Feb 18, 2016 | Uncategorized
Moving to the Cloud requires a fast, reliable network to ensure high availability to Cloud applications and their data. Critical systems including Cloud backup, SaaS, VDI, VoIP and other critical systems need consistent broadband access to ensure employee productivity, compliance and keep customer service levels high. This begs the question, is your network ready for the Cloud? Network Assessment for Cloud Readiness When moving to the Cloud it is important to understand where you may have points of failure on your network before they happen. Consider starting with a Network Assessment. By simulating peak loads for voice and data on your network, you can identify weaknesses in a controlled environment. By proactively monitoring your network, you can ping to measure packet loss, latency and uptime; also, you can identify bottlenecks for failure, allowing you to fix problems before they happen. Avoiding unnecessary downtime and/or data loss improves employee productivity and helps ensure compliance. Maintain Network Security and Compliance for Consistent Computing Access Malicious attacks, including cyber threats and unauthorized access to your network, will not only expose you to loss of critical data. They may also degrade your network performance. Unauthorized network use by employees may also consume bandwidth that slows down your network. Unauthorized video streaming and access to unauthorized websites contribute to a slow network. Upgrade or Improve Network Performance There are many options to create an affordable wide area network. Software Defined Wide Area Network (SD-WAN) is an emerging option to create secure, reliable access to your Public or Private Cloud Services. This new technology, which provides centralized management and policy-based enforcement, makes it faster to...
Feb 11, 2016 | Uncategorized
Should you care about how your employees protect their personal passwords? Depending on your password protection policy in the workplace, your employees may create passwords based on familiar passwords they use for personal use. Cybercriminals often hack personal websites for privacy information, including username and passwords, so they can gain access to internal systems. Offering tips to your employees on creating strong passwords may help you protect your valuable corporate data. Passwords are essential for keeping information safe. Since they are a fact of life, we need to know how to keep our systems secure. This takes individual and corporate responsibility. First, individual responsibility. What best practices can individuals establish to keep login credentials safe? Start with a Strong Password Create a strong password, instead of using easy guesses: Though they may be hard to remember, they are also hard for someone else to guess—and hack. Use combinations of capital and lower-case letters; if possible, include numbers and other special characters if your system allows. Numbers can replace letters (3 for “e”, @ for “a”, etc.). Avoid passwords using names of family members, pets, employers or favorite bands. Completely avoid default passwords like “password” or “admin.” Change Your Passwords Frequently Just like you change your smoke alarm batteries, you should change passwords even more frequently. According to a 2014 CompTIA Network+ training blog, change passwords every 30, 60 to 90 days or so. Even if a hacker or malicious site (“malware”) gets the old password, that password cannot be used. Tagging a number to a previous password or using a similar password isn’t safe enough; the new password needs...
Jan 19, 2016 | Uncategorized
Data protection isn’t just about reliably backing up your application data and files. It is also important to be able to rapidly restore data in the event of data loss. In addition to natural disasters, cyberthreat and human error drive the need for a solid data protection plan and reliable network performance. There are many aspects to keeping your data protected and your Network in compliance. Here is a short list of considerations: Networking and Broadband Connectivity Having a fast, reliable network and broadband connectivity helps you gain access to your online backups for rapid recovery of your application data and files in the event of a data loss. Without a reliable network, your time to recover may go from hours to days. There are many affordable ways to avoid unnecessary downtime, including Multi Protocol Label Switching (MPLS) and Software Defined Networks (SDN) options for Wide Area Networking (WAN) and connecting to the Cloud. Without reliability your network may be the weakest link in your data protection plan. Network Security and Compliance Keeping your network security up to date is a critical component of your data protection plan. Making sure all endpoints and servers are protected with Antivirus and Anti Malware threat detection with up-to-date threat definitions will help avoid loss of data due to cyberthreat. Consider routine monitoring of your network to ensure your network is secure. Not only will this help prevent and detect any security breaches, monitoring your network will keep you in compliance with industry regulations including the Payment Card Industry Data Security Standard (PCI DSS), a standard for credit card processing. Employee Awareness of...
