Back to Top

Tech, Web, Cloud & Cabling Services

Category: Online Storage

BigBeagle.com / Online Storage Category

Hillary Clinton’s infamous email server: 6 things you need to know

Hillary Clinton’s use of a private email server when she served as US secretary of state has been a major issue for the 2016 presidential candidate. Here are the six most critical facts about it.

hillary_clinton3_3_3

The FBI recently wrapped up its investigation into Hillary Clinton’s use of a personal email server while she was serving as secretary of state. FBI director James Comey called the actions “extremely careless,” but recommended that no charges be brought against Clinton.

She is now the presumptive Democratic nominee for the upcoming presidential election in November, and her actions relative to the email server have become a hot-button issue among her opponents. The situation, however, is nuanced; and there are a lot of details to understand about the scenario. Here are the most important facts.

1. What happened?

While serving as secretary of state under President Barack Obama, Hillary Clinton used multiple private email servers to communicate regarding government business, according to the State Department. Additionally, it was revealed that Clinton never had a government (.gov) email address while she was serving in her post—we’ll talk about which email address she used in a moment—and her aides did not take any actions to preserve the emails sent through her personal account. This prompted an investigation by the FBI to determine if Clinton intentionally put classified information at risk.

2. Why does it matter?

Clinton handed over 30,000 emails to the State Department, of which 110 contained classified information at the time they either were sent or received, according to the FBI’s findings. During the investigation, though, Clinton asserted that none of the emails she sent or received were classified at the time. The biggest implication has been the potential threat to national security. While the contents of the emails have not fully been released, if they had contained sensitive information it could have possibly fallen into the wrong hands. As noted by the New York Times, Comey said it was “possible” that enemy foreign governments had accessed Clinton’s personal email account.

The second biggest implication is that of transparency. The Federal Records Act requires that all communication in certain branches of government be recorded on government servers, and it forbids the use of a personal email account for government business, unless those emails are then copied and archived. However, there are a lot of technicalities involved, and there is evidence that other government officials had violated the act. As Alex Howardwrote for the Sunlight Foundation, there is also evidence that Clinton tried to control the discoverability of the emails under the Freedom of Information Act (FOIA), which could set a precedent for limiting public access to government records. It is also believed that Clinton deleted 31,000 emails deemed personal in nature before turning the emails over to the State Department.

3. When did it start?

When she was appointed secretary of state in 2009, Clinton began using the email address hdr22@clintonmail.com, tied to a personal server. Clinton’s personal email server was first discovered in 2012, by a House committee investigating the attack on the American Consulate in Benghazi. In 2013, hacker Guccifer claimed to have accessed Clinton’s personal email account and released emails that were allegedly related to the Benghazi attack.

The next year, in the summer of 2015, the State Department began asking Clinton for her emails correspondence, and she responded by delivering boxes containing more than 30,000 printed emails. In early 2015, the New York Times reported that Clinton had been using her personal email exclusively, and never had a government email address. A federal watchdog group issued an 83-page report condemning the “systemic weaknesses” of Clinton’s email practices in May. On Tuesday, the FBI concluded its investigation and recommended against any charges.

4. What tech was used

When Clinton was running for president in 2008, she had a private server installed at her home in Chappaqua, New York. The domains clintonemail.com, wjcoffice.com, and presidentclinton.com, which were registered to a man named Eric Hoteham, all pointed to that server. In 2013, a Denver-based IT company called Platte River Networks was hired to manage the server, but wasn’t cleared to work with classified information. The company executivesreceived death threats for taking on the contract. It was later discovered that multiple private servers were used for Clinton’s email.

Clinton used a BlackBerry phone to communicate during her tenure as secretary of state, including sending and receiving emails through her private server in New York. The State Department expressed concern about the security of the device. Clinton had requested the NSA provide a strengthened BlackBerry, similar to the one used by President Obama. But, her request was denied. Instead, the NSA requested that Clinton use a secure Windows Phone known as the Sectera Edge, but she opted to continue using her personal BlackBerry.

5. Will she be prosecuted?

Right now, it’s too early to tell whether or not Clinton will be charged for her use of private email servers. While Comey’s recommendation that no charges be brought will likely weigh in the decision, it is ultimately up to the US Department of Justice to make the call. However, a recent Politico analysis of multiple, similar cases spanning the past 20 years, seem to point to an indictment being “highly unlikely.” According to a former senior FBI official quoted in the analysis, the Justice Department tends to avoid prosecution in cases that are not “clear-cut.”

