Virtualisation is different from the cloud
Virtualisation and cloud computing can be confusing, especially to business owners who are not familiar with them. But when you understand their differences, you’ll be able to best take advantage of these technologies.
Virtualisation
Imagine a company with five servers, each assigned a single task such as storage, email, etc. If there were a spike in email traffic, it would overwhelm the email server, causing it to slow down. Adding another server would solve this problem, but it would be expensive and inefficient on days with less traffic.With virtualisation software, you can combine the resources of all five servers in our example. So if the email server gets bogged down, it can borrow resources from any of the other servers with extra capacity. The process is not as simple as it sounds, and businesses often turn to an experienced IT service provider to set up a virtualisation environment.Because virtualisation software can be installed on a server in your office, it is totally independent of cloud technology. Sometimes, people misunderstand the difference because the vast majority of cloud solutions use virtualisation to improve their services.Cloud computingWith cloud computing, users can edit documents, save files, and interact with apps that aren’t actually on their computer. Instead, they access these items by connecting to a server via a network or internet connection.
To carry out its purpose, a cloud platform sometimes uses several virtualised servers to provide users with a simple system that appears to be on its own, even though it’s actually shared with several other users and servers. There’s no need to purchase additional servers, and you can also save valuable office space by not having to deploy bulky equipment.Obviously, scalability is critical in today’s ever-changing business conditions. Cloud computing makes it easier to manage business tasks to maximise productivity. And it helps streamline operations, as more cloud services are integrated. Businesses don’t have to worry about infrastructure maintenance because it is covered by the cloud service provider.Virtualisation and cloud computing are both economical technologies that small businesses should take advantage of. If you want to see what they can do for you, Contact Multi IT Today or call us on 011 435 0450 to discuss your computing needs.
VIEW MORE
Save on printing costs with these 5 tips
Managing your print infrastructure efficiently will minimize your IT budget. It sounds impossible, but it can be done. Many small and big enterprises don't realize that they are using ineffective printing models, but you can make a difference if you follow these tips.
Replace outdated printers
Outdated and cheap printers may be functional, but they are putting a huge dent in your IT budget.
Any piece of equipment that is seven years old (or older) requires frequent repairs and causes more trouble than it’s worth. Because old printers are no longer under warranty, fixing them is more costly and challenging. It’s also difficult to replace parts for old printers because manufacturers have stopped carrying them for models that have been phased out.
When you replace outdated equipment with newer, multi-functional printers, you’re investing in hardware that will pay for itself with increases in productivity and efficiency.
Avoid purchasing unnecessary supplies
A poorly managed printer environment could result in a stockpile of cartridges, toners, and reams of paper. This happens when, for example, an employee uses a printer that’s about to run out of ink and makes an unnecessary request for new ink or toner. This is more common than you may think, and definitely more expensive.
In the absence of a dedicated printer manager, you can avoid this situation by automating supply replacement. Assign a point person to proactively place orders when supplies are about to run out, so your company can avoid needless purchases.
Impose strict process workflows
Submitting expense reports, filing reimbursements, and other administrative tasks require a proper document workflow. Without a guideline, employees and administrative staff tend to print an unnecessary amount of documents.
Automate your company’s document-driven processes to reduce or prevent redundant print jobs that result in stacks of abandoned documents. Not only are these printouts wasteful, they're also a security and privacy concern.
Go paperless
Designing a document management solution that reduces paper consumption is the best way to save money. It may not be possible in every department, but those who can do their jobs without printing should be encouraged to do so by management. Printing lengthy email chains that can be discussed in a meeting is just one example of a wasteful practice that should be avoided.
Reduce IT support calls for printing issues
Calling your company’s IT guys to assist with problems like paper jams, printer Wi-Fi issues, and other concerns reduces employee frustration. You and your IT personnel could avoid dealing with these productivity killers by identifying the problem areas of your print environment. Then, you can work on solutions specific to your office, such as drafting a printing workflow, or getting help from document management experts who can recommend time- and budget-saving solutions.
Having a group of experts manage your IT workflow can make your day-to-day operations more efficient and help you save on printing costs. Our experts will gladly recommend best practices and tips on document management. Contact Multi IT today or give us a call on 011 435 0450
VIEW MORE
Are autocomplete passwords safe?
Advertisements and suggestions based on our internet browsing habits are sources of online tracking. However, autocomplete passwords are also another source of online tracking. This sneaky tactic comes with serious security risks. Here’s how you can stop it from targeting you.
Why autocomplete passwords are so dangerous
As of December 2018, there are 4.1 billion internet users in the world. This means users have to create dozens of passwords, either to protect their account or simply to meet the password-creation requirements of the platform they're using. Unfortunately, only 20% of internet users have different passwords for their multiple online accounts.Certain web browsers have integrated a mechanism that enables usernames and passwords to be automatically entered into a web form. On the other hand, password manager applications have made it easy to access login credentials. But these aren't completely safe.Tricking a browser or password manager into giving up this saved information is incredibly simple. All a hacker needs to do is place an invisible form on a compromised webpage to collect users’ login information.
