How Reliable is your Hard Drive?

Your hard drive contains irreplaceable data, pictures and personal info. A new Backblaze study gives us insight on the most reliable hard drives out there.

We’ve compiled a summary based on Backblaze’s new findings on hard drive reliability, covering the brands that tend to fail the most and how often it has been reported.

Backblaze

Backblaze, a backup service provider, has data centers that hold more than 100 petabytes of data on over 34,000 drives, impressive right? They’ve done all the hard work in testing a wide range of hard drives, some of which have failed and others that have remained in full working order.

They began documenting their study in January 2014 and have since updated their observations.

Here is a summary of what you need to know:

  • The worst failing drives have been the 3 TB Western Digital and the 3 TB Seagate. This has been tested from 3,846 Seagate hard drives with an average age of 1.9 years and an initial 9% annual failure rate, which is now up to 15%. From the 776 Western Digital hard disks tested, the report shows that they have averaged 0.5 years in lifespan and had an annual failure rate of 4%, which has increased to 7%.
  • Interestingly, the HGST drives (previously branded as Hitachi) have been the most reliable brand with their annual failure rate averaging around 1% out of over 1600 tested hard drives in the datacenter.
  • Despite Seagate and Western Digital having a poor reliability record compared to the HGST drives, the reliability on these two problematic brands have continued to perform better with the Seagate 1.5TB and 4TB sized drives, along with the 1 TB Western Digital drives.
  • Western Digital and Seagate’s 3 TB drives continue to be the worst performers. One assumption could be that these drives may buckle easily under a datacenter environment. Another possibility could be due to a difference in how they run within a drive farming setup (using enterprise drives) as opposed to removing them from external USB hubs.
  • From their extensive testing, Backblaze noted that the standard external USB drives, such as Seagate’s 3TB (priced at around $100 for consumers), performed just slightly better than enterprise drives which are over double the price!
  • There’s also a big difference between different hard drive models and their failure rates. Seagate’s Barracuda range has two different 3 TB drives, with Barracuda XT performing nearly three times as well as the struggling Barracuda 7200.14 model, with a 15.7% annual fail rate.
  • The same goes for Seagate’s 1.5 TB drives, such as the Barracuda LP, performing significantly better as a hard drive with an annual failure rate of 9.6% compared to the Barracuda 7200.11, which has a 25% fail rate.

Overall conclusion

When it comes to looking for a reliable hard drive, especially those that are of 1.5 TB and 3 TB capacities, we have a clear winner and that is the HGST brand. One thing is clear; there’s no hard disk that is ever 100% fail proof, even the HGST drives have been noted to fail at times. The highest HGST annual fail rate of 1.4%, from over a thousand tested hard disks, is still a very impressive record.Hitachi Western Digital Seagate 3tb Hard Drive reliability

Regardless of your hard drive brand, model and style, it is extremely important to replicate and backup your data on a regular basis, as you never know when a hard drive will fail.

We hope that Seagate and Western Digital improve their current 1.5 and 3 TB drives and pay attention to this continued study. Although most drives will come with a 3 year warranty, in the event of a hard disk failing, this shouldn’t be much of a financial setback to their customers.

For more information on storage for your office or home based business, contact your local IT professionals.

Read More


Limitations of a Gigabit Network

You’ve upgraded to a gigabit network and you already notice a big speed boost.  Here are the limitation of a gigabit network you should know about.

What is a Gigabit Network?

Wired Gigabit networks have far superseded the days when Ethernet or its successor, Fast Ethernet, were employed to deliver 10 Mbps to 100 Mbps over a network. However, the next best thing, which has been around for over a decade now, is Gigabit, running at 1000 Mbps or 1 Gigabit over many networks.

Bearing this in mind, what would be the first thing you’d think of when you hear of a “Gigabit network”?  You may associate Gigabit networks with large corporate companies who can afford to implement this “expensive” technology in order to gain faster connections, along with all the “complex” equipment needed to support such requirements.  The truth is, it was expensive when it was first introduced into the market, however the price has eventually dropped so that small businesses and home users alike can benefit from it.

