What_is_virtualization

Virtualization is gaining popularity in many businesses.  What is virtualization and will the benefits help you streamline and protect your business?

The idea of a machine not being physical may sound like a bizarre idea.  Here is an easy breakdown of virtualization:

  • In simple terms, virtualization is a virtual representation of something that can be physical like a desktop, server, storage device or another physical resource.
  • Just like your desktop or laptop computer, a virtual machine will perform and behave just like a real physical one.
  • When a computer is virtualized, it is no longer running on hardware like your desktop or laptop computer.  Instead many computers can run on one system.
  • For virtualization to be possible, there needs to exist a physical machine, which is known as a host.
  • A host will hold a virtualized guest machine. For example, you can have a Windows computer that can host a virtual machine running Linux on it. Both systems can co-exist within the same machine running completely separate from each other.
  • The software or firmware used to manage the virtual machine is known as Virtual machine Manager or a hypervisor.

virtual_vs_physical_system

Virtualization can be classified into three categories.

  1. Full virtualization. Nearly all of hardware is simulated. It runs complete with its own guest OS, and it runs unchanged.
  2. Partial virtualization. Only a portion of the environment is virtualized and a little configuration needs to be applied to some of the guest programs in order for them to run.
  3. Paravirtualization. In this setup, only the guest programs are virtual and run within their own boundaries, as if running on a completely different system. The programs run by the “guest” need configuring in order to run in such an environment.

Where it all started

IBM_704_mainframe

It first existed during the 60s on, what was known as, mainframes, which were huge heavy duty machines, much like servers. These mainframes used virtualization to split up the machines resources to run various applications. From then on, virtualization has evolved to what it has become today.  Whole operating systems with applications can be virtualized allowing individual users to interact with an entire system for themselves.

Benefits of virtualization

Now that we have a better understanding about the whole virtualization concept, we can briefly look at some of the main benefits to virtualizing a system.

Space saving–  Think about how much space you’ll save in a computer equipment room by having one single machine running multiple virtual machines. For instance. these can run servers to fulfill an entire business. An example of a hardware reducing ratio, by VMWare, is 10:1. All this will considerably change your server architecture.

Maximizing server efficiency– Within each virtual server in the host, you can seamlessly run multiple applications as well as different operating systems.

Reduces costs– By having less physical machines to purchase and maintain, you save a considerable amount of electricity, whilst helping to maximize productivity on servers and allowing business operations to run smoothly.

Easy to mange applications and resources– Migrations can happen whilst on a live environment, servers can be cloned at the click of a button, easy to set up load balancing over virtual farm servers and it’s easy to scale.

Final Thoughts

There exists a handful of leading virtualization vendors who offer different solutions according to your business and infrastructure needs. Some of the big names include VMware, Citrix, Microsoft Hyper-V and the like.

Do you use a Virtualization platform? If so, let us know what you think and how you rate it.

To determine whether virtualization can help streamline your business’ productivity, contact your local IT professionals.

Read More


typingshortcuts

Keyboard shortcuts are an overlooked feature of the modern OS. Here are 28 shortcuts to keep your hands on the keyboard and to keep your productivity high.

Most of these actions can be easily done with keyboard shortcuts. The shortcuts have you press a combination of two keys at the same time to perform the action. Investing some time into learning these shortcuts and getting used to using them on a daily basis will significantly increase your work efficiency no matter what field you are in. Once you learn this way of navigating the UI there will be no going back! The following shortcuts are for computers running a Windows OS.

Action controller

  • CTRL+Y, Redo the last section
  • CTRL+Z, Undo the last action

For creating, opening, saving, and printing

  • CTRL+N, Creates new file or web browser window
  • CTRL+O, Open a file or document
  • CTRL+S, Saves a file or webpage
  • CTRL+P, Print all the selected areas

Format shortcuts

  • CTRL+B, Bold
  • CTRL+I, Italic
  • CTRL+U, Underline

Browsers

  • CTRL+T, Open a new tab in opened browser
  • CTRL+Shift+T, Reopen previously closed tabs
  • CTRL+H, Open browser history
  • CTRL+W, Close window
  • CTRL+F, Word search page

washington

Screen Capture

  • ALT+Print Screen, Capture screenshot of currently open window
  • CTRL+Print screen, Capture the entire screen

Function keys

  • F1: Open the Help Page
  • F2: Rename file
  • F3: Find or Search
  • F4: Shows the address bar in browser
  • F5: Refreshes the current browser page

Windows Shortcuts

  • CTRL+Alt+Delete,Open the Windows Task Manager
  • Alt+Tab, to move to the last working window
  • WIN+D, Show desktop
  • WIN+L, Lock desktop

97806723306984.20.9

  • CTRL+Shift+N, Create new folder
  • Shift+Delete, Permanently Delete file
  • Alt+Enter or Alt+Double click, Go to properties screen for file or folder

For more ways to increase your office productivity, contact your local IT professionals.

Read More


Why it's important to update Flash

Flash is common enough to be a prime target for malware.  A new Adobe Flash exploit has been found allowing criminals to run malicious code.

Flash is susceptible to tampered files used to display multimedia, videos and animations while you are browsing the internet. This mainly affects desktops; however, it’s not an issue with servers since servers are less likely to have users on them browsing the internet.

