Recent Blog Posts

5 Tips to Minimize the Risk Associated With Mobile Devices

BYOD is a great new trend that can improve innovation, employee morale, and the productivity of your staff. This is only true, though, if you approach BYOD in a safe and secure way that manages to contain and control the flow of your business?s data. Implementing such a plan isn?t easy, and there?s much that needs to be checked off before you can confidently start using BYOD. There are several factors that need to be considered before implementing your own BYOD strategy. Identify potential risks: The first step to integrating a BYOD plan is to identify what parts of the plan can pose a problem for your business. Where is there potential for data leakage to external parties? More often than not, your team will be using devices that they already own, so it?s important that your organization doesn?t run into security discrepancies. Define a clear BYOD policy: If you?re going to implement BYOD, then you need to map out a complete plan that encompasses your entire infrastructure. Consider why you?re implementing BYOD in the first place. Is it to improve workplace productivity, or is it to make your network more mobile? Whatever the reason for your BYOD policy, it should be designed to optimize your goals. Consider regulations and compliance issues: Certain data needs to be protected and secured from hackers, or else your business will become the target of major fines from violating PCI, HIPAA, and other compliance regulations. This means being prepared to deploy your business?s information in such a way where this data is at minimal risk. Keep track of used devices: You can?t have devices entering and leaving your network on a whim. If your team is going to be bringing their own devices to use for work, you should keep track of who brings in what devices, and how they are accessing data stored on the network. Train your staff: Perhaps most important of all is that you take the time to properly train your staff on what it means to bring their own devices into the workplace. You should be clear that, if they?re going to be using their mobile devices, you expect them to make intelligent decisions about how and why they use the data stored on these devices. Regardless of how you decide to implement BYOD, there will be a couple of technologies that you won?t want to leave behind. For example, a mobile device management solution is a great way to limit access to information on the company network, while allowing you to remotely wipe devices that may be compromised, lost, or stolen. Another technology crucial to allowing your team to get the most from BYOD is cloud computing, which lets them access important information and applications via the Internet from any approved device. If your business is ready to take on the challenge of implementing BYOD, White Mountain IT Services would be happy to help. Give us a call at (603) 889-0800 today to get started.

Adopt These 3 IT Concepts to Ensure Future Success

Be Future-Minded and Appreciate TechnologyFirst off, you?re going to have to come to grips with the importance of being future-minded regarding your company?s technology. For business owners who don?t specialize in or oversee their technology, this can be a difficult mindset to adopt, especially if you purposely avoid it in order to focus on other aspects your company. Just because you?re primarily tasked with overseeing the administrative side of your business, doesn?t mean you can afford to ignore your tech. Otherwise, you?ll look around one day, only to discover that you?ve got an office filled with outdated IT equipment. Todd Nashville explains to IT Knowledge Exchange: Don?t get into a rut and get too comfortable. The IT field is forever changing and changing faster than ever before. It?s easier to stay current with technology than trying to play catch up after many years of being stagnant. That learning curve can be hard to overcome. Be Equipped for Future IT NeedsIn addition to keeping up with IT trends, you?re going to want to predict your own company?s growth and IT needs, within reason. Having a good grasp of where your business will be in one, two, or even five years will make it so you can implement the right technologies for the future, today. For example, if you have a good idea of approximately how many users and devices your business will have five years from now, then you can purchase and implement an IT infrastructure with that will have enough open access points to accommodate such growth. Otherwise, growth will find you unprepared and you?ll have to upgrade your infrastructure at the worst possible time, and most likely be hit with a major, unplanned expense. White Mountain IT Services offers IT consulting to companies just like yours in order to best prepare them for future growth and IT trends. Be Prepared for Future Security ChallengesJust as technology is always changing and benefiting business in new ways, so too are the security threats that challenge these new technologies. Network security is something that you?re going to need to stay on top of; it?s not a task that can be completed and forgotten about. Take for example one of the hottest IT trends for businesses, the Internet of Things. In order to take full advantage of dozens, hundreds, or even thousands of new devices accessing your network, you?re first going to want to have in place every network security measure possible. Todd Nashville explains: Without strong authentication, firewalls, and other measures, we are heading for a heap of trouble. The more devices we add, the more vulnerable we become. To support all the various types of devices, we should have some standards. Modifying our connections so each new device will work is a major obstacle. By preparing your company in these three areas, you will be equipped for anything the future throws at you. Of course, having White Mountain IT Services guide you through any and every upcoming IT challenge will go a long way to ensure your company?s success. Give us a call today at (603) 889-0800 to learn more.

