How Does Data Recovery Work?

Groups of numbers scattered across the image with lines connecting them

How Does Data Recovery Work?

We’ve previously written a blog article describing what data loss is and methods for avoiding it (find it here), but considering how important data is to your business, we wanted to go into more depth about it and in the worst-case scenario, how recovery works.

Data loss comes under two key categories: logical and physical. Logical failures are some of the most common causes of data loss and are due to things such as accidental deletion or disk reformatting. Physical failures specifically occur when physical components of a hard drive have failed or been damaged.

Because it’s better being safe than sorry, we highly recommend your data is always backed up. Not only this, but successful data protection and disaster recovery plans should also follow the 3-2-1 rule. You should always have at least three copies of your data, stored on at least two types of media, with at least one being offsite.

Deployus offers a range of backup solutions utilising Veeam’s availability Suite including Veeam Agent for physical servers and workstations and Veeam Backup for Microsoft Office 365 which delivers a cloud optimised deployment option. Veeam Backup & Replication is implemented for virtual server infrastructure. Using this technology, you can easily backup your data both on-premise and on a Cloud offering of your choice, providing protection against total data loss.

Data Recovery

If you do experience a data loss and your backups aren’t in place, you’ll need to perform data recovery to get your files back. Depending on the cause of your loss, recovery comes in different forms with differing levels of success. There have been rapid advances in recovery software and technology meaning more often than not you’ll be able to recover at least a portion of your data. Keep in mind though, that no information is recoverable after being overwritten, no matter what software or tech you use. 

Data recovery is made possible by operating systems which have been designed for speed; to maximise computing power, the system removes basic references to the files instead of erasing them completely. Recovery software scans the storage drive to find these otherwise inaccessible files and moves them to a separate storage space where they can’t be overwritten.

Logical failures

In instances of logical failures, it depends on your operating system as to how much success you’ll have with recovering your lost files. Windows NTFS systems maintain the file description information making it easier to find than with BSD UFS systems which delete almost all file information straight away. 

As mentioned above, once data is overwritten it cannot be retrieved. Even installing file recovery software can cause this, so we encourage you to do your research before it’s needed and has your chosen software already installed.

Physical failures

Physical failures are more complex than logical failures as data recovery software isn’t enough to get your data back. It requires special equipment and a perfectly clean room to handle and fix delicate components like the circuit board. Work like this must be done by a data recovery company and shouldn’t be attempted on your own as you’re likely to cause more and potentially irreparable damage to the drive.

File corruption

Corrupt files present a different problem to those which are simply lost. Instead of just looking for and recovering lost data, if a file is corrupted you’ll need data repair software which can actually fix it. This software uses standard file headers to recreate those which were corrupted, essentially rewriting them. In severe cases, the software may need sample files which perfectly match the damaged files.

While we’ve had significant advances in data recovery and repair services, it doesn’t mean you’ll always be able to recover lost data and we still recommend solid backup processes to reduce the chances of loss.

Free Technical Site Survey

Reach out to our team to receive a free technical site survey from one of our managed I.T. specialists.

How Digital is Transforming the Future

A dark room with a cluster of blue LED wires connected together

How Digital is Transforming the Future

These days people are being more digitally creative than ever before as they attempt to stay connected, keep working, and keep the world running during COVID. Digital advances have been happening constantly over the past three decades but the last few months have shown some big leaps; and it’s unlikely we’ll ever go back to “normal”.

In its essence, digital transformation encompasses the development of any tools or solutions that improve our processes, products, or experiences. But what might those transformations involve for our future? A special edition of AppDynamics titled “Agents of Transformation” revealed that IT professionals are prioritising the digital customer experience, continuing use of remote working tools, and maintaining more flexible resourcing.

The Digital Customer Experience

Over the past few months, we’ve seen in-person businesses pivot at the drop of a hat to offer their clients services in the only way they can – virtually. Large conferences, gym classes, trade shows, and even wine tastings have all moved to digital platforms and they seem to be working. For the foreseeable future we can expect to see more and more innovations in this space, as tech companies work to make their virtual platforms more accessible to everyday businesses.

As well as this, there have been advances in machine learning technology and its implementation. Rather than huge leaps forward, we can expect to see continued increases in incremental changes which add value to our days. Machine learning is a form of artificial intelligence which can be applied in almost any industry, making it hugely popular for developers and hugely useful for the wider community.

Flexible Resourcing

While it’s long been known that businesses which succeed are those who can be agile and innovative, recent times have made that clearer than ever. Flexible resourcing extends beyond the physical capabilities of businesses to their talent increasing their skills and knowledge, nimble technology use, and experimentation with new, and sometimes untested, digital tools.

For instance, the recent AppDynamics report suggested that “64% of technologists are currently being asked to perform tasks and activities that they’ve never done before.” With pressure like this though, comes less testing, rushed strategies, and potentially a disregard for future-proofing. For tools and advancements which are going to act as more than just a band-aid to current pain points, we need to make sure our technologists are equipped with real-time visibility and insights.

Remote Working

While it started as a necessity, the global, corporate workforce has shown that they’re capable of, and are potentially even more productive, working from home on a regular basis. When clear expectations are set and employees are supplied with the right technology, then telecommuting can have multiple positive impacts ranging from cost-savings to sustainability. SaaS and the cloud have made all of this possible by allowing us to connect and communicate in real time. 

