Virtualizing Desktops

Virtualization is fast becoming the norm in many small to large sized businesses. Here are some benefits when you virtualize office desktops.

With so many benefits to virtualizing desktops and workstations, it’s no surprise as to why this has caught on so well.

How does virtualization fit within a Small Business?

First, a quick recap on the meaning of virtualization. Virtualization is imitating a physical machine set-up, which has an OS (operating system).  Imagine taking your laptop or desktop, and running it on top of another computer called a host.  This host can run many desktops or laptops, eliminating the need for expensive physical computers.

What is virtualization

  • In the context of virtualized desktops, a centralized server acts as the host to hold the virtual desktop sessions, which imitate real desktops just like your Windows 7 or 8 based computers, complete with a whole list of different applications.
  • Staff and users would then access their files and programs via their terminal machines, from which they log in from, to initiate their virtual sessions to work.
  • The “connection” here involves the user gaining access to their operating system and programs, which are virtual. These exist on the host server, which allocates such sessions to logged in terminals.
  • A terminal machine can be a computer, Smart-phone, or a Thin-client.
  • A Thin-client differs greatly from a physical desktop system, in that they are physically designed to be basic, with much smaller memory, hard-disk space and processor. This makes them more streamlined and much smaller than real desktops.
  • Since Thin-clients are much smaller, the processing power demanded from any given applications or programs wouldn’t overload it as all that is taken care of by the server that hosts the session.
  • Host servers are generally built to withstand higher demands on their resources, such as memory, processors and Hard-disk space, which are generally much more powerful than a standard computer.

The Benefits of Virtualizing Desktops

Now that we’ve covered the concept of how a virtual desktops are set up in a VDI, let’s now understand the benefits behind virtualization.

Cost

  • Lowers admin and operating costs by as much as 70%! Operating costs can include repairing faulty or broken desktops, and extra man-hours to handle such requests, which are all mitigated by virtualized machines.
  • Thin clients and other terminal machines are significantly cheaper to run, helping you save on energy bills by around 97%, compared to physical desktops.
  • Since they save on energy costs, it has a positive impact on a company’s carbon footprint, making it more environmentally friendly. These savings can be reinvested back into the business and reallocated towards much needed projects.
  • Save on having to purchase large office furniture as they’ll be more room on desks, which also looks aesthetically better than having a clunky desktop to look at!

Management and Administration

  • Simple to manage centrally from a server at a datacenter. For instance this involves policies, security updates, changes to applications and so forth.
  • Reduces the number of issues logged with IT staff, unlike physical desktops which may have isolated issues and can be difficult to track within a large company.
  • Keeps downtime to a minimum, as it’s all managed centrally and more efficiently, which in turn helps with productivity.
  • Backups of user’s laptops, devices and profiles are simple to manage, for instance backups are carried out centrally.
  • Easy to clone VMs ( virtual machines), for an entire department or company, as they’ll contain  all the settings including its operating systems, drivers, applications and files. This saves time and man-hours too!

Security

  • End terminals and Thin-clients are locked down, making them more secure from unauthorized virus threats and policy breaches.
  • Prevents data leaks by not allowing information to be copied to a disk. All copies are usually only available via the datacenter as backups.
  • Centralized management via a host server means simple processing and monitoring for both sessions and end terminals.

Productivity

  • As previously mentioned, increased productivity is a highly noted benefit. Gone are the days where you would have to wait for a Desktop to be repaired, which would interrupt workflow. Issues can be resolved very quickly, meaning business can continue as usual.
  • Easy to set up new virtual machines, which can be preconfigured and customized VMs for any department, and ready to use in a matter of minutes. Thus makes it incredibly easy to scale up system, when needed. This can allow new staff to be set up quickly and be productive too!
  • Users can access the same programs and applications from anywhere they can log in.

Final Thoughts

A virtualized desktop environment comes with so many benefits that it’s hard to ignore. The ease of implementing and managing all virtual machines securely and reliably through one host, lends itself mostly this new technology model.

Administrators will also benefit greatly, as there would be an orderly Virtual system which is straightforward to monitor and secure. Staff are able to have the flexibility to work from home. With a VDI being considerably economical, this makes it a highly viable solution for small to large businesses.  The leading virtualization vendors to consider include Citrix, VMware and Microsoft.

For more ways virtualization can help secure and streamline your technology, contact your local IT professionals.

Read More


What_is_virtualization

Virtualization is gaining popularity in many businesses.  What is virtualization and will the benefits help you streamline and protect your business?

