT your responsibility, or are you trying to run a business? Freeing up the time your schedule longs for is as easy as making a phone call to White Mountain IT Services at (603) 889-0800. Don?t delay, call us today!