Using auto-fill to track users
For over a decade, there's been a password security tug-of-war between hackers and cybersecurity professionals. Little do many people know that shrewd digital marketers also use password auto-fill to track user activity.
Digital marketing groups AdThink and OnAudience have been placing these invisible login forms on websites to track the sites that users visit. They've made no attempts to steal passwords, but security professionals said it wouldn’t have been hard for them to do. AdThink and OnAudience simply tracked people based on the usernames in hidden auto-fill forms and sold the information they gathered to advertisers.
One simple security tip for today
A quick and effective way to improve your account security is to turn off auto-fill in your web browser. Here's how to do it:
If you’re using Chrome – Open the Settings window, click Advanced, and select the appropriate settings under Manage Passwords.If you’re using Firefox – Open the Options window, click Privacy, and under the History heading, select “Firefox will: Use custom settings for history.” In the new window, disable “Remember search and form history.”If you’re using Safari – Open the Preferences window, select the Auto-fill tab, and turn off all the features related to usernames and passwords.
This is just one small thing you can do to keep your accounts and the information they contain safe. For managed, 24×7 cybersecurity assistance that goes far beyond protecting your privacy, contact Multi IT or call us today on 011 435 0450
VIEW MORE
5 Essential Steps to Moving Workloads to the Cloud
Migrating your business operations to the cloud isn’t a decision you can avoid. If you’re not among the 96 percent of businesses that are already leveraging multiple cloud solutions, it’s time to recognise that the cloud is here to stay, and your business needs to plan your cloud strategy – one step at a time.
5 Essential Steps to Moving Workloads to the Cloud
Step 1: Consult with an expert
The first step toward successful cloud migration is to find an IT partner with a holistic approach who can architect a solution that serves your strategy, business needs and budget. As one of Microsoft’s Top 100 Partners, Multi IT & Telephony Solutions is committed to Microsoft solutions, particularly Azure, Microsoft’s public cloud platform. Multi IT & Telephony Solutions is one of a select few managed service providers with a dedicated Microsoft Partner Development Manager (PDM) to provide essential, exclusive resources for ProviDyn clients.
Step 2: Assess readiness
Assessing your readiness to move additional workloads to the cloud helps determine what parts of your operations will benefit the most from the transition. You don’t have to move all functions to the cloud all at once or at all – your needs may be met with a hybrid combination of on-premise and cloud solutions.
Our assessment also considers the anticipated ongoing costs. Metered cloud usage via Microsoft Azure allows businesses to pay as they go without incurring expenses for resources not currently being used. The assessment also determines if the timing is right for your business to begin moving new workloads to the cloud.
Step 3: Plan the cloud migration project
After assessing your readiness for this initiative, the next step is to decide how to execute your migration project. Will you have your in-house IT team take it on or would it be more streamlined to work with a consultant who has years of experience working in a wide variety of cloud environments?
Problems could arise if your IT provider has no experience moving functions to the cloud. Challenges with keeping staff working and moving forward with your business may result in unplanned or excessive downtime. We use a project sharing tool that allows users to see and collaborate on migration projects in progress, increasing efficiency across departments. Our process also means Zero Downtime during migration.
Step 4: Identify the right cloud solution
The cloud readiness assessment and project management decisions bring you to Step 4 – figuring out which cloud solution is right for you based on your industry, business size, future growth projections and desired outcomes. The three options include:
Infrastructure as a Service (IaaS)
This is where you transition physical server and data centre assets to the cloud. You’re getting rid of your hardware, but still, managing your operating systems and software in the cloud. This option may include Rackspace, Amazon EC2 and Microsoft Azure.
Platform as a Service (PaaS)
You’re shifting operating systems and applications to the cloud, along with the management of those applications and systems. Planning is particularly critical if you choose this route. Examples are Microsoft Azure and AWS Elastic Bean Stalk.
Software as a Service (SaaS)
SaaS is simply your applications in the cloud and reduces or eliminates the need for supporting infrastructure; applications are accessed through a browser. This could be Dropbox, Box, Microsoft Office 365, G Suite, QuickBooks and Salesforce.
Step 5: Determine how you’ll support your cloud
After completion of your cloud migration project, the management and maintenance of your cloud solutions can be self-supported in-house or through Multi IT & Telephony Solutions ongoing fully managed services, which include 24/7 monitoring, cyber security protection, integration with other applications, proactive troubleshooting, help desk support, data backup and disaster recovery as well as managing the overall health of the environment.
Where to start
Check off Steps 1 and 2 with a cloud readiness assessment by Multi IT & Telephony Solutions expert IT team. Contact us by phone at 011 435 0450 or contact us online
VIEW MORE
4 types of hackers that may target SMBs
When it comes to cyberattacks, most business owners get hung up on the technical and logistical details, forgetting another important aspect: motive. Why are hackers attacking people and organizations? And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need the most protection.
Script Kiddies
Skill-wise, script kiddies (or skids, for short) are at the bottom of the hacker totem pole. Their name comes from the fact that they use scripts or other automated tools written by others. Most of the time, script kiddies are young people on a quest for internet notoriety. Or, more often than not, they’re simply bored and in search of a thrill. Many never become full-time hackers; in fact, many script kiddies end up using their skills for the greater good, working in the security industry.
