Recent Blog Posts
While security experts tend to focus the brunt of their discussions on desktop OS vulnerabilities, there are plenty of mobile malware threats that fly under the radar. One such malware is called Hummer; a trojan that installs unwanted apps and malware on a device, and can be found on over a million phones worldwide. About HummerThe Hummer malware family has increased over the past year. At its peak activity, Hummer infected nearly 1.4 million devices every day. It?s thought that Hummer originated in China, and it has been known to infect over 63,000 devices daily in China alone. Granted, the spread of infections has dramatically decreased, but this hasn?t stopped Hummer from infecting about 1,190,000 devices. As reported by TechRepublic, here are the top five countries and the number of devices that are infected by the Hummer malware: India: 154,248 Indonesia: 92,889 Turkey: 63,906 China: 63,285 Mexico: 59,192 What It DoesHummer roots devices that it infects, which can unlock the operating system and allow for administrator privileges. Once it has infiltrated the device and unlocked it, Hummer will install malware, unwanted applications, games, pornographic applications, and other malicious and annoying programs. Since Hummer roots the device, your traditional antivirus and anti-malware programs aren?t going to be enough to get rid of it. Yet, perhaps the most dangerous part of this malware is that you can?t uninstall the unwanted apps. Well? you can, but the trojan will just reinstall the apps, which is both frustrating and a terrible use of your mobile data. Cheetah Mobile ran a test on the Hummer trojan and came to some shocking results: “In several hours, the trojan accessed the network over 10,000 times and downloaded over 200 APKs, consuming 2 GB of network traffic.” It?s clear that you don?t want this malware installed on your device, as it could jack up your phone bill and become an immense annoyance. How to Fix ItTo make matters worse, wiping your device won?t even be enough to get rid of the trojan. Cheetah Mobile claims that the factory reset won?t remove it. Users could also flash their device, but this can get complicated, and we don?t recommend doing so if you have no clue what you?re doing. Hummer isn?t the first mobile malware, and it certainly won?t be the last. Users of smartphones have to be just as cautious and vigilant as desktop users. To learn more about mobile malware and other threats, reach out to us at (603) 889-0800.
This year, for the month of June, the total number of gamers using Windows 10 for Steam, in both 32-bit and 64-bit format, reached 44.6 percent. This presents an increase of 3.41 percent from the previous month, and a 1.54 percent increase from the month before that. It?s safe to say that Windows 10 is ?picking up steam,? so to speak, but it seems that the free* upgrade is likely playing into these gamers? decisions to make the upgrade to Microsoft?s latest operating system. And, well, why wouldn?t it? Gamers want to take advantage of this opportunity to improve their experience while they still can. *FREE WINDOWS UPGRADE EXPIRES THIS FRIDAY! Of course, not all Steam users utilize Windows 10. 36.97 percent of Steam users have Windows 7 installed on their PCs, which is down 2 percent from last month. Windows 8 and 8.1, however, make up about 12 percent of Steam users. Altogether, Windows users account for about 95.5 percent of gamers on Steam, while OS X retains about 3.6 percent, and Linux snags a paltry 0.8 percent. Whether you?re a gamer or not, there?s no denying that there?s at least one lesson to be learned from these statistics, and it?s that the latest operating system for your Windows computer is needed if you want to get the most out of it. Gamers are often known for their meticulous attention to PC performance and specifications, so it?s no surprise that we see such a huge increase in Windows 10 statistics concerning PC gamers. If anything, this should be a testament to how valuable the latest software solutions can be for your business?s workstations. Gamers take their hobby seriously, and they want only the best and brightest way to experience their entertainment. Why shouldn?t you try your hand at experiencing greater productivity and efficiency with Microsoft?s latest operating system? If you haven?t yet upgraded to Windows 10, the fact remains that it?s a great operating system that can keep your business running throughout the near and not-so-distant future. White Mountain IT Services?s technicians can help your organization implement it in the best way possible. It?s important that you assess your current needs and ensure that Windows 10 is compatible with your legacy applications and software solutions. In this scenario, it?s best to have the expertise of a professional to lean on. To get started, reach out to us at (603) 889-0800. And who knows? Maybe Windows 10 will help your business achieve its next high score.