Gigabit_Router_Speed_Comparison

In a previous article, we explained the benefits of upgrading to a gigabit network at your home or office.  Here are some points you should keep in mind.

Limitations of a Gigabit Network

It doesn’t help to speed up internet connection

Gigabit networks are designed to help speed up the transfer rate of data between one device, desktop or server, to another, within an internal network. Whoever your broadband provider is, they’d be the ones who’ll determine and set your Internet connection speed. This is why a Gigabit network will leave this area unaffected until services like Google Fiber are widely available. Just think of the Internet as connecting to an external source from your desktop, phone or device.

Your gigabit networks will not run at 1000 Mbps for everything

Since resources are shared, there are many things running on your network that will be utilizing pieces of that 1000 Mbps gigabit speed. Speedier performances will however be very noticeable compared to a 100 Mbps network.  Also, note that many wireless devices still haven’t reached gigabit speeds, although we are getting there.

Is all of your equipment gigabit capable?

Have you confirmed that all of the equipment on your network is capable or running at your new gigabit speed? Having a gigabit router and the correct Cat 6 cabling is enough to get you up to gigabit speeds only for devices that support Gigabit.  It won’t break the bank to get them up to speed though.  For instance you can buy $15 switches, $20 routers with Wi-Fi, $0.50 cables, and even PCI gigabit network cards to install on old computers for around $10-25, making the possibility of running a Gigabit network an affordable reality!

For more advice on setting up a gigabit network in your office or home, contact your local IT professionals.

Read More


ethernet

Whether at home or in the office, the low cost and huge benefit of running a gigabit network is too good to pass up.  Here’s what you need to know.

What is a Gigabit Network?

Let’s start with what a network, let alone gigabit network means in the context of your office or home.  The network is how all of your computers, wifi/wired printers, tablets and even TVs talk to each other.

Gigabit_Router_Speed_Comparison

The speed at which your devices talk to each other is determined by your network equipment such as your wireless router and network cables connecting all of your devices to the router. Having equipment and cabling capable of gigabit speeds means you are running 10 times faster than traditional networking equipment often running at 10 or 100mbit speeds.

Benefits of a Gigabit network

  1.  Google fiber could be coming to you 

    That’s right, gigabit internet could well be accessible to you, helping your network perform better, along with improved traffic flow to better avoid bottle necks.

  2. Faster file transfer rates and program load times 

    Up to ten times the speed to help increase communications between your office computers for file sharing, and loading programs over the network. It can also, for instance, considerably reduce the waiting time for backups to complete, compared to the average standard Ethernet rate of 12.5 Mbps.

  3. Your equipment may already be compatible 

    If your equipment is fairly new, the chances are that it may support running on a Gigabit connection. Equipment such as desktops, LAN switches, cables, and so forth, all need to be able to run 1000 Mbps and have ports that support this too. Category 5e or 6 cables are the best to use in a Gigabit network.

  4. Old switches/ routers can still work on a Gigabit network 

    What’s good is that you don’t need to throw your existing switch/router away. You can obtain a standalone gigabit-enabled switch, like a Netgear that can cost around $40, and connect it up your old switch or router.For the low price of setting up a Gigabit network it’s definitely worth the upgrade. Anything that streamlines access to applications, facilitates smooth daily backup operations, or allows access to any shared resource in the company is going to benefit everyone.

For more advice on setting up a gigabit network in your office or home, contact your local IT professionals.

Read More


Is the Cloud Secure?

If you own a computer, chances are you are using a cloud service that holds your data.  What exactly is the cloud and is the cloud secure?

What is the cloud?

At a high level putting your data or information on to the cloud means storing your stuff on someone else’s hardware.  What is the benefit of storing information on someone else’s computers when your computers are already storing your data?

