Remaining_budget_IT

It’s that time of the year again. The fiscal year is drawing to a close and you still have money left to spend. Here are 5 ways to tie up IT loose ends.

Why spend your remaining IT budget?

In practical terms, we’re looking at productive suggestions in ways that you can spend your IT budget, without it being wasteful.
Besides, if directors look at the accounts after the year end and see that a significant amount was left unspent, it would be likely that the following year could lead to a cut-back on your IT budget.

The good news is that we have plenty of ideas to share with you on ways to spend your remaining IT budget wisely.

1. Expand your Cloud service and backups

Backup

Consider extending the storage capacity or bandwidth of your current Cloud set up, which can help with productivity and protect your business against catastrophic data loss. It’s always wise to expand your current backup solution. You may have a local solution but why not extend this to an online solution? Y

Revisiting your existing backup process and tying up loose ends is a good way to prevent catastrophic data loss in the future. It’s worth considering a local backup solution that is fire-proof, such as a firesafe. Such a solution you can easily be acquired from IOSafe.

2. Invest in your workforce

training-office-staff

Train up your staff through a course or a consultant. This type of investment will not only benefit their skill set, but it will also motivate them to be productive and take on more challenging roles or tasks. This also acts an incentive to prevent job dissatisfaction and boredom by filling in any gaps in their technical skillsets. The result, having a satisfied and skilled workforce who are confident in carrying out new tasks or responsibilities.

3. Drive up your speed

Hitachi Western Digital Seagate 3tb Hard Drive reliability

We’re talking about hard drives here. It’s a common problem for them to fail, so why not invest in some, even if you don’t need them straight away. You can keep them on standby. We recommend investing in SSD, or solid state drives. They cost just a little more than the usual drives, however, they’ll start up really fast, making a noticeable difference on performance. It’s well worth investing on this if you have the leftover budget.

4. Organize the cabling

Organize_cabling

Do the cables on your server room resemble a bowl of spaghetti? If so, it’s time to consider spending some of that remaining IT budget on an effective tidy cable solution. Look to see if you need to replace old patch cables that are fraying. Try cable tidy tubes which can neatly clip and organize cables or simply hire a professional who can help untangles all those cables that are causing knots and confusion.  This investment will be worth the while!

5. Invest in marketing

Social_Media_Tree

If you’re a single person business, then consider spending the remainder of your IT Budget on digital marketing. Even the tiniest of businesses have an IT budget, which is tracked when the accounts are worked out. Be sure to spend any leftover capital on advertising your business.  This includes having blog articles written on your website, search engine advertising, or social media advertising.

For more ways to reinvest in your business’ technology, contact your local IT professionals.

Read More


Broken_Glass_at_office

How much do you value your data? Catastrophic data loss is not just about business continuity but also about validating backup software and data recovery.

We’re going to be taking a look at how you can best prepare your backups for most scenarios which could lead to catastrophic data loss.

Everything from your financial records, employee information to departmental files, or worst still, your entire system, as all at stake!

Building up the picture

What would happen if a disaster occurs taking with it all the data that was stored?

Anything from hard drives crashing to building fires, flooding, earthquakes, theft or any event that could cause data loss, can hit your business very hard, like a ton of bricks.

Alternatively, a break-in could happen and your data ends up stolen. What if a work laptop is lost, out in the public domain and gone forever, possibly winding up on an auction on EBay?

fire-sprinkler-in-office

Would you risk losing months, or even years of precious data that will cause loss of earnings, potential data leaks or embarrassment?

These are only some examples of worst case scenarios. It could happen to anyone.

Being Prepared

The good news is that you can prevent such catastrophes with 4 steps to checking the backups you have put in place long ago:

  1. Verify Backups. Your system administrator will usually manage this. If you’re one yourself, simply check that they are verified and running as scheduled through whichever backup software solution you use.
  2. Restore and test backups. You’ll want to be sure to restore your backups and test your data regularly, checking to see if everything would work smoothly without any backup media corruption.
  3. Offsite / Cloud backup. Having an offsite or Cloud mirror copy of your existing system, which ideally, is backed up on a daily basis. If all data were to be inaccessible at your physical site, you’ll be able to seamlessly restore your most critical data and get the business up and running.
  4. Recovery plan. This may be the last step, but is far from being the least important.

  • The recovery plan should contain emergency contact numbers of who to contact. For instance, of relevant IT admins, your offline disaster recovery center, the company director and any specific staff to keep them in the know.
  • Ideally a recovery plan can be presented as a hardcopy/document, as well as, a document hosted over the cloud, and distributed to all IT admin staff, plus a manager or director (to be extra cautious) is essential.
  • You may go as far as providing a copy to your Disaster recovery test centre or your offsite provider, as discussed in point 3.

Internal procedures will vary from business to business, so design one to meet suit your system setup.

Amidst the panic and chaos, you or your System Admin will be presented with 101 things to do. A documented Recovery plan will help you be organised and speed things up nicely. Say if your designated disaster recovery administrator happened to be away in a catastrophe, then at least a procedure is in place for another admin to follow.

