It is time to swap your physical server for cloud services?

Have you been using your servers for many years and finding that they are now getting old?  Are your systems and applications running slower because your servers have reached their limit?  Are you facing rising costs for the maintenance of your hardware?  It might be time for you to seriously consider swapping your physical servers for cloud services.  All elements of your server infrastructure can be moved to the cloud. The thought of this might fill you with anxiety and seem like an impossible mountain to climb but Ilkley IT can help you and make it a smooth process.

Migrate Files

Migrating your files from your server to the cloud is a straightforward process however the timeline for this needs to be considered.  A realistic timeline needs to be worked out and this can depend on several factors such as the number of files and folders, total amount of data being moved and the complexity of file and sharing permissions.  Ilkley IT will work with you to determine the best plan for this and recommend carrying out the migration during quieter times, such as the weekend to avoid work disruption.

Move to Cloud Software

More and more software companies have cloud-based software products, such as CRM and Accounting packages.  Some companies only have cloud-based software and are moving away from on-premise versions completely.  Cloud-based products can be accessed at any time from any location, whether you are working remotely or from the office.  Accessing tools in the cloud is very secure and provides a huge amount of flexibility.  It makes any product updates much quicker and easier as there is no need to manually install the updates on every single local machine.

Migrate users to Azure Active Directory (AD)

If you are worried that you will lose your log-in details for all the systems and programs you use, there is no need to.  The process to migrate cloud logins for all users can be done seamlessly. Using cloud logins also opens the door for single sign on for 3rd party web applications.

Cloud Printing 

It makes sense if you are moving your server infrastructure to the cloud to also move your on-premise print infrastructure.  Cloud printing is the technology that enables printers to be accessed over the network via the cloud, in simple terms, it is a service that connects your printers to the web.  You can print from anywhere using any internet connected device.

Transitioning Legacy Software to your Cloud Server

Once you have made the decision to migrate your business to the cloud, the second step is to decide which software programmes to take with you.  You might think, well all of them, but it is the perfect opportunity to evaluate the tools you are using and whether these are serving their purpose within your business or not.  Some legacy software might not be compatible with being used as a cloud product, depending on its age but others can be successfully migrated.  It is worth considering if there is a cloud solution offering the same functionality that can replace the legacy software.

The team at Ilkley IT have the expertise to help you to migrate your business to the cloud, so if this is something you are considering, contact us today to find out how we can work with you to do this with minimal disruption to you and your business.

5 Top Tips for Successful Video Conferencing

Conducting business meetings and team meetings online via one of the many platforms such as Zoom, Skype, Microsoft Teams and many other services has always been a part of our business lives but it has now become an everyday occurrence in the “new normal” with many people working from home and unable to visit clients.

With so many people now spending most of their day on video calls as part of their day-to-day activities, how can we make sure we follow the correct etiquette during these virtual interactions?

Here are our 5 top tips for successful video conferencing:

Test your technology:

Check that your technology is working properly, you don’t want to delay a meeting with a client or your team because you can’t get your video conferencing system to work or your audio/video settings are incorrect.

Test the video:

Ahead of signing in and joining an online meeting, test the video.  Use this opportunity to get the camera at exactly the right level – make sure it is slightly above eye level so that the height is at a flattering angle and you are looking directly into the lens.  Make any adjustments by raising your device up on some books or a box to get the correct height.  Also, check if you are sitting too close – arm’s length is the optimal distance from the camera for a video call.

Get the correct light on your face:

Front-facing natural light is always best so open your curtains and your blinds and make sure the light is hitting your face straight on.  Alternatively, if it is an overcast day, put a lamp behind your computer so that it shines on your face.  This will give you a “brighter” look and put you in a very flattering light!  Also check your screen brightness and adjust accordingly if necessary.

