Recent Blog Posts
The responses we?ve seen over the years is either employers trying to curb it by supplying company devices, or nixing mobile devices altogether. Both of these options have some serious side effects that must be taken into consideration. I?ll Just Issue Business-Approved Mobile DevicesDepending on the kind of work your employees do, this might be a good perk. You can take serious considerations into the platform (iOS, Android, Windows), contract terms, and how the company will control and protect its data. You can also map out how you will separate work from personal use on the device, clearly lay out what you can do and what the employee can do, what happens if the device is lost, what happens if the employee quits, etc. The problem with this method is that it?s often seen as a quick fix. Throwing money at this problem and forcing employees to use work-issued devices won?t solve the problem of controlling data without putting together the plan. Plus, while statistics do show that employees aren?t necessarily unhappy with corporate devices, if they feel strong-armed into using a device, the staff who were using their own devices to actually work harder and more effectively might feel slighted. That said, other employees might like the idea of getting a new smartphone on the company?s dime. It?s really going to depend on your employees and company culture. I?ll Just Ban All Mobile Devices in the WorkplaceIt?s a big ultimatum: no email access, no file access, no messengers, no note-taking, no mobile devices, period. Anyone caught using a personal device will be penalized or written up. You?ll certainly protect your data this way. Chances are though, you?ll also create agita with staff who were really just trying to do their jobs better. Employees won?t think about the ramifications of lost data, they will just think their boss is making it harder for them to be effective. Fortunately, most employers haven?t resorted to this, but it still happens. Beyond just stirring up emotions, this can drastically set your company back compared to competitors that are welcoming mobility and benefiting from it. It Sounds Bad, But There are OptionsThere is a middle-ground between banning devices altogether and enforcing company-issued devices. Policies can be put in place that protects company assets like email and access to data while respecting the privacy of your employees. Employers can push policies – like enforcing users to set up passwords, patterns, or pins to log into the device, grant the ability to revoke access to email, and even wipe the device remotely if it is lost or stolen. Personal laptops can be granted company antivirus and remote monitoring, or better yet, employers can offer a VPN or hosted desktop solution so they won?t have to worry about the state of the device. The latter can also address other needs such as software licensing and accessing company data while on public Wi-Fi. White Mountain IT Services Can HelpThe best way for a business owner to handle mobile devices in the workplace is to implement a BYOD strategy–one that addresses every security risk while enhancing all the benefits of mobile technology. Every business is different, which is why it?s best to have a consultant like White Mountain IT Services work with you to develop a BYOD strategy that?s tailored to enhance your company?s goals. […]
This blog focuses on the most recent version of OneNote: 2016. Older versions might lack some of the same features, so if you are running an older version of Microsoft Office, it might be time to consider an upgrade to a more recent version. The BenefitsOneNote was designed with the intention of providing businesses with a tool to foster collaboration. You can save your Notebooks on either your local network drive or to Microsoft?s OneDrive cloud. You can then share these Notebooks with other users within your organization, allowing users to collaborate on projects and share notes through a virtual environment. OneNote might not be able to create a myriad of documents like the other Microsoft Office apps, but it can be described as the ultimate highlight reel of the other Office 365 software. You can write, build simple tables, display charts and graphs, and draw on documents. Just keep in mind that it won?t be useful enough to completely replace the features of these other Office 365 apps. Note-Taking CapabilitiesOneNote offers many features that allow you to create notes and organize information. When you create a Notebook, you can divide it into tabs, and further divide them into pages. There are even pre-made templates online that you can use. Alternatively, you can create your own template that best accommodates your specific needs. Your notes can even include more than just simple text. OneNote lets you take clips of web pages and directly insert them into your note. OneNote also allows for the pulling of text directly from images. All you have to do is right-click them, or search for the text that appears in the images. You might be surprised by how accurate this search function can be. This is very handy when taking photos of physical documents and business cards. OneNote even supports handwritten note-taking with the ability to convert it into a font-based text. It also has a great math function. This allows you to type or draw out a simple equation. It can then convert them to text and solve them. You can also format your pages to suit your specific needs. Alongside this, OneNote offers functionality that allows you to link content on one page to other OneNote locations for quick and easy access. In terms of security, notes can be assigned password protection, which means that only those who are given this privileged credential can access them. It?s clear that OneNote is great for any business environment, but how are you using it? Do you currently have OneNote installed, or are you hoping to take better advantage of it in the future? Let us know in the comments, and be sure to subscribe for more great information on SMB technology.