6. What can businesses and IT leaders learn?

The first lesson that IT can learn from this situation is that transparency is critical, at all levels in your business. This isn’t to say that the CEO should be broadcasting his or her emails to all employees every week, but steps should be taken to ensure that information can be accessed if need be. As part of adigital leak protection program, security expert John Pironti said that organizations need to know if users are using a personal email account to conduct business.

“This behavior is often a violation of acceptable use policies and can expose an organization’s sensitive information to unsecured systems and e-mail accounts,” Pironti said. “Without this visibility an organization may not be aware that their intellectual property, customer data, or sensitive data assets are not being protected appropriately and they also may be in violation of contractual agreements with their clients regarding the security of their data as well as regulatory requirements.”

The second takeaway for IT is that policies should be enforced from the top down. Sure, a CXO may get their support tickets expedited, but that doesn’t mean that exceptions should be made that could compromise the security or integrity of the organization for the sake of comfort or convenience. Leaders should model the policies that are in place to showcase the importance of adhering to them, especially regarding security and privacy policies.

Finally, the importance of records management should not be overlooked. In Clinton’s case, since multiple servers were used, the FBI had to piece together “millions of email fragments” before they could look into them. Proper labeling and management of all records will make for a more cohesive environment and assist in accountability.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Massive Delta outage highlights need for quality data center power, backup plans

Business leaders must prepare for disasters made by man or Mother Nature with extensive, practiced recovery plans to avoid system shutdowns.

A Delta ground stop was lifted Monday morning following a 2:30 a.m. ET power outage in Atlanta that delayed and cancelled flights worldwide. Businesses should view this as a cautionary tale, highlighting the importance of quality data center power and disaster control systems.

Delta cancelled approximately 300 flights due to the outage. As of 10:30 a.m. ET, it operated 800 of its nearly 6,000 scheduled flights. However, Delta customers heading to the airport on Monday should still expect delays and cancellations, according to a press release. As inquiries are high and wait times are long, there may also be some lag time in the display of accurate flight status from the airline, it warned.

Last month, Southwest Airlines cancelled 1,150 flights after a system outage. Though the system came back online within the day, hundreds of flights were backlogged.

Based on recent research, it’s fair to say that what happened to Delta and Southwest could happen to a number of businesses. Some 57% of small and mid-sized businesses have no recovery plan in the event of a network outage, data loss, or other IT disaster, according to a Symantec study.

“Planning and executing disaster recovery exercises is something that should be done on a regular basis to find out these issues before they may be impactful,” said Mark Jaggers, a Gartner data center recovery and continuity analyst. “The issue, which was also the case with Southwest Airlines, is not planning for partial failure scenarios that are harder to get to the root cause of and work around.”

To avoid shutdowns like Delta’s, company data centers should have redundant power and networking, preferably from a grid and provider, respectively, that are completely independent from the primary ones, Jaggers said.

“Data centers are a huge piece of a disaster recovery plan,” said mission-critical facility management professional Christopher Wade. “To have a reliable infrastructure, you have to minimize single points of failure.” Business leaders should also ask about the experience levels of data center staff, as many of these companies are currently understaffed, Wade added.

Usually, large companies have a primary data center in one location and an alternate in another that is far enough away so the two do not experience the same disaster at the same time, said Roberta Witty, risk and security management analyst at Gartner.

“In today’s world, the business expectation is that you’re up and running quickly after a disaster,” Witty said. “The ‘always on’ driver is changing the way organizations deliver IT in general, and so they are building out their data centers to be more resilient.”

Faster recovery times

About 60% of organizations are moving to a recovery time objective of four hours or less, Witty said. Doing so successfully involves extensive planning. First, determine what business operations are mission critical. Then, consider factors that impact recovery time requirements, such as revenue loss, safety, and brand reputation, and build your recovery infrastructure accordingly. As more companies outsource data operations, a key consideration should be the third party’s ability to meet your recovery requirements, she added.

Crisis management practices, such as the procedures Delta used to notify management and deal with customer fallout, usually get exercised every quarter. “The more you practice your crisis management procedure and communicating with your workforce, customers, suppliers, and partners, the better off you are,” Witty said. “A plan that hasn’t been exercised is not a workable plan.”