Minimise distractions:

Choose a designated area to sit when doing your video calls and make sure you always keep the background neat and tidy to minimise distractions. You will always be ready to do a video call and won’t need to worry about what is in the background.  Some of the video calling services are offering virtual backgrounds, make sure you choose an appropriate one for the call you are on as these can be distracting in themselves.  If you can, go for a neutral colour background.

Treat it like an actual meeting:

Treat it as if you were attending a face-to-face meeting. Make sure you are on time for the call.  Stay professional, wear work- appropriate clothing and make an effort with your appearance.  Mute yourself when you are not speaking, even though you may think you are being quiet, microphones pick up minor background noises and with platforms such as Zoom, the camera flicks to where the noise is coming from, which is distracting for all the participants.

Finally, be prepared and get settled as you would in an actual meeting, have everything you need close to hand as you will not be able to get up during the call!  And most of all, make sure you remember you are on camera, act as if you were together in person.  Pay attention, you can be seen if you get distracted, start doing other work or pick up your phone and look at it!

Get in touch with Ilkley IT if you need any advice on which video conferencing platform would be best for your business and if you need help with getting this set up to ensure a smooth video conferencing experience!

Why you should be using Two-Factor Authentication (2FA) for everything

In this digital age we live in, it seems that there is no end to the attacks that hackers are coming up with and using to target businesses and innocent people.  The malicious attacks and data breaches continue to be more sophisticated and elaborate than ever before and cybercrime shows no signs of slowing down!  Thankfully, there is action that businesses can take to protect themselves and add an additional level of security to protect their online accounts and systems and this is where Two-Factor Authentication (2FA) comes in.  

 What is 2FA? 

 2FA is a second layer of security to protect an account or system.  When you log on to an account or system, you will need to go through two layers of security before being granted access. This might be in the form of code generated via an app or sent as a text message.  

 Why should I use 2FA? 

In general, people tend to use passwords that are very easy to remember or use the same password for multiple accounts.   If a security question is requested during an account set up, usually this is also information that can easily be found out through all your interactions on social networks and other activities online.  This makes life very easy for hackers and leaves your accounts and systems very exposed to cyber-attacks.   Cyber attackers can also use software on their systems to try and crack your password.  The weaker the password, the easier it is for them to crack it.  

The first important thing to do is to use stronger passwords and this is where a password manager is very useful.  2FA then provides you with an extra layer of protection.  It might be easy for cyber criminals to try and guess your password, but it will be very hard for them to guess the second authentication factor as the code changes every 30 seconds.  This drastically reduces the chances of you being hacked.  In an article written by Microsoft, they report that users who enable 2FA for their accounts will end up blocking 99.9% of automated attacks.  

 How to get 2FA working 

There are a few different 2FA methods that can be used, it might be a code issued by your bank when you are using internet banking or a one-time password (OTP) which is sent to your mobile phone.  Authentication apps are a more secure option to use than text message codes as it is easier for a hacker to gain access to text messages than it is for them to gain physical access to your phone and generate a code without you knowing it.  

 Ilkley IT recommend using the Microsoft authenticator app for your Microsoft accounts and Authy for all your other accounts.  One of the advantages of using Authy is that you can use the app on your phone and your other devices such as desktops or laptops. 

 Which sites allow 2FA 

More and more sites are adding the additional level of protection and supporting 2FA when you log on to your accounts on their sites.  You can check which websites offer 2FA by visiting this site https://twofactorauth.org/. 

You can see if 2FA is enabled on your Office 365 account by logging in here: https://aka.ms/mfasetup. If it’s enabled you will be given options to setup 2FA.  

Don’t wait until you have been a victim of a hack or data breach, to introduce 2FA into your businesstake action today.  The team at Ilkley IT can help and can talk you through the steps to enable 2FA on all your Microsoft 365 accounts.  Contact us today to get this essential second layer of security setup, you will be so relieved you did 

 

How the Cloud can help your business

We have now been in lock-down for over 8 weeks and have had to adjust to working from home and working remotely.  Now, as we wait to find out how we are going to navigate returning to work and the likelihood of observing social distancing and a “new normal”, it might be a good time look at how the cloud can really help you with your business.