The idea of a machine not being physical may sound like a bizarre idea.  Here is an easy breakdown of virtualization:

  • In simple terms, virtualization is a virtual representation of something that can be physical like a desktop, server, storage device or another physical resource.
  • Just like your desktop or laptop computer, a virtual machine will perform and behave just like a real physical one.
  • When a computer is virtualized, it is no longer running on hardware like your desktop or laptop computer.  Instead many computers can run on one system.
  • For virtualization to be possible, there needs to exist a physical machine, which is known as a host.
  • A host will hold a virtualized guest machine. For example, you can have a Windows computer that can host a virtual machine running Linux on it. Both systems can co-exist within the same machine running completely separate from each other.
  • The software or firmware used to manage the virtual machine is known as Virtual machine Manager or a hypervisor.

virtual_vs_physical_system

Virtualization can be classified into three categories.

  1. Full virtualization. Nearly all of hardware is simulated. It runs complete with its own guest OS, and it runs unchanged.
  2. Partial virtualization. Only a portion of the environment is virtualized and a little configuration needs to be applied to some of the guest programs in order for them to run.
  3. Paravirtualization. In this setup, only the guest programs are virtual and run within their own boundaries, as if running on a completely different system. The programs run by the “guest” need configuring in order to run in such an environment.

Where it all started

IBM_704_mainframe

It first existed during the 60s on, what was known as, mainframes, which were huge heavy duty machines, much like servers. These mainframes used virtualization to split up the machines resources to run various applications. From then on, virtualization has evolved to what it has become today.  Whole operating systems with applications can be virtualized allowing individual users to interact with an entire system for themselves.

Benefits of virtualization

Now that we have a better understanding about the whole virtualization concept, we can briefly look at some of the main benefits to virtualizing a system.

Space saving–  Think about how much space you’ll save in a computer equipment room by having one single machine running multiple virtual machines. For instance. these can run servers to fulfill an entire business. An example of a hardware reducing ratio, by VMWare, is 10:1. All this will considerably change your server architecture.

Maximizing server efficiency– Within each virtual server in the host, you can seamlessly run multiple applications as well as different operating systems.

Reduces costs– By having less physical machines to purchase and maintain, you save a considerable amount of electricity, whilst helping to maximize productivity on servers and allowing business operations to run smoothly.

Easy to mange applications and resources– Migrations can happen whilst on a live environment, servers can be cloned at the click of a button, easy to set up load balancing over virtual farm servers and it’s easy to scale.

Final Thoughts

There exists a handful of leading virtualization vendors who offer different solutions according to your business and infrastructure needs. Some of the big names include VMware, Citrix, Microsoft Hyper-V and the like.

Do you use a Virtualization platform? If so, let us know what you think and how you rate it.

To determine whether virtualization can help streamline your business’ productivity, contact your local IT professionals.

Read More


typingshortcuts

Keyboard shortcuts are an overlooked feature of the modern OS. Here are 28 shortcuts to keep your hands on the keyboard and to keep your productivity high.

Most of these actions can be easily done with keyboard shortcuts. The shortcuts have you press a combination of two keys at the same time to perform the action. Investing some time into learning these shortcuts and getting used to using them on a daily basis will significantly increase your work efficiency no matter what field you are in. Once you learn this way of navigating the UI there will be no going back! The following shortcuts are for computers running a Windows OS.

Action controller

  • CTRL+Y, Redo the last section
  • CTRL+Z, Undo the last action

For creating, opening, saving, and printing

  • CTRL+N, Creates new file or web browser window
  • CTRL+O, Open a file or document
  • CTRL+S, Saves a file or webpage
  • CTRL+P, Print all the selected areas

Format shortcuts

  • CTRL+B, Bold
  • CTRL+I, Italic
  • CTRL+U, Underline

Browsers

  • CTRL+T, Open a new tab in opened browser
  • CTRL+Shift+T, Reopen previously closed tabs
  • CTRL+H, Open browser history
  • CTRL+W, Close window
  • CTRL+F, Word search page

washington

Screen Capture

  • ALT+Print Screen, Capture screenshot of currently open window
  • CTRL+Print screen, Capture the entire screen

Function keys

  • F1: Open the Help Page
  • F2: Rename file
  • F3: Find or Search
  • F4: Shows the address bar in browser
  • F5: Refreshes the current browser page

Windows Shortcuts

  • CTRL+Alt+Delete,Open the Windows Task Manager
  • Alt+Tab, to move to the last working window
  • WIN+D, Show desktop
  • WIN+L, Lock desktop

97806723306984.20.9

  • CTRL+Shift+N, Create new folder
  • Shift+Delete, Permanently Delete file
  • Alt+Enter or Alt+Double click, Go to properties screen for file or folder

For more ways to increase your office productivity, contact your local IT professionals.