Disaster recovery can’t be something a company reviews once a year, Witty said, but rather an ongoing part of every new project.

“Your recovery environment has to stay in sync with production, which is where a lot of organizations fail,” Witty said. “Build disaster recovery into a project lifestyle—whether it’s a new product or a change in management, you have to go back and revisit your recovery plans.”

The 3 big takeaways for readers

  1. Delta experienced a massive networked service stoppage Monday morning after a power outage in Atlanta, which offers a lesson in disaster preparedness and recovery for other businesses and data centers.
  2. About 57% of small and mid-sized businesses have no recovery plan in the event of a network outage, data loss, or other IT disaster, but these plans are key for mitigating natural and manmade disasters and keeping business operations running smoothly.
  3. Companies should build crisis management and proper communication into all new projects and management changes to ensure consistency.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft Office 365: The smart person’s guide

Office 365 provides the productivity tools required by a modern enterprise workforce. This guide covers key details, including available applications, system requirements, and subscription options.

Office-365-SJTechies2

For just about any enterprise of any size, the productivity of its modern workforce revolves around the basic office suite of email, calendar, word processor, and spreadsheet. But as the enterprise workforce has become more mobile, the basic productivity toolset has had to adapt and change to match new requirements. This is why Microsoft updated Office 365 to be a mobile collaborative platform ready to get work done wherever and whenever it happens.

Microsoft Office 365 is the de facto productivity suite for many enterprises and it is the suite all the other competitors are measured against. So as a leader in information technology for your enterprise, it’s in your best interest to know everything there is to know about Office 365. To help you achieve that goal, TechRepublic compiled the most important details and related resources on Microsoft Office 365 into this “living” guide, which we’ll periodically update as new information becomes available.

Executive summary

What is it? Microsoft Office 365 provides users with the basic productivity applications necessary to get work done in the modern enterprise. It includes applications like Word, Excel, Outlook, PowerPoint, OneNote, and OneDrive, just to name a few.

Why does it matter? As the standard for productivity suites, competing products are generally measured against applications from the Office 365 suite.

Who does it affect? In the modern mobile-centric enterprise, Office 365 provides the tools used to get work done. This makes Office 365 important to just about every working individual.

When is it available? The latest version of Microsoft Office 365 is available right now. The current subscription includes Office 2016 applications.

How do you get it? Enterprises can purchase a subscription to Office 365 via the Microsoft website. Subscriptions range from $8/user/month to $35/user/month.

What is it?

Microsoft Office 365 is a subscription service that provides users with the basic productivity applications necessary to get work done in the modern enterprise. Productivity applications include, but are not limited to, a word processor, a spreadsheet, an email client, a calendar, and a presentation application.

Office365-OneDrive

As an example, a Business Premium subscription to Office 365 ($12.50 per person per month) includes these applications:

Word: This app sets the standard for word processors and is available with Office 365 for both Business and Premium. If users in your enterprise need to create documents, this is the tool they will use.

Excel: The spreadsheet has been the workhorse for basic data analysis since its invention back in the previous century. Excel is the current standard-bearer and comes with Office 365 for Business and Premium.

Outlook: Office 365’s solution for managing email and an appointment calendar is called Outlook. The app has been around for many years and its busy interface tends to be either loved or hated by users. It’s available with both the Business and Premium subscriptions.

PowerPoint: Communicating information to a group of individuals at a meeting often involves a presentation. Office 365’s PowerPoint allows users to create, display, and disseminate information in formats ranging from the basic slide to animation to video.

Publisher: Sometimes communicating information to a broader audience requires something more permanent and more formal than a presentation at a meeting. The Publisher app in Office 365 provides users with the tools they need to publish professional-looking newsletters, brochures, and booklets.

OneNote: As the workforce has become more mobile, the need to capture information on the go has become increasingly important. Applications like OneNote allow users to take notes on any device and then retrieve those notes from any other device. It’s your basic productivity cloud app.

OneDrive: The other basic and fundamental cloud-based application is storage. With each Office 365 Business subscription, Microsoft provides users with up to 1TB of cloud storage in the form of an application called OneDrive for Business.

SharePoint: A subscription to Office 365 Business Premium also provides an enterprise with a few applications for backend infrastructure management. SharePoint, for example, can be used to host intranet websites for the enterprise. It also can be used to host smaller sites designed for smaller teams or divisions. The permissions for these sites can be designated by the users themselves or by appointed administrators.