The word “cloud” is a word that is used all the time which can sometimes cause a lot of anxiety for business owners.  The cloud is a shortening for “cloud computing” which are servers, storage, databases etc which are on the internet making data accessible anytime, anywhere, from any connected device.  The cloud has many benefits, making it easier to work from anywhere rather than remoting into your local machine.  Let’s consider these:

Remote Access and Mobile working:

Cloud computing allows anyone to connect seamlessly at any time of the day from any location from any device.  This makes it easy and flexible for all your team to work at any place and time, being able to access the data whether they are in the office or working remotely.

Information sharing and collaboration:

Wherever your team is located, they will be able to collaborate on documents together in real time, rather than emailing documents back and forth and saving local copies on their machines.  This makes sharing of information and data simple and easy.

File Storage:

You probably store many files within your business, some of them large video or picture files.  These files can take up a significant amount of space on your hard drive which could cause problems with having enough space and is costly to keep upgrading the disc space.  The cloud allows you store these large files but still have access to them on a day-to-day basis.

Flexibility and Growth Planning:

The cloud can grow as your business needs grows giving you flexibility to be agile enough to adjust accordingly.  When software updates are required, these are usually done automatically which is much quicker and easier and saves time as there is no need to manually install the updates on every single local machine.

Data Security:

This is one of the most crucial things you can do in your business. The cloud is secure in many ways constantly backing up your data as you work. The cloud also gives more storage capacity and is more secure than keeping it on your own computer as there is less chance of losing information.   If a computer is stolen, for example, everything stored on it is stolen too. When those files are also stored on the cloud, downloading them to a new computer is simple.  There is a misconception that storing data in the cloud means it is backed up.  Unfortunately, people delete data, mostly accidentally, sometimes intentionally.  There are also threats from hackers and malware This means that even in the cloud, data can be lost.     We recommend using a 3rd party SaaS protection as a backup system.  We can manage the entire process for you and support you through the set up and with any issues after that.

Security:

Cloud storage is safe as the data is encrypted but Two Factor Authentication (2FA) provides an extra level of protection in the cloud.  If a hacker tries to sign into any of your accounts, it will be flagged up to you that there is a sign in from an unrecognised device and they won’t be able to go any further as they won’t be able to provide the second form of authentication.

Cloud-based computing is the future for small and medium sized businesses, Gartner forecasts that up to 60% of business owners will be relying on the cloud for hosting data by 2022, roughly doubling the numbers since 2018.  Considering the COVID-19 situation, this number is bound to be higher now.  On-prem servers can be very costly and time consuming with having to run software updates and manage email and file servers.  There are many cloud-based tools and applications that you can use within your business which can help you to consolidate separate applications into one multi-application and save a lot of time – the tools are out there and they work.

Our team at Ilkley IT can talk you through all the options available to you for your business.  We will take the time to understand your needs and make the best-fit recommendations to benefit your business to enable you to work from anywhere at any time.

Most common cyberthreats and how to avoid them

Most common cyberthreats and how to avoid them

As we know, there are many types of cyberthreats, all of which can be harmful to your business. Understanding the different types of threats and having the appropriate preventative and reactive measures in place is key for all businesses to mitigate risk.

Cyberthreats are caused by vulnerabilities. Most software will have a vulnerability – a security ‘fault’ or ‘hole’ – at some point in its life due to incompatibility with the operating system for example, or simply the way it’s built. It’s worth noting that the vulnerabilities themselves are not an issue, but it’s these that viruses take advantage of; vulnerabilities allow access to PCs and Servers.

Once cybercriminals have taken advantage of the vulnerabilities and gained access, the results can be wide ranging, from harvesting personal data, usernames, passwords and bank details, to encrypting data for blackmail purposes. Many viruses can run on a machine without the end user even knowing. Human error is typically the cause and starting point of the spread of the infection. Here’s what your end users can look out for to prevent the spread of infections.