Because of the positive results we’re seeing from the current situation, it’s estimated that 25-30% of the workforce will be working at home on a multiple-days-a-week basis by the end of 2021. This is compared to only 3.6% prior to the COVID outbreak.

Telecommuting poses additional concerns for businesses though, as it can increase the risk of unauthorised systems access, internal IT infrastructure vulnerabilities, increased bandwidth costs and data breaches. If your organisation is moving towards this structure (or already has with the latest COVID restrictions), we’ve created a checklist of minimum safeguards you should put in place which can be accessed in our report here.

We’re happy to talk you through the report, or answer any other questions you may have, so please feel free to contact us via our form and we’ll get in touch as soon as possible!

Free Technical Site Survey

Reach out to our team to receive a free technical site survey from one of our managed I.T. specialists.

Cyber Security: How much could a breach of data cost your business?

Person in a dark room on a computer wearing a face covering to hide their identity

Cyber Security: How much could a breach of data cost your business?

According to a report released by the Office of the Australian Information Commissioner (OAIC) earlier this year, criminal or malicious attacks were the leading cause of data breaches in Australia over the first half of 2020. The health sector reported 22 per cent of all breaches, followed by the finance sector with 14 per cent, and the most common type of information involved was contact information. So how much could a data breach cost your business? 

What is a data breach?  

A data breach occurs when personal information is lost, disclosed or accessed without authorisation. If organisations are covered by the Privacy Act 1988, then they must notify the affected individuals and the OAIC. This is particularly the case when a data breach involving personal information is likely to result in serious harm. 

How could it affect my business?

Cyber attacks in Australia can have a range of detrimental effects on businesses including: 

  • Financial loss – due to the theft of information and/or money or the disruption to business
  • Business loss – due to damage to an organisation’s reputation, or those of other companies you do business with
  • Cost outlay – due to getting affected systems up and running again
  • Investment loss – due to the time taken to notifying the relevant authorities of the incident

How much could a breach cost?

According to IBM’s 2020 Cost of a Data Breach Report, the average data breach cost in the Asia-Pacific (APAC) region is $2.62 million, and in Australia, $2.13 million. APAC organisations have faced the theft or loss of over 11.7 billion records in the past three years, and it was also one of the worst global locations in terms of damages. ‘Damages’ refers to:

  • The average size of a data breach (number of records lost or stolen)
  • The average total cost of a data breach and per record cost
  • Abnormal customer turnover (the greater-than-expected loss of customers since the breach occurred)

These figures were an increase of nearly five per cent year-on-year at a regional level, up from $2.53 million in 2018. In the region, 22,500 records are breached in an average attack. The cost per lost record is around $176, with the process of containing a data breach being around 69 days.

Attacks posed in the APAC region were mainly Denial of Service attacks (DoS attacks), which are massive assaults on a website, and web application attacks. The latter are attacks on computer programs that allow website visitors to submit and retrieve data to/from a database using their preferred web browser.

Businesses surveyed estimated that the total average cost of DoS attacks in APAC region was $1.1 million and the total average cost of web application attacks in APAC over the past 12 months was $2.4 million per company.

Although inadvertent breaches from system glitches and human error were still the cause of nearly half the data breaches in the report, malicious breaches are the most common and the most expensive attacks. These cost companies $4.45 million on average. These breaches are a growing threat, with criminal attacks being the root cause of data breaches. These have increased from 42 per cent to 51 per cent over the past six years of the study.

The misconfiguration of cloud servers also contributed to the exposure of 990 million records in 2018, representing 43 per cent of all lost records for the year.

The report showed that in order to recover from data breaches in Australia, companies were required to invest vast amounts of resources over a long period of time. Only 67 per cent of data breach costs were realised within the first year after a breach, 22 per cent added in the second year and another 11 per cent accumulated more than two years after a breach.

What’s involved in data breach prevention?

Malicious or criminal attacks are a leading cause of data breaches reported to the OAIC, so data privacy and security need to be top of mind as part of an organisation’s overall cyber risk assessment strategy. To mitigate data breaches or spills, the Australian Cyber Security Centre recommends: 

  • Researching, formulating and initiating a robust data breach response plan.
  • Improving employee awareness of cyber security threats and issues, including phishing and spear phishing.
  • Enabling prevention techniques including training employees in cyber security plans and systems.
  • Ensuring employees periodically reset passwords, and increase password length and complexity.
  • Discouraging employees from reusing the same password across critical services like banking sites.
  • Encouraging employees to think carefully before entering credentials.
  • Ensuring employees use multi-factor authentication when performing privileged actions or accessing important data. 
  • Ensuring businesses use multi-factor authentication for all remote access to business systems.
  • Keeping browsers, plugins and operating systems up-to-date with patches and fixes.
  • Enabling anti-virus protection to help guard against malware that steals credentials.
  • Engaging with professional services that offer email security, endpoint protection, multi cloud security and integration, and Next Generation Firewall technology.
For a cyber risk assessment and advice on the implementation of a robust data breach response plan, contact the team at Deployus today!  
 

Free Technical Site Survey

Reach out to our team to receive a free technical site survey from one of our managed I.T. specialists.

What is a Next-Generation Firewall and why do we need it?

Bright light with rays of light beaming from it

What is a Next-Generation Firewall and why do we need it?

Business networks are constantly under threat and often contend with multiple attacks per day. A breach detection system (BDS) is a defensive tool designed to detect the activity of malware inside a network after a breach has occurred. A key component of a robust BDS network security infrastructure is the firewall (FW). 