What is the cloud

This is where the cloud business model comes in to play.  Keeping your information on someone else’s hardware, whether it’s your phone contacts, your computer backup or your business files and folders, allows you to access your information from virtually anywhere and to share it with virtually anyone.

Is the cloud secure?

The downside to having your data accessible from anywhere in the world is that it must be accessible from anywhere in the world.  Most cloud service companies will provide a website or an application on your phone or computer to get to your data.

The Cloud Service can be Accessed by Anyone

These websites and applications are accessible by anyone over the internet and are a prime target for criminals and hackers to break in to.  A recent example of this is the iCloud vulnerability which gave criminals access to private photos and videos of celebrities.

Having your cloud accounts stolen can be done by criminals either attacking the cloud website like the iCloud example above or my infecting your PC and stealing account login information.

How can you protect yourself?

Unfortunately there isn’t much an individual can do to ensure companies are fixing bugs and vulnerabilities in their internet facing cloud websites and applications.  It is important to watch for announcements from cloud services you use about whether they’ve had a recent breach.

As an end user, there are some basic steps you can take to protect yourself on a regular basis:

Onsite PC Solution managed services clients receive regular updates, patching, scanning and 24/7 monitoring against vulnerabilities which could lead to a data breach.

For more information about securing your business data and choosing a reliable cloud service for your business needs, contact your local IT professionals.

Read More


Windows CVE-2014-4114 Exploit

A Zero-day Microsoft Windows Exploit CVE-2014-4114 has been found which impacts all versions of Windows. Here’s what you need to know to protect yourself.

The Russian espionage group, known as the “Sandworm team”, are the prime suspects believed to have launched a campaign to exploit a range of Microsoft Windows vulnerabilities.  The exploits are classified as Zero-Day, meaning they are so new that no anti-virus companies have figured out how to detect them yet. The ultimate goal is to inject and execute malicious code into systems and networks to leach data from computers.

Sandworm Team Logo

Their targets have involved NATO, US academic organizations, Western European Union and Ukrainian government agencies, European energy and telecommunication companies.

Systems are infected from files being attached to legitimate looking emails and extended through to social engineering methods. Most versions of Windows are affected – including server 2008 and 20012, but excluding Windows XP.

Sandworm CVE-2014-4114 Vulnerability Timeline

iSight has provided a timeline of the Sandworm infection campaign.

The cyber intelligence firm, ISight, has been monitoring Sandworm’s activities. After alerting Microsoft, a patch was released called MS14-060 which is found in Window’s Automatic Updates. The fix is still an on-going work in progress.

The vulnerability explained

Here is a high level overview of what the CVE-2014-4114 Zero Day exploit entails:

  • The vulnerability allows a computer to have code executed remotely through a file that is initially opened by an unsuspecting user via an email attachment.
  • Within most software installation files, you’ll find a component called OLE (Object linking and Embedding) Package Manager.
  • An OLE package allows applications to share files and functionality.
  • The OLE package manager contains a file which permits it to download and run INF files.
  • This is where a computer is vulnerable since a hacker can run any program, virus or malware on a system.
  • Any acquired arbitrary code can then run from the downloaded INF files, which is presumed by the system to be associated with the application’s package.
  • This package will run from the logged-in user’s credentials, such as an administrator or anyone with admin rights.
  • The danger then rests from specific commands given to the file during the execution of the application.
  • It has been observed that unsuccessful attempts from this exploit can also lead to a denial of service, which can lead to service disruption.
  • As mentioned previously, the usual mode of target is through fake emails with attachments and social engineering, where the user would need to be convinced and tricked into opening the file.

Proactive measures to prevent an infection

Follow these guidelines to protect yourself or to quickly recover from a compromised system.

If you find your system compromised

For more details about the Zero-day Microsoft Windows Vulnerability CVE-2014-4114 issue and other security issues putting your business and private data at risk, contact your local IT professionals.

Read More