Read More


Why it's important to update Flash

Flash is common enough to be a prime target for malware.  A new Adobe Flash exploit has been found allowing criminals to run malicious code.

Flash is susceptible to tampered files used to display multimedia, videos and animations while you are browsing the internet. This mainly affects desktops; however, it’s not an issue with servers since servers are less likely to have users on them browsing the internet.

Understanding the new Adobe Flash vulnerability

  • Taking a closer look at the cause for infections spreading through Adobe Flash, the risk usually lies in binary browser vulnerability within the .SWF files, where it is dropped by an undisclosed iframe.
  • Iframe is an inline frame. Back in the 90s, Microsoft came up with the idea for basic webpages to point to another page. This allowed a website to combine the content of its page with another. An iframe allows you to embed one site into another one seamlessly, with two different webpages displaying as one. Sounds like a great idea at the time, right?
  • It initially worked very well for Internet Explorer. What wasn’t foreseen was malware authors exploiting these iframe features.
  • This exploit affects only Internet Explorer users, which is why we urge everyone to use a more secure browser such as Firefox or Chrome. 

What does this Malware vulnerability do?

  • The injected iframe may have something subtly embedded such as a single pixel within the SWF file.
  • It’s high risk to Internet Explorer Users, where the Iframe can identified by its negative absolute positioning and random number approach.
  • The usual behaviour from these types of files will eventually take you to a currently black-listed blank domain.
  • This, of course, could change at any time. It could pose as a spoof site, aiming to steal data or to install malware.

How to protect yourself

The solution is simple, stay on top of your Adobe Flash updates. This is very important, especially if you use your web browser to do online gaming, stream music, watch videos and animations, such as on YouTube, which nearly always uses Adobe Flash Player.  By keeping updated with the latest Adobe updates, you’ll help to close down those vulnerabilities discussed above, and more.

Update_Adobe_Flash_Message

It’s good news if your choice of browser is Google Chrome. Chrome automatically updates your browser to the latest version of Adobe Flash.

All Onsite PC Solution Managed Services clients are automatically protected during their monthly maintenance.

To learn how to update Adobe Flash, please see our article Here (https://www.ophtek.com/should-you-update-adobe-flash/)

 

Read More


HIPAA_Compliance

Is your medical office HIPAA compliant? Here are 8 HIPAA technical requirements you should address to avoid fines that could cost tens of thousands.

In recent years, there’s been cases of data leaks either through innocent cases losing a notebook or information to leak in the office. Tighter IT security measures and policies can help prevent unauthorized access to medical data. We’ve compiled a list in-line with the HIPAA and Omnibus technical requirements and regulations.

Review for HIPAA Compliance

  • Assigning unique usernames– This helps to identify and track different users in Medical Office software containing patient health information.
  • Contingency procedures for accessing medical data in an emergency– A well-documented procedure that can appropriately guide any authorized staff to access protected medical information.
  • Logging off idle sessions– This is a good way to protect and minimize any unnecessary user load on the system, as well as preventing any potential unauthorized access to unattended endpoints.
  • Encryption and decryption of data– Put into place an encryption and decryption process when accessing or externally sending out any sensitive medical information.
  • Auditing systems– It’s strongly advised to run periodic audit controls on systems, including software, hardware, and not excluding, procedures, that use and hold confidential and sensitive medical information.
  • EPHI Integrity– Prevent any alteration of destruction of protected medical information by implementing effective procedures and clear procedures.
  • Authentication procedures– Authenticate authorized staff that are verified to be who they say they are and which are granted access to specific medical information.
  • Securing external transmissions of data– Implement technical and updated security processes to protect data from unauthorized access, especially when transmitted via any type of electronic communications network.

Next Steps

Now that you have a better idea hipaa technical requirements within the IT portion of the HIPPA regulations. The next step is to take action and formulate your own policies and procedures.

Most changes in procedures can be delivered as onsite training for staff, which in our experience is very effective. You may have the best tools in the industry to protect data, however it is also what staff do within these procedures that matters. For example, staff may occasionally share usernames and passwords, or even write them down on a Post-It note and leave these on their desks, all of which are prone to social engineering types of compromises. Not only is this a risk, but it also makes it difficult to audit and trace any work or process carried out on endpoints.

For more ways to secure your medical office technology to ensure HIPAA compliance, contact your local IT professionals.

Read More