Because of the changing threat landscape, and with increasingly malicious cyber threats now compromising networks, next generation firewalls (NGFWs) are recommended as part of robust security architecture. But how do NGFWs differ from FWs and why do you need them?

What’s the definition of a Next-Generation Firewall?  

A NGFW is a firewall that moves beyond blocking and protocol/port inspection to add intrusion prevention and application-level inspection by being able to bring intelligence from outside the firewall.

What’s the difference between a FW and a NGFW?

A NGFW is essentially a more advanced version of a FW. Both use VPN support and dynamic and static packet filtering to ensure all connections between the internet, network and firewall are secure and valid. Both should also be able to translate port and network addresses in order to map IPs. However, there are some fundamental differences between them.

The most obvious difference is that NGFWs are able to deep-filter packets based on applications using analysis and signature matching, and they have extensive visibility and control over applications. They are also able to use signature-based IPs and whitelists to distinguish between safe and unwanted applications, irrespective of encryption, evasive tactics or protocols, which are then identified using SSL decryption. 

Another one of the next generation firewall features is that they can protect a network against a variety of threats — both known and unknown. These include malware, spyware, vulnerability exploits, malicious URLs and more Advanced Persistent Threats (APTs).

Why do I need a Next-Generation Firewall? 

User behaviour, network infrastructure and fundamental shifts in the application landscape have steadily eroded the security that traditional firewalls once provided. This is because users are accessing a range of applications on a variety of devices as part of their working life. Virtualisation, mobility, data centre expansion and cloud-based initiatives are also affecting network security.

Traditional responses to threats have included either attempting to ‘lock down’ all application traffic (which can hinder business processes) or allowing all applications to function (which can increase security and business risks).

In order to strike a balance between denying everything and allowing everything, applications need to be safely enabled by considering business-related elements including the application identity, the type of content and who is using it as part of an overall firewall security policy criteria.

What types of attacks can occur?

A BDS defends enterprises from a myriad of malicious attacks, from single independent threats to multiple threats that overwhelm and breach networks and their security mechanisms. A common type of attack is the Denial of Service (DoS) attack, and its off-shoot, the Distributed DoS (DDoS) attack. 

A DoS will shut down machines or networks making them inaccessible to users. A DDoS is more robust, and in its simplest form, it works by storming a network with a large amount of traffic, which overextends and overloads its resources. 


DDoS attacks are increasing due to the rise in Internet of Things (IoT) solutions that are being used for botnets, which is a number of internet-connected devices, each of which is running one or more bots. Botnets can be used to steal data, send spam, perform DDoS attacks and allow the attacker to access the device and its connections. This stretching of resources leaves defences overwhelmed, which allows malware to attack.

What to look for in a NGFW

There are a host of next generation firewall benefits businesses can leverage, including: 
 
Breach prevention and advanced security
The number one role of a firewall should be cyber threat prevention in terms of security breaches and keeping business operations safe. However, firewalls should also have advanced capability to quickly detect advanced malware if it evades front-line defences. Ideally, your NGFW should have: 
  • Prevention capabilities to stop attacks before they impact your network. 
  • A next-generation IPS built-in to identify stealthy threats and stop them quickly. 
  • URL filtering to enforce policies on URLs. 
  • Built-in advanced malware protection and sandboxing that continuously analyses file behaviour to quickly detect and eliminate threats. 
  • Deep-packet inspection (DPI) capabilities to classify applications and detect zero-day vulnerability. 
  • The ability to identify, decrypt and inspect SSL traffic and bypass specific segments according to policy rules.
  • The ability to tie application usage to user identity rather than an IP address, regardless of a device or location. 
  • The ability to incorporate the work of firewalls, antiviruses, and other security applications into one solution, creating a broader and more formidable breach detection system. 
Comprehensive network visibility
Your NGFW should provide full contextual awareness and a holistic view of activity to be able to determine:
  • Threat activity across hosts, users, devices and networks.
  • When and where a threat originated and where it has been across your extended network.
  • Active websites and applications.
  • Communications between file transfers, virtual machines etc.
Flexible management and deployment options
Your NGFW should meet your organisation’s unique requirements regardless of whether you are a small business, SME or a large enterprise, including:
  • Management for every use case, whether it’s from an on-box manager or centralised management across all appliances.
  • The ability to deploy on-site or in the cloud via a virtual firewall.
  • Customised features that meet your needs, including advanced capabilities.
  • The ability to choose from a wide range of throughput speeds.
  • The ability to integrate with other security systems allowing teams to observe and manage all firewall activity through a single dashboard. 
  • The ability to enable IP address and network port management. 
  • The ability to display result analysis and system performance, and update network information to identify new malware attacks.
Fast detection times
A NGFW should be able to:
  • Detect threats in seconds and a successful breach within minutes or hours. 
  • Prioritise alerts so you can take precise and swift action to eliminate threats.
  • Deploy a policy that has automatic enforcement across all facets of your organisation.
Automation and product integrations
A NGFW that works with the rest of your security architecture:
  • Automatically shares policy, event data, threat information and contextual information with web, email, endpoint and network security tools.
  • Automates security tasks like policy management, impact assessment and user identification.
  • Offer uninterrupted operation and therefore business continuity. 
To learn more about NGFW technology that will ensure your data and business networks are safe and secure, contact the team at Deployus today!  

Free Technical Site Survey

Reach out to our team to receive a free technical site survey from one of our managed I.T. specialists.