Be Prepared for Anything

Like they say, prevention is better than a cure. You’ll never know when a disaster can occur, so be sure to review all the above steps and apply it to you disaster recovery plan today. If you have one in place, it’ll never go amiss to revise, improve and update it.

To put together a disaster recovery plan or backup systems to protect your business, contact your local IT professionals.

Read More


Computers_on_shelves

Whether you’re buying a new PC for the office, your business or personal use, here are the features you should focus on to get the most bang for your buck.

We’re going to highlight the 5 most important features to look for in a new PC. But before we delve onto our list of five important features, let’s discuss a preliminary checklist:

  • What are you going to use your PC for? You’ll need to determine if you’re going to be using to for work, where potentially, data protection and backups will be crucial. Even if it’s for personal use, you’ll still want to consider securing your data and backing up your documents, photos, emails and so forth, periodically.
  • What software will you use? General word processing and other similar office applications are not so resource intensive. On the other hand, if you are planning on using a resource hungry program, such as a graphic design software, or anything that requires a PC with a fast processor and plenty of memory, you’ll need to take note of the minimum specifications. Even the minimum specifications on a PC for any given software will not guarantee the best performance. 
  • Optical CD drive, anyone? If anyone remembers the phasing out of the floppy disk drives in the mid nineties, the same thing is happening to optical CD drives. They are fast becoming a legacy component, thanks to this age of digital downloads, portable USB storage and online video streaming sites. You’ll need to consider whether you’ll want one with an optical drive or not. Alternatively, you can purchase an external CD/ DVD drive if you really needed one for any intended purpose.

With all these preliminary requirements covered, let’s now dive into our checklist for the 5 most important features to look for when shopping for a new PC

  1. Customer support.

customer_support

When it comes purchasing something new, you’ll want peace of mind and know that you can call a phone support line and have a warranty to replace faulty parts. Also, some PCs may require registration in order to activate its warranty, so if you’ve any questions, you know where to call.

  1. Opt for reputable brands.

Lenovo-HP-Dell

Brands like Dell, HP or Lenovo, have a well-established community which also means that finding replacement parts is easy and less of a struggle.

  1. Double-check the preloaded software.

30_days_free_trial

Never feel too afraid to ask the sales rep about the software that comes pre-loaded with the PC. If you need a full version of Office software, make sure it has that and not just trial versions or 90 days’ worth of the full version. This is important if you heavily rely on using such software, as you won’t appreciate a break in your productivity whilst acquiring the full version!

  1. Watch out for unnecessary software.

Too_many_programs

Be sure to find out if it comes loaded with junk software from the manufacturer pressuring you to sign up to their services. This is often a sales pitch, and from our experience, a complete waste of time, money and digital space! Just focus on what you really need and stick to your requirements.

  1. Check the PC’s specifications.

fast-computer

You’ll want to look for a PC that has a fast processor and plenty of RAM. Many store sales brag about sub $300 systems, when in reality they are cutting corners like memory and processor speed.

Too often people have been mis-sold the wrong type of PC and software that comes with it.  Don’t be afraid to ask how systems you are comparing stack up against others in the market.

For more tips and advice on deploying the right PC workstations for your business or home office, contact your local IT professionals.

Read More


Virtualizing_a_server

Virtualizing a server can bring many benefits spanning cost, power savings, ease of management and business continuity.  Here’s what you should know.

Since we’ve been exploring the meaning of virtualization in some of our past articles, let’s quickly re-cap what it is for those of you who need a gentle reminder.

A virtual server is a projection of a physical server that can run with its own operating system, hosting applications and hold network files. A virtual server can co-exist with many other virtual servers within a single host machine.

Let’s take a quick look into what physical servers are and some issues they face:

  • Both physical and virtual servers are designed to serve resources such as an application or files over a LAN (local area network) to your office computers or within a datacenter.
  • Physical servers are larger computers that come built with powerful processors, large hard disks and a large amount of memory, which often have more than one of each component.
  • They are considered to be the “workhorses” of the physical computer world. As a result, they’ll use up a lot more power and resources from its own components.
  • From time to time, this can lead them to have hardware faults such as disk failures, overheating from faulty fans or chip creek (components such as memory cards displaced by heat).
  • These noisy machines are usually located in the server room, stacked on a rack next to a number of other servers, requiring a considerable amount of space and power.

With the problems given above, here’s how virtual servers can help solve these issues, and more:

1. Highly resourceful

Physical servers would generally run with one application, to prevent any issues with running multiple programs at once. This would cause servers to sprawl out in numbers, without using them to their full potential. This is different with virtualized servers, where space isn’t an issue and they can be set separately with the required programs. The recommended resources can also be configured to prevent unnecessary waste of any given resources (disk space, memory. Processor power, etc…) that can be reallocated to another server.

2. Improved Disaster recovery

Virtualization eliminates the need of having replicas of physical servers or disks, with specific model numbers and brands, to carry out data recovery successfully.
A whole site can be replicated easily, being much more affordable in a virtualized environment. Disaster recovery failover can be tested to see if it works, instead of hoping it recovers in a real-life situation or in a disaster recovery testing center.