Tip of the Week: Use This Chrome Extension to Automatically Refresh Your Browser

Install Super Auto Refresh This is done through the free extension Super Auto Refresh. It?s a great way to save yourself from having to click refresh a million times. You can download Super Auto Refresh in the Chrome Web Store by going to the above link and then selecting + ADD TO CHROME. Once the extension is downloaded and installed, an icon for it will appear at the far right side of Chrome?s address bar. By clicking on it, a drop down menu will appear. Next, you?ll be able to select how often you want the page to be refreshed. It can be as little as every two seconds, to as much as every 60 minutes. When you reach a point where you?re done having your browser refresh itself, simply click the Super Auto Refresh icon again in the address bar, and then select the red Stop tile at the top of the drop down menu. An additional feature of Super Auto Refresh is that it allows you to easily manage the various tabs that you have the extension activated on. Online Tech Tips explains how to do this: If you click on the little green hamburger icon to the right of the word ?Refresh,? a new tab will load that will list out all the pages that are currently set to refresh along with the set time intervals and the amount of time remaining before the next refresh. Note that if you close a tab and then reopen it later, the extension will remember and apply the same refresh settings. We should also mention that a page with Super Auto Refresh activated on it only applies to that particular tab. Other open tabs won?t be automatically refreshed unless the extensions is activated for that tab. Therefore, you can easily open a new tab that?s unaffected by Super Auto Refresh by selecting the hamburger icon > New tab. For more great tips to help you do more with your technology, subscribe to White Mountain IT Services?s blog and check back every week! DISCLAIMER: Constant refreshing will eat up your bandwidth, so be mindful of this when using Super Auto Refresh on your company network.

How to Make Your Network Ideal for Telecommuters and Remote Workers

Most of the benefits of working remotely come in the form of reduced expenses. For example, you don?t have to purchase as much hardware, and your energy costs will dramatically decrease. Considering how much energy it takes to heat or air condition your office, and the amount of electricity the average workstation eats up, you could be looking at significant savings. Plus, giving your employees the choice of where to work can be empowering, pushing them to work harder and improve the quality of work. Granted, this can only happen if your team is equipped with the technology to handle their daily workload. Here are three technologies that your team needs if you want to ensure that they can perform to your specifications. Virtual Private Networks (VPN)One major pain point for remote employees is that they have trouble accessing files and applications stored locally on your company?s network. Since these employees work off-site, rather than in your business?s office, they?ll have trouble accessing files through the traditional method. Being unable to access critical files can be troublesome, but it?s not incapable of being resolved. Using a VPN allows remote employees to securely access files and applications that are stored in an online company network, which promotes productivity without sacrificing security. Another huge plus is that you control the access to files, preventing critical company data from being spread across on your employees? personal devices. Cloud-Based Applications and VirtualizationIf you share your business?s data in the cloud, you can deploy files, information, and applications directly through the Internet. This helps employees access information that would otherwise be difficult to access. The cloud in general is great for minimizing your IT footprint, and with improved data deployment, you can let your team work from anywhere in the world. Even if they?re on business trips or traveling, as long as they have an Internet connection, they?ll have access to data that they need to do their jobs. Voice over Internet ProtocolCommunication is critical while in the office, but it?s even more so for your remote workers. If your team is constantly making outbound calls, you need a solution that will allow them to do so while retaining your business?s phone number. Furthermore, if you?re ever in a position where you need to contact them directly, you should be able to do so through email, instant messaging, or a phone call. While email and IM are easy enough to accomplish through a PC, phone calls are a bit trickier. With a VoIP solution, you can transfer your voice over the Internet, which makes instantaneous communication even easier for both voice and video chat. If you?re going to let your team work remotely, it?s your responsibility to ensure that they have the tools to do so. To find out how you can make this vision a reality, contact White Mountain IT Services at (603) 889-0800 today.

New Technology From LG Lets You See What a Bowling Ball Sees [VIDEO]

The LG Rolling Bot is actually pretty neat and is capable of many different feats remotely. It works by connecting to your home or office WiFi connection and is controlled via a smartphone app. Through your device, you can see what the Rolling Bot?s camera sees, and hear what the bot hears. This makes it great for a roving security tool, but you can also speak through the app as if you were there. Furthermore, the LG Rolling Bot can connect to and interact with other smart home appliances via Bluetooth. This is great in some cases, as it lets you turn off devices if you?ve accidentally left them on. Perhaps one of the most fun features of the LG Rolling Bot is its laser pointer. You can use it to bother your pets while you aren?t there. In general, it looks like the LG Rolling Bot will be able to change the way that you handle pet sitting. By using its camera to wirelessly monitor your cat, dog, or other pet, you can ensure that they?re both safe and entertained. Using the voiceover feature can let you communicate with them even when you?re not there, which might be fun for you, but confusing for them. You can see the LG Rolling Bot in action in this video from DigitalTrends: Of course, you also need to take into consideration the security issues that come from using such a device. By using your home or office WiFi, the device can potentially be put at risk of encountering dangerous malware or viruses. If this happens, it can be hacked like any normal Internet-connected security camera. Granted, there isn?t much that a rolling device like this can do, but the real issue that comes from this is how unsettling it can be to unknowingly have someone watching your home and your family through the device. On the other end of the controls, what if your smartphone were to get hacked somehow? Hackers could remotely control the device, watching, listening, and potentially even speaking through the app?s controls. There have been horror stories of devices like baby monitors being hacked too, so there?s a precedent set for this type of vulnerability. This is a common problem with many Internet of Things devices. They might have great capabilities, but if they?re compromised somehow, they can be exceptionally dangerous. In many cases, the devices aren?t necessarily threatening, but the possibilities for them to be tampered with shouldn?t be ignored. Now, it?s time for the real question that we want answered: how is the LG Rolling Bot going to handle stairs?