Why Your Small Business Should Use A VPN

Apple laptop on a desk with a VPN application open

Why Your Small Business Should Use A VPN

According to the Australian government’s Cyber Security Strategy review last year, cyber crimes affected almost one in three Australian adults in 2018. Cyber crimes are also costing Australian businesses an estimated $29 billion per year, regardless of their size. One of the best ways to protect your organisation’s security infrastructure is to install a virtual private network (VPN). But how do they work and what are some of the advantages of a VPN for business?

What is a VPN? 

In simple terms, virtual private networks are a group of computers or discrete networks connected together over a public network — namely, the internet. VPNs secure all of your computers’ internet connections making it harder for others to monitor your presence. In other words, all the data your business is receiving and sending is encrypted and can’t be intercepted and decoded. They do this by creating what is called a secure ‘digital tunnel’ between you and your online destinations. Others can’t see what’s going on in the tunnel, so they can’t monitor your web browsing. 

VPNs also route your information through various services so that it can’t be traced back to you. As far as websites can tell, you’re at one of many worldwide servers that your encrypted data passes through. To them, it looks like you’re based at the location of the nearest server used by your VPN service. 

How Does a VPN Work?

In order to access the internet, you need an IP address. This is how other computers find you to send information when you use the net for web browsing, email or any other online activity. 

In the past, an IT team would implement VPNs using tools that generally combined software and hardware. If your business used a VPN, then the IT team would typically purchase an edge router or firewall that supported VPN tunnelling at the hardware level. They would then purchase the necessary number of VPN software licenses to service the required number of sites or users. This would mean your business would pay for every incoming VPN connection and every tunnel would originate at the user’s device and end at your organisation’s router.

These days, personal VPNs are being sold as services. Companies sell the software portion of the VPN equation to customers, which is basically a VPN application. Once installed, the app will establish the encrypted tunnel but via a server which is operated by the VPN vendor (rather than your company’s router). Then when employees start engaging with cyberspace, it appears as though they are surfing from the vendor’s server rather than their own business device/s.

When you connect to a VPN, you launch a VPN client on your computer (or click a link on a particular website), log in with your personal details, and your computer exchanges trusted keys with a remote server. When both computers have verified each other’s identity, all of your internet communication is encrypted and secured. 

Why Use VPNs?

A secure VPN for business is valuable for a range of reasons including: 

  • Maintaining personal privacy by preventing others having access to your employees’ location, identity and online activities. The potentially darker side to this information gathering includes highly targeted fraud, online scams and identity theft.
  • Protecting the privacy of your entire business and adding additional protection against hacking and surveillance via a dedicated IP address with a dedicated server. This includes ensuring employees that travel for work can access secure resources on the corporate network, including at airports and accommodation venues.
  • Allowing you to access content only available in other countries due to geo-blocking. The term is commonly associated with restricting access to multimedia content (like films and TV shows) for licensing and copyright reasons. However, other uses of geo-blocking include enforcing price discrimination, fraud prevention and location-aware authentication.
  • Avoiding bandwidth throttling, which is when your internet service provider (ISP) detects and de-prioritises specific types of internet traffic (like streaming video or torrent downloads), to alleviate congestion which leads to slower internet speeds. Using a VPN prevents your ISP from detecting the type of information being transferred, so your service functions at an optimal speed.

What To Look For in a VPN Solution

If you are looking for VPN solutions for business to secure your IoT privacy, offer remote access for your employees, or protect networking cloud data centres, you should look for providers that offer: 

Robust security 

Will protect your organisation against viruses and malware by constructing walls against cyber threats and ensuring that devices that have access to the company’s network are compliant and registered. 

Comprehensive protection 

Will ensure you prevent non-compliant devices from accessing your network, gain secure remote access by verifying user identities, and extend protection when users are off the VPN.

Access from anywhere 

Will give any user secure access to your enterprise network from any device in any location at any time, including from a desktop, mobile device or Mac, Windows or Linux computer.

Greater visibility 

Will allow you to improve network operations and defend more effectively by giving you 360-degree insights into user and endpoint behaviour.

Simplified usability 

Will provide a consistent user experience across devices — on and off premises — via a single agent, which will simplify its management. 

Need a robust VPN solution to protect your business from cyber crime? Contact the team at Deployus today! 

Free Technical Site Survey

Reach out to our team to receive a free technical site survey from one of our managed I.T. specialists.

Everything You Need To Know About Data Loss

Abstract blue bright lights with a city behind it

Everything You Need To Know About Data Loss

A recent survey conducted by a multinational technology firm has indicated that almost two-thirds of the Australian companies surveyed experienced some form of data loss during the last 12 months. The majority of those surveyed were also not fully confident in their ability to recover from a data disruption in the future. 

While instigating a robust data protection strategy can be complicated, not doing so can have a disastrous impact on the success and longevity of your business. So what causes data loss and how can you ensure you have the right data recovery strategy in place to maintain business continuity if a loss occurs?

 

What Causes Data Loss? 

Critical data loss can be as a result of a variety of different failures including:

  • Loss or theft of devices
  • Power failures which can corrupt data and hard drives
  • Property damage and arson 
  • Data breaches and cyber crime
  • Virus and malware data corruption

 

What Sort Of Data Can Be Lost?

