Recent Blog Posts
As it turns out, two-factor authentication may provide an answer. MasterCard wants to implement biometric-based two-factor authentication to improve security and cut down on false-positive transactions. The system in question utilizes a ?selfie? taken by the user through a mobile application. The image is then compared to an image that?s stored, and if it?s similar enough, it will authenticate your identity. There are also other methods of biometric technology that are being used to help prevent credit card fraud, such as fingerprint scanning. However, security isn?t the only way that this biometric authentication improves the user experience. MasterCard wants to cut down on the number of legitimate transactions that are being declined while users are traveling abroad. This is a problem larger than even credit card fraud. As reported by The Financial Times, there?s roughly $118 billion worth of false declines every year, which is considerably more money lost than is the case with credit card fraud–13 times more, to be specific. It?s thought that biometrics can be implemented to cut down on the amount of false declines and credit card fraud. Granted, the question that needs to be answered is whether or not these technologies can be trusted to secure personal devices. Phones, tablets, and other mobile devices are known to get hacked just like any ordinary desktop computer. ITProPortal offers some insight into what will be necessary for mobile payment systems to take off: ?User devices are notoriously prone to penetration by cyber criminals ? whether that?s as a result of users adapting their devices or overriding device security parameters, or using non-secure public WiFi when transacting online. Which means biometric data will need to be encrypted to ensure it cannot be stolen ? otherwise we open a whole new vector for identity theft. What?s more, rigorous PCI standards already exist to protect users and merchants, especially where liability is concerned should things go wrong. What?s not clear in this scenario is whether liability will shift ? and to whom. Quite simply, we?re in new territory here.? One of the more interesting parts of this quote is the liability aspect. If a user isn?t securing their mobile device and is using it for payment, are they at fault if their financial information is stolen or lost? If so, this could change the way that financial institutions and payment compliance functions. In particular, biometric hacking could become a major problem, and you can?t issue a new face or fingerprint like you would a new credit card number. Therefore, it?s crucial that you take measures to ensure the safety of your mobile devices, especially if you plan on using them for two-factor authentication. What are your thoughts on mobile payment authorization using a selfie-based system? Let us know in the comments.
Doze helps your phone retain more battery life by disabling an application feature known as wakelock. Wakelocks keep the device from entering an energy-conserving sleep mode, as this mode can interfere with applications and device functions. Wakelock was initially meant for use with fitness trackers and other applications that need to function while the screen is deactivated. However, app developers took advantage of wakelock for all of their applications–including those that are notorious for being battery-killers with their near-constant notifications (like Facebook). The user functionality that wakelock was meant to achieve was spoiled thanks to these app developers, which essentially nullifies any power-saving capabilities of this deep sleep mode. Doze seeks to resolve this problem by disabling wakelock and network access once the phone hasn?t been used for a while. Doze keeps your applications from draining your phone?s energy while still allowing the apps to periodically update during ?maintenance windows.? Android has provided users the ability to customize their Doze settings, allowing the user to decide which apps are affected by the feature. To access this customization: Open Settings. Navigate to Battery. Select Battery optimization from the Menu button. Select All apps from the top-of-screen drop-down menu. Doze will automatically affect most of your applications by default in order to optimize the battery. However, if there?s an app that you don?t want to connect to Doze, you can always switch the setting to Don’t optimize. Doze also has third-party apps that are designed to automatically customize their functionality. For example, Doze Settings Editor can turn Doze off when the phone moves a certain distance. Keep in mind that this particular app only works with Android Marshmallow, though. All of this additional battery life will surely be able to provide you a better user experience. What do you plan on doing with all of your extra battery life? Let us know in the comments.
This move toward mobility is designed to replace the department’s current IT infrastructure, known as EDUCATE (Education Department Utility for Communications, Applications, and Technology Environment). EDUCATE was implemented in 2007 by Perot Systems after they won the bid for $400 million. At the time, this was a bold move because it effectively transferred oversight of the infrastructure from the government to a contractor. Today, the U.S. Department of Education has a new set of priorities that they would like to see out of their infrastructure. According to Jason Gray, Chief Information Officer for the Education Department, the technology landscape has changed so much since 2007 that a revamp is in order. Gray says that these new infrastructure objectives should encourage innovation, optimize the cost to benefit ratio, and show flexibility to make integrating changes in requirements simple. These objectives are spelled out in a new infrastructure plan named PIVOT (the Portfolio of Integrated Value-Oriented Technology). Unlike the previous model, PIVOT looks to have each aspect of the infrastructure (like oversight, hosting data, printing, network services, technical management and integration, and mobile services) written up with its own contract. The primary goal of the Department?s new infrastructure is increased mobility. They look to achieve this by moving away from a permanently established office space, and instead, take advantage of teleworking and hoteling (where workers use mobile devices to move about an office instead of being limited to their desk). This kind of move is in line with a federal government initiative to reduce its real estate footprint. In keeping with this goal, PIVOT has the potential to free up 6,200 workers from the traditional office environment. There are lots of benefits to be had by the U.S. Department of Education from a move like this. What about your own IT infrastructure? Has it been updated in recent years to take advantage of the advancements of mobile computing? Or, are you still doing business like it’s 2005 with a workforce tied to their desks and limited to bulky workstations? To revamp your own IT infrastructure, give White Mountain IT Services a call at (603) 889-0800 and find out what we can do for you.
