Recent Blog Posts

Less Than 1% of Hackers Can Bypass Facelock Security App

Security using facial-recognition technology isn?t a new thing – in 2000, the Passface system used a similar concept, where it replaced passwords with a series of pictures based on your friends and family. This was somewhat effective, but those who could figure out the pattern were able to get into the system fairly easily. Facelock is a new concept of facial-recognition technology. Instead of concentrating on technology that lets you define pictures in a specific pattern, it concentrates on whether or not you can identify familiar faces. In other words, the faces you know can help you keep your system safe from intruders, rather than just being another code for a hacker to crack. Unless a hacker can tap into your memory, they probably can?t crack your Facelock password. How Does It Work?Facelock presents the user with various face arrays. It is the user?s job to identify the familiar face amongst the unfamiliar ones. These arrays can be shown in different orders with faces scattered in different positions. What makes this any different than Passface is the human mind?s ability to detect familiar faces, regardless of appearance, in different images. Even if a hacker is able to identify which picture you guessed, they are unlikely to identify the image in a different picture. What a Face-full!This technology backs up its bark with its bite. A study was done on over 400 participants, which included account holders, stranger attackers, and familiar attackers. These tests were conducted over the course of one-week and one-year increments. Account holders were asked to choose the faces of several lesser-known celebrities in a narrow field; this mitigates the chance that threats will be able to access the system. Results showed that after just one week of using this technology, 97.5 percent of users could authenticate their accounts, while stranger hackers succeeded less than one percent of the time. This number jumped to 6.6 percent for attackers that knew the victims personally. And, after a full year of working with the software, 86 percent of all users were able to authenticate. The test also examined whether attackers could authenticate with different photos of the same people. Unless the photos were of distinctive people with very prominent features, such as a bald head or round glasses, hackers were unable to identify pictures of the same people. Keep in mind, as great as this technology is, it isn?t really a good fit for business devices that may need support and troubleshooting. If your help desk technicians aren?t in your circle of friends, they won?t be able to log into your device to help you solve your problem. It?s a fairly simple concept – passwords don?t work for humans, and the existence of a ?Forgot password?? prompt reinforces this. But, does facial recognition take this a bit too far? Is two-factor authentication enough for you? Let us know in the comments.

Tip of the Week: Don?t Be Duped By These 4 Battery Myths

TechRepublic lists several of these misconceptions surrounding the smartphone battery. You might even be guilty of believing these yourself. Batteries Can?t Be ?Trained? to Perform BetterSome folks believe that you can train your battery to perform better, given enough time and conditioning. This simply isn?t true. There is no way to train your battery to perform better at a certain percentage. Therefore, if your charger is only at a meager 80 percent, there?s no reason not to top it off if you?re going on a business trip. Still, despite this fact, letting it go uncharged for a night might be of some benefit to your battery. Some people believe that leaving your phone plugged in overnight can damage the battery, so if you?re truly unsure about this, just leave it somewhere between 40 to 80 percent overnight. Off-Brand Chargers Can?t Damage Your BatteryMany people believe that an off-brand charger that you bought from your local big-box store can actually cause irreparable damage to your battery. This isn?t necessarily true. Just because the quality of the charge suffers, doesn?t mean that your battery is damaged. Since chargers aren?t made specifically for your device, it?s only natural that your phone will receive a better charge from the charger that came with it. While a $5 charger might be useful in a pinch, you get what you pay for with off-brand chargers. Using Your Phone While It?s Charging is FineWhen you use your device, it drains some of the battery power. This is why some people believe that using a phone while it?s charging will decrease the quality of the charge. According to TechRepublic, this only happens if you?re using the worst of the off-brand chargers. Instead, you should be fine using your phone while it charges. It might charge more slowly, but the quality of the charge should be around the same as if you weren?t using it. Besides, even when you aren?t using your phone, there are processes that continue running in the background, eating away at your battery. Why not use a little more and be productive at the same time? Give Your Phone a Break and Turn It OffLike any other device that takes advantage of a lithium-ion battery, it?s a good idea to turn off your phone once in a while. If you think about it, there?s nothing bad that can come from giving your battery a break; the reason people might feel this way is because the battery drains while it?s off, but that?s only natural for batteries. In fact, turning off your device is good for its battery, not harmful. Are you guilty of believing any of these misconceptions? Let us know in the comments.