Businesses often have unique data and system assets they are dependent on. When data loss occurs, key data assets are at stake and these include: 

  • Financial and customer records
  • Communication history like emails
  • Private or important documents on computers and devices
  • Contact information of partners, suppliers and/or customers
  • Programs used to perform and record work

 

How Do I Avoid Data Loss?

In terms of business data recovery, there are a range of key metrics you need to consider, and two of the most crucial are Recovery Time Objective (RTO) and Recovery Point Objective (RPO). 

Both help to determine how often data backups should occur, the maximum tolerable hours for data recovery, and what your data recovery process should look like. However, they are both quite different, so let’s look at their definitions and what makes them unique.

 

Recovery Time Objective (RTO)

Analysing your RTO is also a great first step in terms of establishing a disaster recovery plan — and one that’s absolutely necessary. A RTO helps to calculate how quickly you need to recover your IT services following a disaster before operations are restored. This can dictate the preparations you need to implement and the budget you’ll assign. For example, if your RTO is only five hours, you may need to ensure a higher level of preparation and a bigger budget to ensure systems can be recovered quickly.

However, you need to keep a couple of things in mind. Firstly, you’ll need to base these time measurements on an application-by-application basis, not on a server-by-server basis. Secondly, the timing starts when the application goes offline and doesn’t restart again until end users can effectively access and use the system again. 

Determining a time measurement may sound simple – just ask the users right? But the reality is, even those using the simplest of systems will declare they can’t do without them for more than a few minutes! However, once all users do decide on a reasonable time, you’ll need to combine the individual time estimates for each set of applications on a single server.

In the world of Windows, there may be only one large application on a server, so it’s relatively easy. However, with other systems, there could be dozens of applications on each server. If this is the case with your organisation, you’ll first need to determine if any applications take precedence over others on the same server. If yes, use that application’s RTO as it will no doubt have the smallest RTO threshold. 

Once you’ve determined the RTO, it should be combined with other factors like Recovery Point Objectives (RPO’s) to determine which software and hardware solutions offer the closest match for your organisation’s data protection strategy needs.

 

Recovery Point Objective (RPO)

This metric is a measurement of the loss tolerance of your data, and it is determined by the time between your data backups and the amount of data that could be lost in between those backups due to a disaster. It can also refer to how much data can be lost before your business is significantly harmed, which is also known as your business’ ‘loss tolerance’. 

Because data use has fewer variables and is largely consistent, RPO’s are generally easier to implement than RTO’s. However, because restore times are calculated on your entire organisation and not just your data, the opposite is also true. 

RPO is significant because in most cases, you’re likely to lose some data — even if it’s backed up in real-time. For example, if you back up data every day at midnight and a disaster occurs at 8am, you would lose eight hour’s worth. If your RPO is 24 hours or longer, your data recovery strategy is in good shape. But if your RPO is eight hours, you’re not! 

If you can negotiate a flexible RPO there are a variety of options, including hardware-based mirroring, software-based replication systems and other snapshot tools. These can often be mixed and matched to create a solution that meets RPO’s from a few minutes to several hours. They can also be applied to individual data systems giving them the ability to handle different systems with different RPO estimates.

 

What Are The Main Differences Between Them?

The major difference between the two metrics is their purpose. RTO is usually large-scale and involves your whole business and the systems involved. RPO focuses solely on data and your company’s overall resilience to the loss of it. 

The costs associated with maintaining a demanding RTO may be greater than those of a granular RPO, because RTO involves your entire organisation’s infrastructure, not just data.

 

 

Free Technical Site Survey

Reach out to our team to receive a free technical site survey from one of our managed I.T. specialists.

Is Virtualisation Right For Your Business?

Man plugging in wires to a technology system

Is Virtualisation Right For Your Business?

In today’s competitive business world, companies are constantly looking for ways to improve the efficiency and availability of their operations and resources. However, when it comes to IT, many organisations are deploying servers that are running at a fraction of their capacity. This leads to an excess that is not being consumed, which can lead to higher operating costs. 

Virtualising infrastructure enables you to decrease IT expenses while increasing the productivity, adaptability and performance of your existing resources. But what is virtualisation technology? 

IT virtualisation is basically the foundation of cloud computing. It uses software to create an abstraction layer between software and hardware – in other words, between the storage, computing and network infrastructure and the operating systems and applications that use them. This creates a virtual system comprised of virtual machines (VM’s), which allow organisations to safely run several operating systems and applications on the same computer at the same time.

According to a study done by business technology news company ZDNet, over 49 per cent of Australian and New Zealand (ANZ) organisations have taken advantage of virtualisation technology’s multiple benefits. But is it right for your business? Here are the top 5 benefits of virtualisation that may help you decide. 

Interior of an office building with storage cupboards containing tech equipment

Increased Speed

Virtualisation can increase efficiency with improved responsiveness because it allows you to set up applications, desktops and servers flexibly and rapidly. It’s also an effective way to leverage your hardware as virtualisation allows it to perform at optimal levels.

One of the other advantages of virtualisation is that can decrease the time you spend on maintenance by streamlining and automatically managing a range of tasks. With fewer servers, IT teams will spend less time on maintaining physical hardware. They can install, update and maintain the environment across all the devices on the server instead of going through the laborious process of applying updates server-by-server. 

Virtualisation also drastically improves operational agility by allowing a quicker response time to accommodate your organisation’s ever-changing business needs. You simply scale up when you require extra capacity and scale back when you don’t! 

