A Closer Look at Veeam Backup & Replication

Posted by Jeremy Kushner on Sep 27, 2016 8:00:00 AM

Since organizations are overwhelmingly using virtual machines (VMs) as opposed to bare metal servers, having a solution to backup and replicate your data is essential. Veeam Backup & Replication is the industry's leading hypervisor disaster recovery tool.

In a matter of minutes, your organization can spin up a replica backup of your virtual machines if your underlying infrastructure suddenly fails. Veeam also gives system administrators the ability to perform file level recovery from backups. This feature lets you view and restore individual files on virtual machines that may have been inadvertently deleted.

Veeam Backup and Replication gives enterprises the flexibility they need to rapidly recover from disaster recovery scenarios. Here's a few ways that Veeam has solved those "oh crap" moments.

Read More

Get the Most out of Windows 10 for Enterprise

Posted by Jeremy Kushner on Sep 20, 2016 8:00:00 AM

Organizations have recently begun deploying the popular Microsoft Windows 10 operating system to desktops, laptops and mobile devices.

Now that Windows 10 has been installed on hundreds of millions of devices worldwide, both administrators and end users must learn how to get the most out of their new Windows 10 operating systems.

Here are 6 ways that you can get the most out of Windows 10:

Read More

Topics: General Interest

What's Your Mobile Device Security Policy?

Posted by Jeremy Kushner on Sep 12, 2016 8:52:34 AM

As working out of the office or from home becomes more popular and common within the American workforce, organizations of every size are implementing a BYOD (Bring Your Own Device) policy to provide end users with remote connection ability — essentially, allowing them to use even their personal laptop, desktop, mobile phone, or tablet to get work done while not at the office.

While this development is well underway, we have found that many organizations aren’t updating their security policies to keep up with the increasing use of personal devices for workplace connections. Mobile device security has become more important than ever, and it is essential that your organization put policies in place to protect your important data from corruption or even cyber attacks like ransomware infections.

It’s not enough just to have the policy in place, either — you’ll need to test, evaluate, and revise these policies on a regular basis to ensure your network remains secure. Any device that connects to your network could pose a threat, so it’s imperative that you build a security policy that gives your users the ability to work effortlessly while protecting the integrity of your organization’s network.

What are mobile device security best practices you could implement to up your current security level? Let’s take a look.

Read More

Topics: IT Security

Quantum Computing and the Future of Technology

Posted by Jeremy Kushner on Sep 5, 2016 10:54:42 AM

Quantum computing is a nascent technology that has the potential to change the way organizations use and implement computing products. Although theories pertaining to quantum computing have been around for several decades, the technology never really made it into the mainstream up until a few years ago.

You’re probably wondering, “What is quantum computing, and how will it impact my business?" Quantum computing remains a rapidly evolving technology, so it's worth taking a look at a few of its intricacies.

Read More

Topics: General Interest

Why Your Business Should Be Using RAID

Posted by Jeremy Kushner on Aug 30, 2016 6:13:40 AM

No, we're not talking about the common insect killer that most likely comes to mind. RAID is an acronym for Redundant Array of Independent Disks. With RAID, your servers can remain functional even if one or more disks in your cluster fail.

A standard used in enterprise servers for decades, the original purpose of RAID was combining inexpensive disk drives into an array that would provide a single storage unit with higher capacity, fault tolerance, and increased disk I/O speeds. As the technology has matured, Raid is now being used to ensure redundancy of Network Attached Storage (or NAS) devices. These storage appliances are common in large enterprise network computing environments.

Read More

Topics: Managed IT

The Internet of Things: Is It Hype or Something More?

Posted by Jeremy Kushner on Aug 23, 2016 6:58:14 AM

Many of us have heard the term "the internet of things" bandied about these days, whether it's in articles in WIRED, the Atlantic, Forbes, or in other spots around the web. Even the best attempts at simplifying just what the internet of things (or IoT) is, though, tend to fall a bit short.

The best way we have to explain it is that the IoT is a term given to an emerging technology, one based around using cloud-connected devices to gather data from sensors that will be used for further analysis. Organization can use the data garnered through the IoT to make cost-saving decisions based around a more intelligent data-gathering base. How does this affect your business? Let's take a deeper look.

Read More

Hosted Exchange or Office 365: Which Is Better For Your Business?

Posted by Jeremy Kushner on Aug 16, 2016 9:45:09 AM

When building an office network, most organizations will end up needing to utilize an enterprise email program for their employees. With the choice coming down to either Hosted Exchange Servers or Office 365, you may be wondering: Which enterprise email solution is best for my company?

Read More

Topics: Managed IT

Firewalls: An Essential Tool For Every Business

Posted by Jeremy Kushner on Aug 9, 2016 7:21:31 AM

We've mentioned before that firewalls should really operate as one of your main lines of defense against cyber attacks. Many startups and small businesses just getting off the ground aren't sure exactly what benefits installing a firewall would provide — an NCSA study shows that only 4% of Americans fully understand the concept of what level of protection it can provide to any organization, whether small business or large enterprise. 44% of respondents actually said that they have zero understanding of a firewall at all, meaning that they are unable to describe the basic functionality of the device.

Today, we'll walk you through Firewalls 101 and why you should ensure your business is protected.

Read More

Topics: IT Security

How PowerShell Can Save You Time And Money on System Administration

Posted by Jeremy Kushner on Aug 2, 2016 6:45:34 AM

When you’re looking for a flexible method of automating administrative tasks on a Windows system, you need to look into PowerShell. Just about anything you can do with a mouse and a keyword can be scripted and automated using the PowerShell program.

Read More

Topics: Managed IT

Physical Device Security is Essential for Cyber Security. Here's Why.

Posted by Jeremy Kushner on Jul 26, 2016 6:38:40 AM

While it may be easy to maintain a loose, decentralized security policy in smaller startups or organiations with few employees, creating and maintaining an explicit physical security policy for all devices that use your network will become increasingly critical as your business or organization grows. 

Physical device security is often overlooked, especially in small-to-medium businesses (or SMBs). Even SMBs with good digital security programs or policies in place may forget about physical security, as they're more focused on product development, sales growth, and other issues, and are inclined to think, "I'll worry about the physical security later on."

Essential IT processes fall off the radar during phases of rapid growth, leaving your organization uniquely vulnerable to cyber attack just when it's most important that you be protected and allowed the space you need to grow.

The truth is, physical security policies are essential. Here's why:

Read More

Topics: IT Security