Why You Need Backup and Disaster RecoveryEvery organization should have a sound plan to recover any data that?s lost due to unexpected disasters. It?s been proven that organizations that fail to recover lost data within 7 days of the incident, typically go out of business within one year. There are many reasons why data backup and disaster recovery solutions need to be implemented. Here are just a few of the threats that could uproot your business and disrupt operations. Natural disasters: Floods, fires, electric storms, tornadoes, hailstorms, and so on, all have the potential to not only destroy your physical infrastructure, but also your business?s data. Therefore, if you?re in a region that?s prone to extreme weather conditions, you need to consider backup and disaster recovery. Cyber attacks: Data breaches are well-known culprits of data loss. It?s not easy to predict what a virus or malware will do, but most often, they?re designed to steal your data, delete it, or lock it away until a ransom is paid. In all of these cases, it?s best to have your data backed up so it can be safely restored. User error: The biggest threats often come from those who are supposed to have access to your data, not just those who don?t. If an end-user accidentally deletes a file, moves it somewhere it doesn?t belong, or hands over credentials to a hacker on accident, your data is put at risk. Hardware failure: The inevitable part of working with technology is the fact that it will eventually fail and be rendered obsolete. This can happen when you least expect it, and the costly downtime can be a major setback for your business – not to mention the data that could be lost if a server were to go down. What You Should Look ForNot all backup and disaster recovery services will be the same, nor should they be. You need a solution that?s customized to meet the specific needs of your business. Here are some of the best features to look for in a BDR solution, and why they?re critical for the continued functionality of your business. Cloud and off-site backup: You don?t want to store your data backups on in-house tapes. Rather, you want them secure in an off-site location, like the cloud or a data center. This way, you can know that your data is stored in a compliant location that can?t be damaged by natural disasters. Quick recovery time: You want to be able to rapidly deploy your business?s data to your infrastructure in order to minimize downtime. Tape backup can make this part of the recovery process long-winded and wasteful, but BDR can automatically deploy your data through the cloud, making recovery practically instantaneous. Comprehensive backup: Furthermore, you want to make sure that your data is as recent as possible. Tape backup is inefficient for this purpose, while BDR can take backups of your data as often as every fifteen minutes – maybe even more often. For more information about BDR and business continuity, contact White Mountain IT Services at (603) 889-0800.
Data leakage is a primary concern for any business using employee-owned mobile devices in the workplace. Every business has sensitive information that cannot be exposed under any circumstances, and it?s the business owner?s responsibility to make sure that policies are put into place to protect this data. A study by Bitglass reveals that 72 percent of many different types of organizations, including financial, technology, healthcare, government, and education, believe that BYOD should be supported for at least some of their employees. In terms of mobile device management, however, only a meager 14 percent of these organizations use some way of protecting corporate data with device encryption. This is a significant disparity, and one that should be considered when your organization implements a BYOD strategy. You can?t allow your business to be the next to fall victim to mobile security threats. With a mobile device management solution from White Mountain IT Services, your business can have full control over the devices that your employees want to use for their work roles, as well as the flow of data that?s stored on them. Below are some of the many features available for a mobile device management solution: Whitelisting and blacklisting apps: Some applications will request access to information stored on a mobile device, but some won?t have any real reason to have access it. For example, a flashlight app has no business accessing your phone?s contacts or geographical location. By whitelisting and blacklisting apps, you can minimize your data?s exposure to threats. Role-based user access: One of the easiest ways to minimize danger to your organization?s data is to limit who has access to it. By integrating role-based user access, you can allow your team to access data that they need to do their jobs properly, and keep them accessing that which they don?t. Remote wiping: Sometimes the best way to prevent a data breach is by remotely wiping data from a lost or stolen device. You shouldn?t rely on the device showing up, especially if it were left in a public place like a bus or subway station. You should always be prepared for a worst-case scenario like this. For more information about BYOD and our mobile device management solution, reach out to White Mountain IT Services at (603) 889-0800.
Imagine this scenario; you have your entire IT infrastructure hosted in the cloud, including your mission-critical applications and data. This information is required in order for operations to continue. Now, imagine that your local Internet service provider has suffered a catastrophic outage for your region due to some unforeseeable circumstance. Now, your office is left high and dry with no Internet access. This presents a problem with no clear resolution, especially if most of your infrastructure is only accessible via the cloud. Unless you also have a backup of your infrastructure stored locally on your in-house network (which isn?t a bad idea), you won?t be able to access any information stored on the Internet. One simple way to bypass the problems associated with a downed Internet connection is to equip your office with 4G-enabled laptops or smartphones that can act as temporary hotspots. However, if you do this, you better be sure that your phone carrier supports this immense amount of data expenditure. In many cases, it?s better to just let your team work remotely if they?re capable of doing so. The most reliable choice would be to have any team that can work remotely do so until the problem is resolved. Working remotely during the incident might be a valid opportunity to eliminate downtime associated with your Internet access. As reported by ZDNet, ?It’s true that businesses are increasingly allowing for remote work and disaster planning is a good argument for it. It may even be worthwhile as an exercise. Require employees to have a plan for working offsite and schedule a day for everyone, or perhaps one department at a time, to do so. You might learn something about productivity while you’re at it. 9/11 proved that it’s possible your offices may be out of commission for a while. Do you really want to have to make up your plans on the spot when that happens?? If your business needs help implementing technology to keep your team connected at all times, you can count on White Mountain IT Services to find a solution. We can work out ways to help your employees access information regardless of the circumstances, all so you can keep downtime to a minimum. Furthermore, we can provide your business with the technology solutions required to ensure that your team can work off-site when needed. For example, a virtual private network (VPN) allows your team to securely access your business’s sensitive information from any wireless connection, allowing your team to access mission-critical files even if the in-house wireless network is down. If you?re concerned about not being able to communicate with your team while they?re off-site, we can make it much easier by helping you implement a unified communications solution that?s designed to work seamlessly, as long as you have an Internet connection. You can communicate in real time with both instant messaging and Voice over Internet Protocol telephony solutions that will make you feel like your team is right next door, even if they aren?t. For more information about how White Mountain IT Services can help bring your business back from the brink of downtime, give us a call at (603) 889-0800.