 

Minimal Data Loss

Typically when an IT disasters or system crash affects a physical server, your IT team will be responsible for fixing or replacing it. This can take hours or even days, particularly if data recovery is involved via a traditional backup process. 

Within a virtualised environment, it’s easy to deploy and provision, allowing your team to replicate or close the virtual machine that’s been affected. 

The recovery process will also usually only take a few minutes as opposed to the hours it would take to provision and set up a new physical server, which means your data will be less vulnerable. The loss to data is also minimised, meaning the resiliency of your IT environment is enhanced and business continuity is improved. 

 

Cost Effectiveness 

Non-virtualised environments can often be inefficient, because when you’re not using applications on the server, it sits idly and isn’t used for other applications. 

When you virtualise an environment, that single physical server transforms into many VM’s. These VM’s can have different operating systems and run different applications while still being hosted on the single physical server.

This means you’ll be cutting down on operating costs, including on staffing, power usage and maintenance, and spending less money on additional servers and new equipment, including the cost to install them. 

 

Enhanced Security

Another one of the important benefits of virtualisation is the security that it offers. Consolidating your data centre ultimately provides you with more control, allowing you to manage all your security requirements from the one place. Virtualised servers can identify and isolate applications that are unstable or compromised, in order to avoid the spreading of any malicious or damaging elements like malware. 

They can make it easier to create more cost-effective intrusion detection, protecting not just the server and the virtual machines but the entire network. They also allow easier monitoring by administrators in terms of viewing traffic and denying access to suspicious users. And a master image of the server can also be created, making it easier to determine if it is acting abnormally or against set parameters. Virtualisation can also give you a safer, virtual environment to test out new network components including software. 

 

A Reduced Carbon Footprint

Another one of the great advantages of virtualisation technology is that it is more environmentally friendly. The daily power consumption of a typical office can be equivalent to the monthly power bill consumption of thousands of homes. Operating fewer servers lowers the demands on both power and cooling requirements, and therefore reduces businesses expenses.

E-waste is also reduced by the reduction of an organisation’s carbon footprint. And because less servers are needed, virtualisation can also result in an increased efficiency in resource management and space utilisation. 


Need an IT specialist who is up to speed with the latest in server virtualisation software and network virtualisation technologies? Contact the team at Deployus today! 

Free Technical Site Survey

Reach out to our team to receive a free technical site survey from one of our managed I.T. specialists.

Top Tips For Working Remotely During COVID-19

Person using macbook pro on a desk

Top Tips For Working Remotely During COVID-19

As the number of COVID-19 infections continues to increase with the World Health Organisation’s declaration of a pandemic, many organisations and their employees have had to adjust to a completely different mode of working. This is proving challenging from both an operational and technology infrastructure perspective. And we’re here to help! Here are our tops tips for working remotely during COVID-19.

 

Have The Right Hardware 

When working remotely, the process obviously needs to be as streamlined as possible – which means you need the right tech! In terms of hardware, you basically have two options – a desktop computer or a laptop. And depending on your job, other valuable hardware can include a decent keyboard and noise-cancelling headphones.

Desktops

Desktops come in all shapes and sizes and one of their benefits is that they can be upgraded fairly easily. Most modern desktops will handle general office work as a minimum, and come in one of two types. The first are towers to which you add a keyboard, mouse and monitor. If this is your preference, a 24-inch screen is ideal with at least 1080p in terms of resolution, which is basically full high definition (HD).

The second type of desktop is an ‘all-in-one’, where the computer is built into the back of the screen. These include Apple’s iMac and Windows PC equivalents. Basic specs you should look for include a decent processor, a minimum of 8GB of RAM, and a machine with a solid-state drive with a minimum of 256GB of storage.  

Laptops

The main advantage of laptops is their portability, however one of their downsides is that they are not ergonomically ideal. If you are choose to work from home during COVID-19 with a laptop, you should try to alleviate hunching over your computer by varying your working position – from sitting at a desk to standing while you work if you can. A riser can also help bring your laptop up to eye level, or you can connect to an external monitor, keyboard and mouse to improve your posture.

Broadly speaking, traditional hinged laptops are cheaper than convertibles (where the screen detaches from the keyboard) and 2-in-1’s (where the keyboard folds around the back). Regardless, it should have at least 8GB of RAM and 256GB of solid-stage drive storage. In terms of screens, 13 inches should be fine for most uses with a resolution of at least 1080p for readability.

Keyboard

External keyboards will keep your home office more ergonomic over time, and if your job involves lots of typing invest in a decent one. Keyboards come in USB or wireless versions that connect via Bluetooth. Bear in mind that wireless keyboards will also normally require batteries – either AA’s or AAA’s. 

Headphones

Noise-cancelling headphones can help block out distractions and are particularly useful for phone calls and video conferencing as most have built-in microphones. Large, over-ear headphones are typically more comfortable for long-term wear than in-ear versions.

 

Have The Right Software

With many employers fully prepared for employees remotely working during COVID-19, you’re probably already sorted with the full range of word processing and video calling capability you need. However if not, we can help you install a wide range of basic software to suit whatever functions your job entails. These include: 

  • Microsoft Office 365
  • Microsoft Azure
  • Microsoft Office Applications 
  • G Suite
  • Amazon Web Services
  • Backup Applications
  • Cloud and Hybrid Cloud Applications
  • Database Applications
Video conferencing

In terms of video conferencing, you may end up using whatever your employer suggests, however our top picks are Zoom, Microsoft Teams and Google Chat. Microsoft’s Skype and Apple’s Face Time also work well and most phone-based messaging apps, including WhatsApp and Facebook Messenger, also offer video chat which can be easier to use.