Upgrading Technology: You Can?t Have IT Both Ways

Despite this commonsense approach to technology, many business owners hesitate to drop extra money on quality equipment. Here are three reasons why. Sticker ShockFact: New technology is expensive. We totally understand this pain point. After all, we?ve been working with technology for all of these years and we still wince at major tech purchases. Pro tip: The way to overcome sticker shock is to think long-term. Once the seemingly-high price is compared to how much money you?ll save in the long run, the initial shock will wear off and you?ll have no problem swiping that card. Trying to Squeeze as Much Out of Their Old Tech as PossibleSome business owners might treat their technology like an old-yet-reliable car. For a high-mileage vehicle, it makes fiscal sense to pony up and pay for a repair every once in a while, instead of leasing a new car and making monthly payments. While this is solid logic for a car (after all, an expensive car and an ugly car both get you from point A to point B), approaching business technology in this manner will fail to generate savings. In fact, by using old and outdated equipment, productivity will actually be hindered and money will be lost. Not Enough in the Budget to Purchase New TechnologyIn all honesty, you might be in a place with your budget where you just can?t afford to purchase new technology. This is a tough place to be in, but you shouldn?t let shortcomings in your budget prevent your staff from accessing the technology they need to do their job. After all, if you continue to allow your company to stay in this rut, your workers will never be equipped to perform to their fullest potential, which is what it takes to get you out of said rut. When funds are tight, you can actually free up resources with some creative budgeting. As counterintuitive as it sounds, you can actually make the right technology purchases in order to free up funds so you can make the technology purchases your employees need. This is commonly done by taking computer equipment that?s normally paid for using capital expenditures, and replacing it with IT services (like cloud computing). The newly acquired IT service can now be categorized as an operating expense, which frees up money in the capital column that can now be used to replace that busted workstation your staff is always griping about. Bottom line, reliable technology is worth the extra expense. Providing your staff with inferior equipment won?t save you any money. In fact, it actually ends up costing you more than you would think. Consider the following: If your team has to tolerate outdated equipment, they will miss out on the latest solutions designed to improve efficiency. To make matters worse, a competitor using the latest technologies will have an advantage over you. Downtime adds up faster than you realize. Older equipment is prone to freezing, taking extra long to load programs, and slow performance in general. A worker that loses a few minutes here and there due to sluggish technology will end up losing a total of many work days at the end of the year. Maintaining a sane work environment is difficult to do when dealing with unreliable technology. Nothing frustrates and demoralizes a productive […]

Stop Blaming Technology for the Attacks Caused By People

Dave Merkel, senior vice president and CTO of security agency FireEye, tells Aimee Chanthadavong of ZDNet that organizations are spending more on technology to protect against hacking, but are still behind: ?… one of the reasons behind this is because online attacks are often misunderstood as a technology problem, when it’s not. In turn, organizations look in the wrong places for solutions.? Naturally, security solutions are only as effective as the techs who integrate them. Are they configured properly, and are they continuously being updated with the latest threat definitions? Are your systems up to date, and have the latest vulnerability patches been applied? These are all the responsibilities of the technician, and if these routine maintenances aren?t performed, even the latest security protocol can?t help you. In other words, technology alone isn?t going to be the solution to your hacking woes. Even with maximum security, hacks are still going to happen, because there are people behind the attacks designing it. Ultimately, it takes the knowledge of people to fight against the knowledge of criminals. It takes skilled IT technicians who know their way around common problems to mitigate the damage done, or prevent security breaches altogether. To this end, White Mountain IT Services can help your business achieve maximum security by equipping it with professional IT technicians, as well as the technology and security practices required to keep your business safe. We work tirelessly, monitoring your network for suspicious signs and threats so you don?t have to. We take preventative measures to keep your business functioning with minimal incident. One solution used to optimize security is a Unified Threat Management (UTM) solution. This is a comprehensive security solution designed to provide your business?s network with the power to avoid discrepancies and data breaches as often as possible. With a UTM, you get an enterprise-level firewall and antivirus solution, coupled with spam blocking to keep dangerous messages from reaching your inbox, and content filtering to protect from dangerous online threats. With both the knowledge and technology to fight against threats, hackers won?t stand a chance. Let White Mountain IT Services help you today by calling (603) 889-0800.

Your Legacy Technology Could Be Holding You Back

As reported by ZDNet, research from Forrester has revealed that only 28 percent of IT investment is used for innovation, and the rest of the resources are dedicated to taking care of older technology. This should come as a surprise. You?d think that most companies would be on the lookout for quality tech solutions that are designed to improve their ability to innovate, but it seems that many are so stuck on their legacy technology that they simply don?t have the funds (or interest) available to do so. When you run legacy technology, you?re taking many unnecessary risks. For example, an old server unit is much more likely to break down when you least expect it. This could lead to unprecedented data loss if you?re unprepared. Furthermore, the downtime caused by unexpected hardware failure can be detrimental to the survival of your business. All of this can be avoided by updating your server hardware to hardware that?s less likely to fail, provided proper maintenance is performed. Another example is running an outdated operating system, like Windows XP, on your workstations. Microsoft no longer supports many older operating systems, which means they don?t run with the latest patches and security updates that are necessary to stay protected from the myriad of threats that want to attack your network. By upgrading to the latest operating system, you avoid the threats that come with remaining unsupported. As technology innovators ourselves, we know how hard it can be to let go of familiar old technology and place your bets on something new; but we also know the immense value of leaving legacy technology behind. One way you can get the most from your technology is with a consultation from White Mountain IT Services. We can visit your office and conduct a thorough audit of your office?s technology assets. We suggest changes that can be made, and offer our services to those who are in need. The main benefit of running with White Mountain IT Services is that you experience the cost savings that come with managed IT solutions. We can perform any number of functions that an in-house IT department would be responsible for, like upgrading workstations and server units, backing up and restoring data, and much, much more. The attraction of managed IT is that you only pay a fixed rate for the services, rather than a break-fix fee every time you need a machine looked at or replaced. Just give us a call at (603) 889-0800 to learn more.