Jan 11, 2016 | Uncategorized
Migrating to the Cloud can be bumpy if you are not prepared. Chances are you have already started migrating to the Cloud. Without realizing it, you may be accessing the Cloud by using mobile and web based applications and services that store and share your data from the Cloud. According to International Data Corporation, (IDC) public IT Cloud services (SaaS, PaaS, and IaaS) spending will reach $127 billion in 2018. The Cloud will outpace the total IT market at a rate of more than five times. With this shift, companies are migrating to the Cloud at a rapid pace, so it is important to plan your Cloud migration to avoid any unnecessary turbulence. Low Hanging Fruit for Cloud Migration Many applications lend themselves to Cloud migration. Communications and collaboration applications including Email, Voice and Web conferencing are great places to start your Cloud Migration. The Cloud can offer a secure, reliable and affordable alternative to maintaining these systems on premise. Along with providing additional capability, such as, File Sync and Sharing, previously unavailable from premise based solutions. Many companies have started their Cloud migrations with these subscription services to gain quick benefits from Cloud Computing. Planning Your Cloud Migration Moving your applications and their data to the Cloud, along with reliable data protection and online backup, should be carefully planned. First, determine which applications are candidates for Cloud Computing. When moving files, applications and back ups for data protection to the Cloud, consider your data volumes and network bandwidth. When this business infrastructure is in the Cloud you will need reliable connectivity to access critical information. Maintaining Security in...
Nov 17, 2015 | Uncategorized
What drivers will shape 2016 technology trends? Businesses using customer facing technology for competitive advantage will fuel demand for Cloud Computing, in particular, Software as a Service. The Internet of Everything will amplify the number of connected devices in our world leading to additional needs for data protection and CyberSecurity defense. Mobile computing and Cloud Computing adoption will increase the adoption of fast, affordable and secure broadband networking. Here is the short list of what to expect from the biggest trends in technology for 2016. Cloud Computing Adoption Remains Strong Cloud Computing adoption is expected to continue throughout 2016. Software as a Service (SaaS) applications are expected to lead the way. Migration to Cloud based email, sales and customer management applications and other SaaS solutions will drive Cloud growth in 2016. Infrastructure as a Service (IaaS) will continue to grow, however demand will be driven by backup and disaster recovery, single sign on, file sync and sharing, application hosting and other core IT services. With this increased demand for Cloud Solutions, migration and integration services are expected to also be in high demand. Greater Need for Fast, Affordable and Secure Broadband Mobile Computing and Cloud Computing will put additional demands on network infrastructure. With the additional need for SaaS applications, remote backup and file sync and sharing applications, companies will upgrade business Internet technology for fast and affordable broadband options. Companies will pay particular consideration to available, reliability and security as they adopt broadband network technologies. Internet of Things (IoT): More Devices, More Security Tablets, Laptops, desktops and smartphones are expected to continue to grow. Now Smart Devices or...
Nov 6, 2015 | Uncategorized
Payment Card Industry Data Security Standard (PCI DSS) is a common sense standard based on good IT Security policy. The objective is to protect customer credit card information from compromise. With the holiday season upon us, eCommerce and credit card processing activities will ramp through the end of the year. Trillions of dollars are transacted via credit card every year. So what can you do to ensure your business is PCI compliant? PCI Compliance Assessment Determine if your company policies and procedures ensure PCI compliance. In addition to technology considerations, your employees should be trained on how to protect credit card information. If credit cards are taken over the phone, never write down card numbers. If employees are entering credit card information into an order processing system or payment authorization gateway, ensure the data is encrypted when stored. If your business uses a Cloud Based service, check to ensure they are PCI compliant too. PCI Compliance and Network Security Another consideration for PCI Compliance is your network security. In addition to a firewall, you should lock down any unsecure WiFi access. Unauthorized access to your network could leave your business open to exposure of malware, virus and man in the middle threats in which credit card information can be accessed without your knowledge. Network Monitoring for PCI Compliance PCI Compliance is not a one time effort. To stay compliant you should periodically review your policies and monitor your systems. Periodic network monitoring can detect any unauthorized access, network security violations and any other deficiencies that require immediate remediation. Maintaining PCI compliance for your business helps you avoid costly security...