Data backup and disaster recovery are critical to the success of the modern business, but so many organizations still don?t see the importance of maintaining copies of their data infrastructure, or simply don?t think that they will fall victim to a data loss incident. Unfortunately, in this case, we have to insist that you consider data backup and disaster recovery; it?s not a matter of if you lose your data, but when. The reasoning is simple; there are situations that, like it or not, are beyond your control. You alone can?t stop your office from being flooded by a freak rainstorm. You can?t always prevent a sudden and unexpected hardware failure from bringing down mission-critical systems. You can rebuild your office after an earthquake, but the data that?s lost from the catastrophe can?t be recovered without the help of a data backup system. Plus, user error is a leading cause of data loss, but no matter how many times you explain best practices, someone is bound to make a mistake sooner or later. So, what can you do to keep your data safe? The obvious answer is data backup and disaster recovery, but it?s not as simple as that. Some traditional backup solutions aren?t as effective as businesses would like them to be. One of the most common data backup tactics is tape backup, which stores your organization?s data on magnetic tape reels that are deployed in a time of need. While this method of data backup and disaster recovery was once the standard, it?s no longer the most efficient way of storing and recovering your critical data assets. In short, tape backup has the shortcomings of being both user-intensive and time-consuming; two ill-suited traits for a business that needs to think on its feet in the event of a disaster. Furthermore, tape backups are resource-heavy and often must be performed after-hours, and if someone forgets to set the tape, you could lose out on a whole day?s worth of data. If you want to ensure the continued survival of your data, look for the following traits in a data backup and disaster recovery solution: Frequent backups: Unlike tape backups, which are typically performed once at the end of the workday, you want a solution that lets you take backups as often as every 15 minutes. This helps to minimize the amount of data lost due to unexpected technical hiccups. Off-site backup storage: If you store your data backups in-house or on your company network, you?ll likely lose them, along with all of your other data, if an event were to cause its destruction. Therefore, you want to store your data in a secure, off-site location, and in the cloud for anywhere access. A fast recovery time: You don?t want to be waiting around while waiting for your data to be redeployed to your entire infrastructure. With BDR, you can be back in action almost instantaneously. The BDR device acts as a server while you work towards replacing it. If your business wants to fully leverage a modern data backup solution, you should invest in a Backup and Disaster Recovery (BDR) solution from White Mountain IT Services. Our solution provides you the dynamic and reliable data backup and recovery services you need in order to ensure the survival of your business?s infrastructure. Not […]
Two problems that most organizations have with this is that either their IT department has completely maxed out its resources, or your organization doesn’t have an IT department. Since easy access to an IT helpdesk may not seem like a necessary expense for the modern office, it is often overlooked; usually, at a detriment to the organization. As more technology gets introduced, IT problems are inevitable and White Mountain IT Services?s IT services can present real value to any small and mid-sized business struggling with downtime as a result of ineffective IT. It?s a safe bet that you don?t think about most of the technology that your organization uses. Of course, you have your computers (servers and workstations), and people are always on their phones, which if they are using the network, require Wi-Fi (routers). Your average employee doesn?t pay any mind to the other parts of your network infrastructure that all come at a substantial cost and will fail at some juncture. We understand the balancing act. At White Mountain IT Services, we offer several IT-related services that hold value for any organization having problems with their IT. Our first consultation will be a complete assessment of your computing infrastructure. We comb over your technology to see that every essential component of your company?s IT is working as intended. Using the information that we gather from this assessment, we will then build a roadmap to provide you the support and innovation you need to get to where you are going. Our managed IT services package includes complete remote support of your network and computing infrastructure (servers and workstations), IT consulting, hardware and software support, vendor support, comprehensive network security, and a potentially business-saving backup and disaster recovery solution. If, after the consultation, you believe, as we do, that managed IT services can help your business see more uptime, higher degrees of productivity, and access to some of today?s most innovative technology, give us a call at (603) 889-0800. We can provide you with the peace of mind that your network and infrastructure are properly managed, so you can again focus on what?s important to you: your business.