Phishing emails

Phishing, or mass spamming, campaigns are emails that appear to be genuine that are sent to hundreds or thousands of different people. They’ll encourage you to click on an illegitimate link or download something that will then cause an infection. These emails are designed to look genuine so can be very difficult to spot. Users can click on the sender email address; if it doesn’t match the person signing the email, then you can safely delete the email.

Spear phishing

Spear phishing has the same aim as phishing – to get the user to open a link or download something which will cause a virus. In contrast to phishing, spear phishing uses personal information in order to create a targeted email. The information they use might be openly available on the web or social media accounts for example.

We’re increasingly sharing more and more of our lives publicly and on social media. Unfortunately, this makes it easier to find the information needed for spear phishing attacks. In a similar vein, each time there’s a data breach, personal information is leaked onto the web. For example, the information of every Yahoo account holder was leaked in 2016. Most of the accounts were dormant so many didn’t take much notice, however the information that was leaked included timeless security questions and their answers (where you were born, your mother’s maiden name etc.). Breaches like this make it easy to construct a convincing spear phishing message.

Ransomware

Last year, we witnessed many ransomware attacks including the WannaCry attack on the NHS. Ransomware encrypts users’ data and then demands a payment to decrypt it. The payment amount generally rises the longer the payment is left and if no ransom is paid, the data will be deleted. The payments are normally made using BitCoin, a virtual currency. When a payment is made, the data will typically be deleted and restored back to its original location, but there is no guarantee that that will be the case. The cybercriminals could demand further payments for example.

Solutions

There are many types of cyberthreats, but just a handful of protective measures can protect you against them all.

We offer IT Support Contracts. For one monthly charge we can provide and manage everything that you’ll need to keep your infrastructure safe. We proactively monitor your entire infrastructure for you, often dealing with issues before users even realise. As part of our IT Support Contracts, we use the following products:

ESET Endpoint Security – an antivirus solution that detects and eliminates all types of threats with low resource usage, and cross-platform protection.

Clunk Click Online Pro – backup your data to secure offsite datacentres. Data is encrypted at source, in transit, and at rest for complete security. Restore your data easily in the event of data loss.

Mako – a network router with a firewall controls the traffic that’s allowed in and out of your network. It allows you to access the internet safely with a low chance of spurious links and traffic.

Office 365 – Office 365 has inbuilt security features to keep your data safe, as well as additional products such as Advanced Threat Protection which detects and detonates any spurious links or attachments.

Why Ilkley IT Services?

We help small and medium-sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong, we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools, we are well equipped to get you back up and running in the quickest possible time.

Ilkley IT Services continue to provide us with excellent and prompt computer support. Knowing that any IT issues will be dealt with in a swift manner gives us peace of mind and keeps our busy office running smoothly.

Abbeyfield the Dales
Abbeyfield the DalesGwen

The insight and technical acumen which Warren and his team have brought to the table has been immensely valuable and they’ve made the process smooth and straight forward – highly recommended!

Secret Drawer
Secret DrawerRichard

Cloud Nine Hair is very pleased with the way in which Ilkley IT Services conducted themselves throughout our entire move to new offices and warehouse...We continue to work with Ilkley IT Services who provide us with excellent computer support and strongly recommend them to any future customers.

Cloud Nine Hair
Cloud Nine HairMartin

Ilkley IT have offered great support and advice over the years... Friendly people and a good service. We wouldn’t hesitate to recommend Ilkley IT Services.

Room To Grow
Room To GrowAnne

Like many businesses, we rely heavily on our IT set up to function. From taking orders to running the warehouse, our computer and information resources are central to how we work.

Harrison Bathrooms
Harrison BathroomsJames

When our IT equipment recently needed refreshing, Ilkley IT Services did an excellent job in providing the necessary materials for our team to perform... I have no hesitation in recommending Ilkley IT Services to other companies requiring professional IT support and consultation.