 

Have The Appropriate Broadband Speed

Broadband speed is essentially how quickly you can download or upload data using your internet connection, and it’s usually expressed in megabits per second (Mbps). In terms of what you need to work remotely during the coronavirus, it depends on the work you do and the apps you use. Here is a guide to how much speed you’ll need for a few of the more popular work-related applications.

Web Browsing

Web pages are getting more complicated, and in fact some sources say the average size has increased from an average size of 200 kilobytes (KB) in 1998 to around 1600KB today. Obtaining the ideal viewing experience usually requires a download speed of at least 3Mbps.

Video calling 

The speed you’ll need for video calling will obviously depend on the platform you’re using, however with Skype for example, a normal two-way video call that’s of a decent quality will require a download/upload speed of around 500 kilobytes per second (kbps). For a HD call, you’ll need 1.5Mbps upload/download. Bandwith requirements will also increase further depending on how many people are involved in the call. 

Cloud Computing

For high bandwidth applications, the higher speed you have the better, however, even on lower broadband speeds of 12Mbps/1Mbps users can still access a range of cloud services.

 

Ask For Help! 

The outbreak of COVID-19 is having significant impacts on the acceleration of tools and technologies that enable people to work remotely. Which is also why technology-centric businesses like ours are becoming more critical for business continuity. 

With our COVID-19 Management Plan, we are committed to assisting our clients with their IT requirements in whatever way we can. Whether it’s redesigning your system to facilitate the best possible remote access, or setting up video conferencing or software applications, please let us know. Our Engineers are here to offer assistance anytime during our Support Hours (Monday to Friday, 6am to 7pm) on our Freecall number (1800 227 569).

 

Finding it challenging to maintain productivity during the challenges of COVID-19? We offer a range of infrastructure, service, continuity and IT cloud services that will keep things running smoothly. Contact us today!  

Free Technical Site Survey

Reach out to our team to receive a free technical site survey from one of our managed I.T. specialists.

COVID-19: Top 5 Ways IT Professionals Can Help

Man sitting at a desk using his laptop

COVID-19: Top 5 Ways IT Professionals Can Help

Working remotely is on the rise like never before as organisations are pressured to sustain operations amid the repercussions of the COVID-19 pandemic. In the face of these challenges, a consistent workforce is a business continuity measure, however to be successful many organisations needs assistance. 

The IT industry is in a great position to be able to offer tangible support so businesses can continue to run efficiently via technologies and other remote working productivity platforms. Here are the Top 5 ways IT professionals can help during covid19 … ie. us!

1 – They Can Help You Harness Technology

Technologies not only support but enhance remote work, and in terms of IT assistance during COVID-19, we offer a wide range of software applications that will help your remote teams thrive. These include: 

Microsoft Office

Microsoft Office is the go-to word processing software for most employers. And apart from its basic applications like Word, Excel, Powerpoint and Outlook, it has a range of other great features including:

  • Microsoft Project – which can assist project manager develop schedules, assign resources, track progress, manage budgets and analyse workloads.
  • Microsoft OneNote – this program is used for free-form information gathering and multi-user collaboration via drawings, notes and screen clippings etc.
  • Microsoft Visio – a diagramming and vector graphics application that’s ideal for any organisations that use diagrams, flowcharts and layouts.

 

Microsoft Office 365

This software suite is a subscription only, cloud-based ‘software as a service’. An extension of Microsoft Office, it also features: 

  • OneDrive for Business – which lets you store, protect and share files and access them from anywhere on all your devices.
  • Teams – a video chat and conferencing application where you can chat from anywhere, and access, share, and edit Word docs, Excel files and PowerPoint slides in ‘real’ time.
  • Customer Relationship Manager – which gives you a complete view of your interactions with your customers, and track tasks and deals in progress. 

 

G Suite

This is a suite of software, cloud computing, productivity and collaboration tools developed by Google Cloud. Apart from the much-used Gmail, Calendar, Photos and Docs, it also features: 

  • Forms – which is a great way to run surveys, gather information and log jobs. 
  • Slides – this program allows you to create new presentations or edit any that were created on the web or on another device.
  • App Maker – lets you build a wide range of apps for your business and customize processes to help you be more efficient.

 

Document Management Systems


We can also help you install a range of efficient document management systems including: 

  • Docushare – which allows you to manage content and develop customized and packaged software applications.
  • Omnipage – this optical character recognition software helps you to import files from different source programs into one useful document. 
  • Evernote – this application can be used to efficiently receive, track, manage and store documents.

 

#2 – They Offer Industry-Specific Solutions

If you work in a specific industry, then your organisation no doubt has certain requirements in terms of bespoke software you need to access in order to work remotely. Sectors we service include: 

  • Engineering 
  • Finance/Payroll 
  • Accounting 
  • Building and Construction 
  • Architecture and Design
  • Dental
  • Medical Specialist
  • Legal Services
  • Project Management
  • Real Estate
  • Recruitment
  • Building 
  • CCTV Security
  • Manufacturing
  • Education
  • Retail

#3 –They Can Assist With Cloud-based Services 

Even before COVID-19, many organisations were already dealing with the downsides of a continual increase in web traffic across the world. As the pandemic spreads and employees work from home, it is envisaged that cloud usage will increase in popularity. But what are the benefits? 