Though lacking in hacking know-how, script kiddies shouldn’t be dismissed so easily, as they can cause businesses much damage. In May 2000, for instance, a couple of skids sent out an email with the subject line “ILOVEYOU” and ended up causing a reported $10 billion in lost productivity and digital damage.
Hacktivists
Hacktivists are primarily politically motivated, and they often hack into businesses and government systems to promote a particular political agenda or to effect social change. These so-called “hackers with a cause” steal confidential information to expose or simply disrupt their target’s operations.
If you’re a small- or medium-sized (SMB) owner, don’t think for a second that you’re immune to hacktivist attacks. This is especially true if your company is associated or partnered with organizations that are prime hacktivist targets. Or, if your business provides services that can be seen as unethical, you may targeted by hacktivists as well.
Cybercriminals
When a hacker breaks into digital systems or networks with malicious intent, they are considered a cybercriminal. Cybercriminals target everyone from individuals to SMBs to large enterprises and banks that either have a very valuable resource to steal or security that is easy to exploit, or a combination of both.
They can attack in a number of ways, including using social engineering to trick users into volunteering sensitive personal or company data, which they can then sell in underground markets in the dark web. They can also infect computers with ransomware and other malware, or use digital technology to carry out “conventional crimes” like fraud and illegal gambling.
Insiders
Perhaps the scariest type of hacker is the one that lurks within your own organization. An insider can be anyone from current and former employees to contractors to business associates. Oftentimes their mission is payback: to right a wrong they believe a company has done them, they’ll steal sensitive documents or try to disrupt the organization somehow. Edward Snowden is a prime example of an insider who hacked his own organization — the US government.
Now that you know what motivates your enemy, and you think you might be a target, it’s time to secure your business from the different types of hackers out there. Get in touch with Multi IT's experts today on 011 435 0450 to learn how.
VIEW MORE
VPNs: Why you need them
Installing antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, third parties, and ISPs constantly monitoring networks and your online habits, hopping onto a virtual private network (VPN) is crucial for keeping your surfing habits private. Here’s why.
What is a VPN?
The best way to describe a VPN is as a secure tunnel between your device and destinations you visit on the internet. Once you’ve established your PC’s connection to a VPN server, your computer acts as if it’s on the same local connection as the VPN making it seem you moved to a different location. As far as websites are concerned, you’re browsing from that server’s geographical location, not your computer’s actual location.
When you surf the web through a VPN, all the data transmitted and received is also encrypted, preventing anyone — from hackers to government agencies — from monitoring your online activities.
Why should you have one?
Of course, security and privacy are major reasons why you would want a VPN. For example, if you’re connected to a public Wi-Fi network — like the ones you typically encounter at local cafes and airports — using a VPN encrypts the information you’re sending or accessing online. This means your credit card details, login credentials, private conversations, or other sensitive documents can’t be intercepted by a third party.
VPNs are also useful for accessing geo-restricted websites. If you’re traveling abroad and certain US websites are blocked in that region, you can connect to a VPN located in the US to access the sites you need.
Which VPN should you choose?
Given the increasing demand for secure online privacy, VPNs are surging in popularity. The following considerations can help you find the right one.
1. CostWhile free VPNs are available, we strongly suggest you avoid them as they could keep logs of your internet activity, and in some cases sell them to data brokers or worse, cybercriminals.
Maintaining a VPN service is also expensive, which means the free ones will likely plaster ads on your browser to make a quick buck.
Paid VPNs like SurfEasy and StrongVPN often come with more robust features and configurations that keep you secure. Prices differ depending on a VPN’s features and subscription length, and remember that how you pay is also important. Some VPNs offer anonymous payment systems like bitcoin while others allow you to use gift cards to avoid giving out your personal information.
2. LocationThe physical location of VPN servers is important if you want to access region-blocked websites. So if you’re planning on accessing a UK-based service, your VPN provider must at least have servers installed in London.
3. CapacityRead through a VPN provider’s terms of service to determine how much data you’re allowed to use. If possible, find out how many servers a VPN provider has. If they have plenty of servers online, you can rest assured that they have the capacity to support your internet browsing.
4. Device compatibilityAnother important factor to consider is whether the VPN can be used across multiple devices. Nowadays, employees work on laptops, tablets, and smartphones, so you’ll want a VPN that’s compatible with all these.
5. IP leakingBeyond the fundamental nuts and bolts of the VPN protocol, there are other challenges like dealing with leaky tunnels, which means your IP address could be tracked. A great way to evaluate a VPN service is to sign up for their free trial service and visit https://ipleak.net. This will allow you to check whether your real IP address is actually being leaked. If it tracks your physical location, you should opt for a more reliable VPN service.
VPNs are now a vital component of cybersecurity, and if you need help selecting the right one for your business, consult with our security experts today. Give Multi IT a call on 011 435 0450, we’ll assess your tech needs.
VIEW MORE