KineholmeDarren

I would like to express our sincere thanks to Ilkley IT for their excellent technical support, that has on a number of occasions been lifesaving. Computers in our Dental Surgeries are critical, and the fast repairs carried out by Ilkley IT has been vital to our being able to continue to offer a high level of care for our patients.

Ilkley Dental
Ilkley DentalLiz

How can we help?


 

What is Microsoft Teams?

What is Microsoft Teams?

Since Microsoft Teams was first released in 2017 it’s been adopted by over 200,000 users globally. With a host of functions and tools, Microsoft Teams aids collaboration and efficiency by acting as a central communications hub, pulling in information from other Office 365 products and resources.

A chat-centred workspace

Microsoft Teams is first and foremost a communication space. You’re able to chat easily to different groups of people (your ‘teams’) regardless of whether they are inside or outside your organisation. You might have a Marketing team for example, a Finance team, or a team with some of your external suppliers. The chat itself is an informal IM style with the availability of emojis, gifs, and stickers. This allows for easy communication to groups of your colleagues.

Easy team and channel creation

Creating and joining teams is easy. You can add both internal and external colleagues to your team with just an email address. You can add people after the conversation has started too with the ability to choose how much conversation history they can see – no history, the previous day, or all time.

In order to keep chat organised, users can create channels. These channels are usually topic based, but you can name them whatever you’d like. A new function in Teams is the ability to mute, hide or leave chats. This means that you can keep all your chats and teams relevant to you. If there’s a channel that you’re especially interested in, you can follow it to receive notifications about that chat.

App integration

Teams integrates with both Microsoft and third-party applications. These apps mean that you can present data to your colleagues, send them documents, and organise meetings etc. directly within the Teams space. Not only can you view data and documents, but you can edit them too. For example, if the team is sent an Excel document, you can open up and edit the document within the Teams workspace allowing for easy and efficient collaboration. Any documents shared within the team are automatically uploaded to SharePoint, so all your documents are stored in one, easy to find location.

A new feature within Teams is an app store. This will enable you to search for and integrate apps into your Teams sites quickly and easily. Microsoft are consistently increasing the number of apps that can integrate, so they’ll be something for everything you need!

Communication Hub

Teams is increasingly becoming a complete communication hub. It now has the functionality of Skype for Business integrated into its workspace, so you can make calls from within Teams to anyone regardless of whether they use Teams themselves. You can also receive calls to any Skype for Business enabled device. In addition to this, you can arrange, carry out, and record team meetings easily. Recordings of meetings are automatically uploaded and stored in Stream for future reference, or for those that missed the meeting for example. The integration of Skype for Business and other apps means that users are starting to carry out their entire work day within Teams.

Teams is available in most Office 365 plans for no extra cost. However, there is currently a 12-month free trial available to users that do not have access to Teams in their plan, and even for customers that don’t use Office 365 at all. If you’re interested in starting a free trial, or would like any more information on Teams, please feel free to give us a call.

 

Why Ilkley IT Services?

We help small and medium sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools we are well equipped to get you back up and running in the quickest possible time.

How can we help?

Please complete the following information

1 + 6 = ?

 

ESET antivirus

Why do you need business grade antivirus?

We all know that the internet can be a dangerous and unsafe place. Unfortunately, anybody can fall victim to malware attacks – even the most tech-savvy of us – which is why it’s so important to have a secure IT infrastructure in place. A fundamental element of this is antivirus. Here at Ilkley IT Services, we only endorse products that we believe to be the industry’s best, and for antivirus that’s ESET Endpoint Security.

With this in mind, today we thought we’d share the top business benefits of having a professional antivirus solution.

  1. Complete network security

Let’s not overlook the obvious: an antivirus solution protects your network from viruses and other threats. Antivirus solutions will block viruses that would otherwise enter your network by clicking on a spurious link or entering a malicious site for example. Viruses can cause a whole host of different problems if they get onto your PC. They could make your PC run slowly, delete your data, record your usernames and passwords, and cause irreparable damage too.