Having a multi-cloud infrastructure can ensure businesses are even more nimble to adjust to demands. Cloud-based services are also flexible meaning they can quickly scale up or down, and organisations can access new and innovative ways to manage their traffic and resources. Some of the services we offer include: 

  • Cloud and Hybrid Cloud Applications
  • Amazon Web Services – which provides on-demand cloud computing platforms and an application programming interface on a metered pay-as-you-go basis.
  • Microsoft Azure – this service allows for the building, testing, deploying and managing of applications and services through Microsoft-managed data centres.

#4 – They Can Elevate Your Security

Over the past few months, the Australian Cyber Security Centre (ACSC) has observed an increase in COVID-19 related malicious activity. So it’s important that you remain vigilant about protecting your data, systems and personal information. Read how you can personally strengthen your cyber security here. We can also offer IT assistance during COVID-19 with our range of security and technical services including: 

  • Cloud backups
  • Storage technologies
  • Power protection
  • Monitoring and maintenance
  • Network security
  • Threat management
  • Breach response
  • Backup application
  • Internet firewalls
  • Disaster Recovery
  • Multi factor authentication
  • VPN software

 

#5 – They Can Provide Expert Advice 

Here at Deployus, our team have been providing a range of IT software, infrastructure, service, continuity and cloud-based solutions to more than 300 businesses across Australia and internationally since 1998. And along with our services, our highly experienced and certified IT engineers and specialists provide valuable advice with our quality output and client satisfaction the ultimate measures of our performance. 

So if you’re finding the challenges of COVID-19 a little overwhelming – particularly if you’re working remotely – we can help. Let’s get through this together!   

Need to get your technologies, cloud services and security up to speed during these challenging times? Contact the team at Deployus today!  

Free Technical Site Survey

Reach out to our team to receive a free technical site survey from one of our managed I.T. specialists.

What Is The Cloud?

Bandwidth close up computer connection

What Is The Cloud?

Often referred to as simply ‘the cloud’, cloud computing is the delivery of on-demand computing resources – from data centres to applications – over the internet on a pay-for-use basis. Essentially, it’s renting instead of buying your I.T.!

When a company chooses to ‘move to the cloud’, it means their IT infrastructure will be stored offsite at a data centre that’s maintained by a cloud computing provider. The provider has the responsibility of managing not just their client’s infrastructure, but their integrating applications and for developing new functionality and capabilities to keep pace with the market’s demands.

Cloud Computing Benefits

Cloud computing offers more scale, agility and flexibility for clients. Rather than investing in software, databases, equipment and resources, clients can harness their computer power via the internet. They also only pay for it when they use it, which allows them to respond quickly to a more complex and fast-paced business landscape. 

Cloud customers also automatically have access to emerging technologies and the latest innovations as their cloud provider takes on the role of developing new features and capabilities. It also allows clients to have IT security maintained for them by their cloud provider including regulatory requirements and potential threats.

Types of Cloud Computing

There are three basic types of clouds – public, private, and hybrid. All of them vary in terms of the amount of management that’s required and the level of security that is provided. 

Public Cloud

In a public cloud infrastructure, the whole computing infrastructure is located on the premises of the cloud provider, and services are delivered to the client via the internet. The client doesn’t need to purchase software, hardware or supporting infrastructure as it is owned by the provider, and they can add more users or computing power as they need. 

Private Cloud

A private cloud infrastructure is operated solely for a single organisation, and managed internally at the organisation’s location or by the cloud provider’s data centre. It provides the highest level of security and control and can be hosted either internally or externally. Private clouds take advantage of a cloud’s efficiencies, avoid multi-tenancy and provide more control over resources.

Hybrid Cloud

A hybrid cloud uses the basic elements of a private cloud combined with the strategic integration and use of public cloud services. Generally the client will host their business-critical applications on their own servers (which allows for more security and control), while their secondary applications will be stored at their cloud provider’s location.

 

Types of Cloud Services

Cloud services generally fall under three categories – Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS)

Software as a Service 

This is a delivery model in which the provider hosts the client’s applications at their location, which the client accesses via the internet. This type of service enables organisations to get up and running quickly with the most innovative technology available. Clients can then dynamically scale services and add more features or services as they grow. Apps and data are also accessible from any connected computer and no data is lost if computers break down as the data is in the cloud! 

Platform as a Service 

This service provides clients with a cloud-based environment with everything they need to support the complete lifecycle of building and delivering web-based applications – without the cost and complexity of buying and managing the underlying infrastructure. The provider hosts the infrastructure and many of the middleware components and the customer accesses those services via a web browser.

Infrastructure as a Service 

This cloud-based model enables clients to access infrastructure services on a pay-per-use basis via the internet including servers, storage, networking and data centre space. Benefits include flexible, innovative services that can be scaled on demand to support dynamic workloads without the cost of the client having to invest in their own hardware.

Complete Cloud Solutions

Here at Deployus, our cloud infrastructure hosting environments allow you to connect from anywhere, at any time through almost any device including tablets, PC’s, laptops and smart phones. We also offer an array of professional IT support services including a 24-hour helpdesk, and maintenance and monitoring programs that ensure continual peak network performance. 

Keen to improve your organisation’s productivity, connectivity and bottom line? Ask us about our cloud infrastructure services today – and advance your business into the 21st century!

Free Technical Site Survey

Reach out to our team to receive a free technical site survey from one of our managed I.T. specialists.