3. Environmentally Friendly

It goes without saying, less physical servers will mean less power used, as you can pack in many virtual servers in on host machine. This has the added benefit of making more space in a server room. In turn, less power used leads to lower energy costs. This helps reduce a business’ carbon footprint, whilst saving you money.

4. Efficient provisioning and management

You can quickly and easily clone virtual servers, restore or create new ones, at a moment’s notice. You can create virtual machines that will hold legacy applications that may no longer be in support. This can help smooth any server operations that require migration, upgrades, mimic legacy setups, which you can no longer acquire and so forth. Even test labs can be set up to keep things separate from a live environment. It will promote uptime, maintaining business operations as normal.

5. Moving to the Cloud

“The Cloud” may sound like an abstract concept, mainly due to it being a virtual network resource. However, businesses are opting towards new ways of accessing resources; therefore a move to virtualized servers can seem like the next logical step. The Cloud can be either public or private. With the amount of server resources required at a data center to host a Cloud network, a virtual infrastructure would be more sustainable and practical than a physical one.

Virtual servers will soon replace the remaining physical ones out there. It is likely than within five years the shift to a virtual infrastructure will be the norm in many businesses. The top four virtualization vendors to look at are Citrix, Microsoft, Oracle and VMware.

For more information on how virtualizing your servers can help save costs and streamline your business, contact your local IT professionals.

Read More


What_is_encryption

With more regulatory commissions requiring encryption and privacy being a hot topic, it’s important to understand what encryption is and whether you need it.

Encryption is nothing new; in fact, it was used thousands of years ago during the ancient times in Egypt, encryption was used to hide messages in the tombs of kings. It has been used time and time again by different civilizations, and was even applied through the Word Wars to keep messages hidden away from the enemy.

However, in most recent history from the 90s, encryption has been adapted to be used as a security measure on computers and over the internet.

Nowadays it has become ever so important for financial institutions, healthcare practices, legal, law and governmental offices to apply encryption into their systems. This allows them to secure their information, whilst remaining complaint with data protection standards.

What is Encryption?

 

How_Encryption_Works

A basic encryption implementation explained by Oracle.

As you may now understand from our examples listed above, encryption obscures information, away from prying eyes. More specifically, it does this by making data unreadable to outsiders. In technical terms, a mathematical formula is used to scramble the data, which appears as gobbledygook to anyone else reading it. Only the person who holds the key can, in a sense reverse the mathematical formula to unlock and read the data.

Why encrypt your data?

Data encryption ensures that you can deter hackers and lessen the effect of being a prime target of criminal activities, looking to intercept your data. Often the most valued data is your personal information. Just think of how many emails contain passwords to accounts, medical reports archived, interests displayed, and an insight into all of your personal activities.

With all this, a hacker can spear-phish you and later target you again, with the likelihood of succeeding. This will be done by simply using your details against you, without you even realizing it.

Therefore, it is extremely important to encrypt your information if you work anywhere that handles sensitive information, confidential emails, and if you travel with a notebook or similar device that uses the Internet.

Encrypting your hard drive

 

bitlocker-encryption

Hard drive encryption can help to protect your computer from unauthorized access, since a user needs a key in order to read it.

There are many programs that can help to encrypt your disk such as TrueCrypt, Bitlocker and RealCrypt.

To learn more about Hard disk encryption, please read our how-to article here.

Encrypting your email

 

An example of what an encrypted email looks like using PGP.

An example of what an encrypted email looks like using PGP.

Email is used by just about every person who uses a computer, smart-phone, device and works at a business, or all of the above!

Did you know that your email can be intercepted and read by anyone who has access to the right tools?

A good tool to use is called PGP (Pretty Good Program), which can encrypt your email. In order for this to work, both sender and receiver need PGP installed. The sender will generate a random key, and once the encrypted message is sent and received, the recipient can unlock it with a key generated by their PGP plugin.

Encrypting your internet connection

 

How VPN works as explained by Private Internet Access.

How VPN works as explained by Private Internet Access.

As the name suggests, VPNs (virtual private networks) are a safe way to connect to a private network or to access the internet.

One good analogy is comparing a VPN connection to a walled tunnel, where outsiders would “hit a wall” along the tunnel, unable to infiltrate and access what goes through the tunnel. Whereas a usual Internet connection can be likened to your data travelling on a street and potentially be seen or accessed by outsiders. This is where the term “VPN tunnel connection” comes from. Within this tunnel, all of your data is encrypted. User can access a VPN by having a VPN client installed and accessing a login prompt that will securely authenticate them.

Some VPN clients worth considering are ProXPn, TorVpn, TorGuard, Private Internet Access and WiTopia.

There’s so much to consider with encryption. Just about everything can be a risk without it, so be sure to adopt this secure technology into your business practice to maximize your security.

If you need support and advice with your encryption needs to stay compliant, contact your local IT professionals.

Read More