Why more SMBs are Migrating to the Cloud

Posted by Rob Williams on Tue, Sep 20, 2016 @ 09:30 AM

More small and medium-sized businesses are migrating from local networks to cloud-based voice and data solutions. According to one Intuit survey, 78% of small businesses are anticipated to be fully transitioned to the cloud by the year 2020.

Staffing Service Company Moves Their Voice and Data to the Cloud

There are many good reasons to move voice and data services to the cloud, including reduced operational expenses, increased collaboration, and better security.

Bonney Staffing Services, a light industrial, office, and call-center staffing provider, had been thinking about moving their data services to the cloud. Their server room started experiencing heating issues. Their servers were already in need of replacement when this happened. Additionally, the company was preparing to move to a new office location. These factors influenced the company’s decision to migrate to the cloud.

Read More

Topics: Cloud

5 Reasons Your IBM i Needs the Cloud

Posted by Rob Williams on Wed, Sep 14, 2016 @ 11:12 AM

More and more workloads are moving to the cloud. A recent survey of 400 IT executives from IDG Research and VMware state that 16% of current IT budgets are allocated to public cloud spending. That number is expected to more than double over the next couple of years.

Today, a lot of the workloads moving to the cloud are running on commodity, x86 hardware. This makes sense because there is a lot of commodity options and applications that are not hardware specific. Those applications can be built to move seamlessly between private and public cloud environments.

But what about that large IBM i server that you have in your data center?

If you are like many organizations, you have a server like this running one or more mission-critical applications. The server runs well, it hardly ever has to go offline, and it is capable of handling a massive amount of transactions.

That application is stable, which is why you are probably reluctant to embark on a risky, time-consuming migration to commodity-based hardware. The challenge is managing that system in a modern IT environment.

You may have thought that the cloud was not an option. The truth is, even your IBM i applications can be moved to the cloud. And there are plenty of advantages to making the move.

Read More

Topics: Cloud

Considering VDI? Think Cloud

Posted by Rob Williams on Tue, Sep 06, 2016 @ 09:30 AM

If you are responsible for implementing or managing a Virtual Desktop Infrastructure (VDI), you should consider hosting it in the cloud. Cloud-based VDI, also known as Desktop-as-a-Service (DaaS), has many benefits over the implementation and management of a VDI solution in your data center. These include better security, scalability, and flexibility. Let’s look at a few of the reasons why DaaS is a better solution than a VDI hosted in your LAN or WAN.

Read More

Topics: Cloud

Top 5 Reasons for Virtual Desktop Infrastructure

Posted by Rob Williams on Tue, Aug 30, 2016 @ 09:30 AM

Virtual desktop infrastructure (VDI) is undergoing a transformation as the workplace changes. According to CareerBuilder, 63% of employees surveyed think that the concept of an 8-hour workday is outdated. On top of that, 62% choose to work outside of the 9-to-5 workday. 

Read More

Topics: Cloud Computing, Network

Delta Airlines Outage Illustrates the Need for Business Continuity

Posted by Rob Williams on Tue, Aug 23, 2016 @ 09:30 AM

More details are emerging about the cause of the major outage at Delta Airlines, which caused 2,300 cancellations and 7,000 delays in the span of 3 days. 

The outage will most likely cost Delta tens of millions of dollars. After all, in a similar event, Southwest Airlines experienced a malfunctioning router that ended up costing them $54 million after more than 2,000 of their flights were delayed.

Read More

Topics: Disaster Recovery

Don’t Be a Ransomware Victim: Protecting Your Organization Against the Cryptolocker Virus

Posted by Rob Williams on Tue, Aug 16, 2016 @ 09:30 AM

You open your office computer and see a huge shield on a red background. At the top of the screen you read “Your personal files are encrypted!” A clock counts down the time until a ransom is due. Your blood runs cold. You’re the latest victim of the Cryptolocker virus.

What Is Cryptolocker?