Understanding the new Adobe Flash vulnerability

  • Taking a closer look at the cause for infections spreading through Adobe Flash, the risk usually lies in binary browser vulnerability within the .SWF files, where it is dropped by an undisclosed iframe.
  • Iframe is an inline frame. Back in the 90s, Microsoft came up with the idea for basic webpages to point to another page. This allowed a website to combine the content of its page with another. An iframe allows you to embed one site into another one seamlessly, with two different webpages displaying as one. Sounds like a great idea at the time, right?
  • It initially worked very well for Internet Explorer. What wasn’t foreseen was malware authors exploiting these iframe features.
  • This exploit affects only Internet Explorer users, which is why we urge everyone to use a more secure browser such as Firefox or Chrome. 

What does this Malware vulnerability do?

  • The injected iframe may have something subtly embedded such as a single pixel within the SWF file.
  • It’s high risk to Internet Explorer Users, where the Iframe can identified by its negative absolute positioning and random number approach.
  • The usual behaviour from these types of files will eventually take you to a currently black-listed blank domain.
  • This, of course, could change at any time. It could pose as a spoof site, aiming to steal data or to install malware.

How to protect yourself

The solution is simple, stay on top of your Adobe Flash updates. This is very important, especially if you use your web browser to do online gaming, stream music, watch videos and animations, such as on YouTube, which nearly always uses Adobe Flash Player.  By keeping updated with the latest Adobe updates, you’ll help to close down those vulnerabilities discussed above, and more.

Update_Adobe_Flash_Message

It’s good news if your choice of browser is Google Chrome. Chrome automatically updates your browser to the latest version of Adobe Flash.

All Onsite PC Solution Managed Services clients are automatically protected during their monthly maintenance.

To learn how to update Adobe Flash, please see our article Here (https://www.ophtek.com/should-you-update-adobe-flash/)

 

Read More


HIPAA_Compliance

Is your medical office HIPAA compliant? Here are 8 HIPAA technical requirements you should address to avoid fines that could cost tens of thousands.

In recent years, there’s been cases of data leaks either through innocent cases losing a notebook or information to leak in the office. Tighter IT security measures and policies can help prevent unauthorized access to medical data. We’ve compiled a list in-line with the HIPAA and Omnibus technical requirements and regulations.

Review for HIPAA Compliance

  • Assigning unique usernames– This helps to identify and track different users in Medical Office software containing patient health information.
  • Contingency procedures for accessing medical data in an emergency– A well-documented procedure that can appropriately guide any authorized staff to access protected medical information.
  • Logging off idle sessions– This is a good way to protect and minimize any unnecessary user load on the system, as well as preventing any potential unauthorized access to unattended endpoints.
  • Encryption and decryption of data– Put into place an encryption and decryption process when accessing or externally sending out any sensitive medical information.
  • Auditing systems– It’s strongly advised to run periodic audit controls on systems, including software, hardware, and not excluding, procedures, that use and hold confidential and sensitive medical information.
  • EPHI Integrity– Prevent any alteration of destruction of protected medical information by implementing effective procedures and clear procedures.
  • Authentication procedures– Authenticate authorized staff that are verified to be who they say they are and which are granted access to specific medical information.
  • Securing external transmissions of data– Implement technical and updated security processes to protect data from unauthorized access, especially when transmitted via any type of electronic communications network.

Next Steps

Now that you have a better idea hipaa technical requirements within the IT portion of the HIPPA regulations. The next step is to take action and formulate your own policies and procedures.

Most changes in procedures can be delivered as onsite training for staff, which in our experience is very effective. You may have the best tools in the industry to protect data, however it is also what staff do within these procedures that matters. For example, staff may occasionally share usernames and passwords, or even write them down on a Post-It note and leave these on their desks, all of which are prone to social engineering types of compromises. Not only is this a risk, but it also makes it difficult to audit and trace any work or process carried out on endpoints.

For more ways to secure your medical office technology to ensure HIPAA compliance, contact your local IT professionals.

Read More


Locked_Computer

Cryptowall can bring your business to a screeching halt. Here is how you can protect yourself against what’s becoming the most malicious malware of 2014.

You don’t need to end up in trouble.  We’ve outlined some very important guidelines on what to do to avoid an attack like Cryptowall and Cryptodefense:

  • Scan any email attachments that land on your email account– especially PDF attachments, which can be disguised as either payments, invoices, receipts, complaints and so forth. This is generally how this Trojan enters the system.
  • Avoid clicking on any advertisements– not only does this attack happen through attachments, they have also been identified through infected banners on different web pages. Avoid clicking on them at all costs!
  • Avoid mapping drives directly to servers– For any person with administrator rights, if you’re working from your computer, aim to use remote access tools as needed. This will help reduce risk to the servers directly.
  • Lock down admin users– assign user accounts by name, so that if an attack happened, the user’s account can be frozen to avoid its credentials being for further used for unauthorized installations.
  • Verify Backups– a backup is only good if it’s one that can be restored. Test your backups regularly.
  • Off-site or offline backupshaving these will reduce the chances of suffering from a single point of failure due to such an attack. Please note that mapping Dropbox on your computer can still make it subject to this attack.
  • Whitelisting approved software– you can find tools and systems that can help you with these. You can specify what can run on any system on the network.
  • Utilize Windows Group or Local Policy Editor – Software Restriction Policies can be created to stop executable files from running on any given path.
  • Have a Bitcoin account set up in case nothing else works. Being prepared can help you save time.

Here’s what you can do if you find yourself compromised:

Like they say, prevention is better than a cure.

For more ways to protect yourself and your business from malicious attacks, contact your local IT professionals.

Read More