Viruses can self-replicate and spread throughout your entire network as well. Protecting every machine in the network is really important and will prevent your network falling victim to a viral attack.

ESET Endpoint Security eliminates all types of threats including spyware, worms, rootkits, and viruses, so your machine and network has got protection online and off. ESET uses a reputation database to live scan objects and see whether they’re known to be malicious. The database is utilised through the Cloud-powered scanning functionality, ensuring quicker scanning speeds and fewer false positives.

  1. Keep your data safe

Typically, the main aim of viruses and malware is to collect data – hackers want personal details, credit card details, passwords, and confidential documents. The hackers might then sell this on the Dark Web for example. A professional antivirus solution will protect your data from intruders, keeping it safe. ESET has a Host-based Intrusion Prevention System (HIPS) which provides protection from tampering but also protects system registry, processes, applications, and files from unauthorised modification. You can customise the system behaviour down to a granular level and also detect unknown threats purely from suspicious behaviour.

  1. Prolong the life of your hardware

Viruses and malware can gradually deteriorate your computer (especially if they’re not dealt with), making even the simplest of tasks impossible to perform. A slow sluggish computer can be frustrating and hinder productivity. This can cause you to update your hardware much sooner than you’d need if you’d prevented viruses with an antivirus solution. This means that you’ll be getting the most out of your hardware investment as well.

  1. You’re in control

Professional antivirus solutions will provide you with the ability to customise your solution, select policies, and most importantly manage your antivirus easily. ESET Endpoint Security has an intuitive user interface that is customisable meaning that you can easily manage aspects of the solution yourself, or you can leave it completely to us to manage. ESET also has an auto scan of removeable media, removing the risk of autorun or other removeable threats. However, you can customise the parameters for media and devices, giving you complete control of whether your machine will read/write, read, or block devices.

Why ESET Endpoint Security?

ESET’s Endpoint Security has an unmatched record for stopping in-the-wild viruses in VB100 tests. It also has the lowest impact on memory usage and system performance amongst all leading antivirus solutions. This means that you can continue working as normal without the lag that other antivirus solutions can cause. ESET Endpoint Security protects across different platforms too: you’ll be protected regardless of whether you’re interacting with Windows, Mac, or Linux machines.

 

 

Why Ilkley IT Services?

We help small and medium sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools we are well equipped to get you back up and running in the quickest possible time.

How can we help?

Please complete the following information

2 + 4 = ?

 

What is Mobile Device Management?

What is Mobile Device Management?

Mobile Device Management (MDM) is the use of software to monitor, secure, manage and support mobile devices in the workplace, regardless of whether they are corporate or user owned.

Whether it’s via a smartphone, tablet, laptop or desktop, employees can access company data from anywhere more easily than ever. Whilst this is great for productivity it also raises security issues that if unaddressed could jeopardise the entire network and impact business data/operations.

MDM keeps your corporate information safe by allowing administrators to push out policies to devices, remotely wipe devices if they are lost or stolen, as well as block certain web/app content.

Which software do we recommend?

At Ilkley IT Services, our chosen Mobile Device Management solution is provided by ESET. Below we discuss the many benefits of adopting ESET MDM for your business.

What are the benefits of ESET MDM?

1. Remote management of users and devices

ESET’s Remote Administrator allows admins to view and manage all devices from a single point. The ability to push out policies in batches and adjust settings remotely is a huge time saver – admins won’t have to go onto every device in the organisation to make changes.

2. Anti-theft protection – Lock, unlock or delete all corporate data on any device

Lost or stolen company devices can contain sensitive information. With anti-theft protection you can remotely lock or unlock devices, or if needed, completely wipe all corporate data from the device, keeping your data secure even if a device is lost or stolen.

3. Application control

Administrators have control over apps too. Apps can be blocked on an individual basis, by type (gaming for example), or by permissions (if they require access to contact lists for example). To add further control, admins can whitelist apps too. Similar rules can be applied to web content as well – block certain types of content (adult sites for example) or specific URLs.