The Cryptolocker virus is a specific type of ransomware. While this Trojan may initially look like legitimate software, it uses an exploit kit to take advantage of vulnerabilities in outdated software, particularly Microsoft Windows.

Read More

Topics: Ransomware

Does Your Disaster Recovery Match Your IT Environment?

Posted by Rob Williams on Tue, Aug 09, 2016 @ 09:30 AM

Experiencing an IT disaster is not a matter of if, but when. According to IDC, over 70% of companies have suffered up to 10 hours of accidental downtime in the past 12 months. Approximately 27% of these organizations estimated the cost of downtime to range between $10,000 and $99,000 per hour.

Your business loses money every minute your employees are denied access to vital data and mission-critical applications. For this reason, you need a disaster recovery solution that guarantees rapid recovery times.

Unfortunately, many companies are relying on disaster recovery strategies that are more appropriate for physical environments, not today’s virtualized and cloud infrastructures. These legacy disaster recovery solutions use physical replication at a secondary site, instead of taking advantage of the flexibility of virtualization.

Learn about what makes for a good disaster recovery plan
in our eBook, 5 Things You Need to Know to Plan Your IT Disaster Recovery.

Read More

Topics: Disaster Recovery, business continuity

How to Simplify Data Center Migration

Posted by Rob Williams on Tue, Aug 02, 2016 @ 09:30 AM

Is it time for you to move your data center? You may be seeing the writing on the wall. Attempts to meet increasing storage needs may have led to server sprawl that eats up energy for cooling and takes up expensive real estate.

Your legacy infrastructure may be unable to meet the performance demands of big data analytics. According to IDC, the volume of valuable data will double by 2020 and 60% of the data will be actionable. If your system experiences long lag times or cannot work with such vast amounts of information, you may be unable to compete when you lose out on real-time insights.

Moving your data center gives you access to state-of-the-art infrastructure resources as well as management and monitoring services. But the migration process can be overwhelming for some companies.

Read More

Topics: Disaster Recovery

5 Reasons You Need a Robust Disaster Recovery Strategy

Posted by Rob Williams on Tue, Jul 26, 2016 @ 09:30 AM

The term disaster recovery inspires images of devastating natural disasters like hurricanes, tornadoes, or earthquakes. While fears about a major disaster are legitimate, they shouldn’t overshadow more common causes for outages and data loss. System failure and data loss happen every day.

Incidents of data loss are increasing every year, not from natural disasters but from attacks by hackers. According to the Identity Theft Resource Center, a total of 269 data breaches occurred by April 2016, compromising more than 11.27 million records.

These deliberate attacks make up only a fraction of data loss incidents. Verizon’s 2015 Data Breach Investigations Report found that 29.4% of data security incidents occur through “miscellaneous errors," making them the top cause.

With the odds stacked against your company, you can’t afford to put off developing a comprehensive disaster recovery plan.

Read More

Topics: Disaster Recovery

Ransomware: It’s Here and It’s Coming for Your SMB

Posted by Rob Williams on Tue, Jul 19, 2016 @ 09:30 AM

For companies that think they are too small to be the victim of a cyber crime, think again. There is a new cyber attack that searches and preys upon SMBs and personal users. Ransomware, otherwise known as a cryptolocker attack, is a sneaky phishing attack that tricks users into downloading malicious code.

This malicious code comes in many disguises and in many shapes and sizes. It can look like an email from a friend or a familiar company, or it could take the appearance of a free download of trial software. What all ransomware attacks have in common, though, is that the malicious code worms a sophisticated encryption into every file within its range.

Sometimes, the victim can be a personal computer. Other times, when a user is connected to a network, that infected encryption code can spread to an entire data center, locking down access to every stored file. This type of attack can be devastating for small and medium business owners. 

Know what makes up a secure and complete DR plan? Check out our eBook,
5 Things You Need to Know to Plan Your IT Disaster Recovery.

Read More

Topics: Security