VirusesViruses are pieces of code that infect your system and cause many issues, ranging from being mildly irritating to particularly dangerous. Viruses can cause system slowdown and many other problems with performance, or can open you up to data theft and major downtime issues. A solid security software like an antivirus solution can be sufficient to keep most viruses out of your infrastructure, but more advanced threats will be more crafty in their exploitation of your organization?s weak points. MalwareJust like viruses, malware, or ?malicious software,? infects a system to perform various functions. Variants like spyware can be used to watch your every move and capture keystrokes, while ransomware can be used to lock down your files and extort money from your organization. Either way, malware is problematic, and you?ll want to take steps to prevent infection in the first place. SpamSpam messages are both annoying and wasteful, but more than anything else, they are dangerous for your organization. Spam is the preferred method of spreading threats like viruses, malware, ransomware, and phishing scams, primarily because messages can be sent to countless users at the same time. While some email providers will have measures put into place to mitigate the threat of spam, you want your own secondary solutions that further protect your assets from messages containing infected attachments or malicious links. Phishing ScamsHackers and identity thieves will often try to steal data from organizations or even individuals through targeted attacks designed to harvest credentials. They will pretend to be reputable individuals from organizations that your business might have dealings with, or they will take the identity of someone you might know from your personal life. Either way, they will try to use who you know against you to steal sensitive information, like financial credentials, personally identifiable information, or login information for online accounts. The best way to avoid getting tricked by these scams is to brush up on the giveaway signs, such as poor spelling in messages, out-of-the-blue outreaches from the sender, unexpected urgent final notices, and more. White Mountain IT Services can help you ensure your staff is trained on how to identify these scams. CEO FraudAn increasingly popular trend, called ?whaling? or CEO fraud, occurs when a hacker takes on the identity of someone with authority within your organization, like the CEO or other members of the C-Suite. These types of schemes often present themselves in the form of an email appearing to come from a legitimate source asking for something like a wire transfer of funds. In these cases, the recipient of the message doesn?t necessarily want to question authority, and will instead comply with the request. If this occurs within your own organization, take a moment to reach out to the sender via their official telephone number that you have on record, or by dropping into their office for a quick chat regarding the message sent. It could save you from accidentally transferring huge sums of cash to a hacker. How do you protect your business from the many threats found online? White Mountain IT Services can help you implement powerful security solutions, like Unified Threat Management, to keep your digital assets safe from the majority of threats. To learn more, reach out to us at (603) 889-0800.
A classic example of this is seen when procuring new technology. There?s a reason why some laptops cost $200 while other models run $2,000. When buying computer hardware, the more money you?re willing to invest will get you technology that?s more reliable, more powerful, and provides better functionality. Short term decision makers will experience sticker shock when encountering high-end equipment, causing them to gravitate toward inexpensive models. While a move like this may save some cash at the time of purchase, long-term thinkers know better. Managers that choose to spend extra on hardware do so because they know it?s well worth the expense. When you go with technology that?s reliable, your company experiences significantly less downtime, which quickly adds up. When workers can?t do their jobs, that lost time equates to time that can?t be billed. When one considers such a discrepancy, it doesn?t take much in the way of downtime prevention to cover the financial gap between cheap hardware vs equipment that?s more reliable. The same logic can be applied to how technology affects employee productivity and morale. By going with inexpensive hardware for the sake of saving a few bucks, you?ll end up equipping your staff with equipment that?s not as reliable, and as such, may even experience frequent breakdowns. Now, a short-term thinker may not see this as a big deal and just expect their workers to suck it up and appreciate the tools they?re provided for doing the job they?re being paid for. Whereas a long-term thinker understands how equipping staff with reliable technology can dramatically benefit the bigger picture. InformationWeek explains, ?better devices lead to higher productivity and morale. According to a UK survey, more than two-thirds of workers felt negatively about their workplace, in part due to outdated technology and practices, with the average worker being frustrated with office tech around three times per day.? Considering just how much more productive an employee is that feels positive about their job, as well as the absurd cost of employee turnover, it?s clear why long-term thinkers don?t think twice when it comes to paying extra for procuring reliable technology. Of course, this same money-saving principle applies to how your business goes about the maintenance of its IT systems. If you view your company?s technology as an expense, then you?ll spend your money fixing problems as they crop up, which can quickly add up. Whereas long-term thinkers view their company?s technology as an investment, which translates to being proactive about IT maintenance and preventing problems before they surface. In the end, this long-term approach saves companies significant time and money, and that?s a decision everybody can feel good about. To learn about how managed IT services from White Mountain IT Services can benefit your company in the long term, call us today at (603) 889-0800.