4. Regulatory compliance

With GDPR now in affect it’s never been more important to be in control of your network integrity. Should an unauthorised device compromise or deceive your business’s security your business could face fines for not correctly protecting business information. With ESET Mobile Device Management’s reporting capabilities, remote management, security and permission restrictions this massively boosts network integrity and mitigates risk of data breaches.

5. Controlled Device Updates

Making sure that all systems are up-to-date and patched is a vital component of IT security. With Mobile Device Management, updates can be centrally controlled and audited. This not only protects your devices and data, but is also a requirement for compliance regulations, such as HIPAA, SOX, and PCI.

6. Supports bring your own device (BYOD)

Historically it’s always been a risk to allow external devices into your corporate network and to access information outside of the office. With MDM you can embrace BYOD and allow external devices to access business information on the go knowing that it won’t compromise security. Have a more productive workforce that can work on the move, improve productivity and help you save on hardware if employees would rather work from their own devices.

Does it matter what operating system we’re using?

ESET has an MDM solution for both Android and Apple Devices. The licensing for both solutions is easy – you can add and remove licenses to ensure you’re only paying for what you’re using. You can also migrate seats from one device to another, regardless of the operating system. For example, if a user switches from an Android to Apple device, you can switch the licence over easily.

Both products, like all ESET products, have low resource usage meaning that it will have a minimal effect on battery and will not cause lagging, both products have a single pane of glass making management easy regardless of OS, and both products benefit from a simple monthly payment model as well.

Why Ilkley IT Services?

We help small and medium sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools we are well equipped to get you back up and running in the quickest possible time.

How can we help?

Please complete the following information

1 + 0 = ?

 

Backup vs Disaster Recovery

Backup vs Disaster Recovery

Backup is necessary for all businesses. Backup ensures that in an event of data loss, you can restore your data and continue with minimal business downtime. However, in a situation where you’ve lost what you need to restore your data to, you’ll need a full system recovery solution. This blog will explain the difference between backup and disaster recovery.

What is backup?

The backup software we use is Clunk Click Online Pro. This software takes a copy of your files and stores it in our datacentre. The backups are scheduled so happen automatically, meaning no human intervention is required. You choose which data you want to backup and how often.

The backup software scans for three types of data: data that existed during the last backup but has changed, data that existed during the last backup and is the same, and data that is new. Only the new data and changed data are backed up. This is called incremental backup meaning there’s no duplication of data ensuring that you’re getting the most from your storage. This also minimises bandwidth so your backups don’t interfere with your working day.

Clunk Click Online Pro is able to backup all types of data including transactional databases. It also stores previous backups meaning that you can restore backups that aren’t just the most recent one. For example, if a virus goes undetected you’re able to restore data from a time prior to infection – without this feature you’d be restoring the virus back onto your machine.

In an event of data loss, you can access a file through:

  • InstantData allowing you to instantly view your data in a web browser;
  • Single file restoration allowing you to restore a single file; or
  • Multiple file restoration allowing you to restore multiple files, or even all your data, onto your server.

What is Disaster Recovery (DR)?

If your computer or server is inaccessible, you’ll need a different location to restore your data to. This might be your previous server if it’s available, a spare server (if you’re fortunate enough to have one lying around!), or a Virtual Machine in a datacentre. A new server, whether physical or virtual, will require time for configuration and set up. This is where Disaster Recovery comes in.

Disaster Recovery means that we’ll take a copy of your server’s settings and configurations when you initiate DR with us, and install these onto a Virtual Machine (VM) in our datacentre. In a disaster scenario or if your server is physically damaged, you’ll have a pre-configured server ready for data restoration.

There’s two types of Disaster Recovery: Warm State and Hot State.

Warm State Disaster Recovery means that we’ll turn on your pre-configured VM in a DR scenario when you need to restore data.

Hot State Disaster Recovery means that the pre-configured VM is running continuously. After every backup a copy will be placed onto your VM, so when it comes to restoration your data is on your VM ready to go. This essentially shortens the restorative process, thereby reducing business downtime.

What are the costs?

For Clunk Click Backup you simply pay for your storage amount.

For Warm State DR you would pay your backup storage amount and a small retainer fee for the target VM. Your VM will be configured, set up and ready to use, but turned off. If you needed to use your DR solution, you would pay for the use of the VM (CPU/Disk/RAM).

With Hot State Disaster, you pay for your backup storage as well as the costs of running the VM (CPU/Disk/RAM).

Post-disaster, you can keep your VM as a permanent replacement and we’ll set up a new DR VM, or you can move your data back down to a physical machine.

Why Ilkley IT Services?

We help small and medium sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools we are well equipped to get you back up and running in the quickest possible time.

How can we help?

Please complete the following information

3 + 3 = ?

 

Cloud vs Server

Cloud vs On Premise Servers

When considering infrastructure changes such as cloud or on premise servers, one aspect that’s often overlooked is the cost of possible downtime caused by hardware failure – most common is RAID failure.

If you use a highly transactional database (a CRM or stock management system for example) and your physical server has a failure, then that downtime will cost the business whilst you wait for your replacement part or installation.

Disk Failure

Single disk failure could put your entire RAID array in danger. If your server is relatively new, and you chose to take a suitable warranty or support agreement from the manufacturer, providing you have no further hardware failures, you’ll probably be okay to carry on working whilst your disk is being rebuilt.

However, there are more issues if you have older tin or tin that’s out of warranty. If a disk fails, you will have to swap it for an identical disk. Finding an identical disk and replacing your old one could take time putting extra load on the other disks. This often causes a domino effect putting your entire RAID in danger of failing. Companies sometimes spend weeks trying to rebuild their RAID array.

Downtime can be crippling

Being out of action for weeks can be financially crippling for a business. Disk failure and subsequent RAID failure can happen at any time and is a risk to your business continuity.

We’ve known companies come to us after being told that replacement parts could take weeks to arrive. Fortunately, we’re able to migrate servers into the Cloud and get organisations back up and running within a few hours.

We appreciate that hindsight is a wonderful thing, but the Cloud has no single point of failure. This means that if a company’s infrastructure was already in the Cloud, and the datacentre suffered hardware failure, their VMs would have seamlessly migrated to a different physical server in the datacentre whilst the hardware was repaired or replaced.

It’s not just RAID array failure that can be a problem. Mother board failures and RAM issues can take days to resolve too. Replacing your entire server could take a week or more to sort as well.

Could your business cope?

There are solutions to the above issues – don’t panic!

A lot of companies have failover kit that they use in situations like the above. The downside to this is that it’s expensive because your upfront costs are doubled (you’ll be buying two servers). It’s inefficient as well because you’ll have idle servers.

You could have your failover kit in the Cloud. This would involve paying a small monthly reservation fee ready for when disaster strikes. You could replicate onsite tin into a datacentre so that if there’s an on-premise failure, the Cloud would take over and your company could carry on working.

We can help

We can help with scoping, building, testing, monitoring, and tweaking resources to ensure you get the performance you require within a budget you can afford.

There are lots of factors to consider when moving your infrastructure. We sell both Cloud servers and physical servers, so we can help you decide which option is best for you and your business. Please get in touch for more information.

Why Ilkley IT Services?

We help small and medium sized businesses who don’t have an in-house IT department maximise and maintain their business IT infrastructure.

We constantly monitor your PCs, network and other IT devices. We’ll often prevent problems from happening without users even knowing, meaning you and your staff continue to work uninterrupted.

On the rare occasions when things do go wrong we’re ready to respond quickly and efficiently. With our vast experience and investment in the best tools we are well equipped to get you back up and running in the quickest possible time.

How can we help?

Please complete the following information

3 + 5 = ?