Exchange: Each Office 365 for Business subscription includes an Exchange Server, which handles all the email management duties. By default, each user is granted 50GB of storage for email. Maintenance of the Exchange Server is generally handled at the administrator level.

Collaboration tools: Along with the typical productivity applications, Office 365 includes many collaboration tools—like Delve, Skype, Yammer, and Sway. These tools allow users to communicate, brainstorm ideas, share documents, and have video meetings while on the go.

Power BI: One of the most powerful tools any enterprise can have, regardless of size, is reliable business intelligence gathering applications. Office 365 for Business, through its Power BI application, provides enterprises with a set of tools for collecting, sorting, and presenting business intelligence data.

Infrastructure: All Office 365 subscriptions include a reliability guarantee of 99.9% uptime. In addition, permissions for internal access control are handled by administrators designated by the enterprise using tools supplied by Active Directory. Each Office 365 subscription includes five layers of security and proactive monitoring to help safeguard your data.

System requirements

  • CPU: 1GHz or faster
  • Memory: 2GB RAM
  • Hard drive: 3GB of available space (6GB for Mac)
  • Display: 1280 X 800 screen resolution
  • Operating system: PC-Windows 7, 8, or 10. Mac-Mac OS X 10.10
  • Connectivity: Internet connection

Why does it matter?

Collaboration and communication are the key components of productivity in the modern enterprise, and productivity is the lifeblood of the enterprise. Microsoft Office 365 provides the tools necessary to bring collaboration and communication—and by extension, productivity—to each individual in an enterprise.

For many companies, Office 365 is the de facto standard for productivity software. The performance of all competing products is generally measured against applications from the Office 365 suite.

Who does it affect?

Just about every knowledge worker in every enterprise is required to have an email account and a calendar application. Beyond that, most individuals in an enterprise will need to use, at least once in a while, a word processor. And a significant number of individuals in an enterprise will also find themselves needing to use presentation software or a spreadsheet at some point in their career.

These are the productivity tools of any enterprise. These are the tools used to get work done. That means Office 365 is important to just about every working individual.

When is it available?

Microsoft Office 365 is available right now. The current subscription includes applications updated to the Office 2016 versions. Of course, the key to the subscription model is that each user will always be using the most current and most secure version of each application because each application is continuously updated.

How do you get it?

Enterprises with fewer than 300 users can purchase a subscription to Office 365 and download the appropriate applications via the Microsoft website. The Premium version costs $12.50 per user per month ($150/year). There are also versions of Office 365 available for individuals ($69.99/year) and households ($99.99/year).

Office-365-SJTechies

For large enterprises, unlimited user versions of Office 365 are available, ranging from $12 per person per month to $35 per person per month. Each subscription caters to a particular type of enterprise. More expensive enterprise versions of Office 365 add features like voicemail, compliance auditing, rights management, encryption, and Advanced Threat Protection.

Office-365-SJTechies1

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Trump administration to move all federal IT into the cloud: Is it realistic?

US president Donald Trump recently signed an executive order on cyber-security that mandated federal systems move to the cloud. But, questions remain on the feasibility of that goal.

On Thursday, US President Donald Trump signed his long-awaited executive order on cyber-security, laying out his plans for addressing security in federal IT and across US infrastructure. The most ambitious mandate was that all federal IT systems move to the cloud.

President Trump’s homeland security adviser, Tom Bossert, said in a announcement that the government had spent too much time and money “protecting antiquated and outdated systems.” Bossert cited the Office of Personnel Management (OPM) hack as evidence of failing legacy systems.

Bossert said, “From this point forward, the President has issued a preference in federal procurement in federal IT for shared systems. We’ve got to move to the cloud and try to protect ourselves instead of fracturing our security posture.”

The executive order officially states: “Agency heads shall show preference in their procurement for shared IT services, to the extent permitted by law, including email, cloud, and cyber-security services.” It also calls for a report to be completed within 90 days describing the legal, budgetary, technical considerations for “shared IT services, including email, cloud, and cyber-security services,” along with a timeline for the initiatives and their potential cost-effectiveness.

Peter Tran, the senior director of worldwide advanced cyber defense practice at RSA and former US Department of Defense employee, said the anchor for the executive order will initially be the NIST Cybersecurity Framework (CSF), to both assess current risk gaps and determine a strategy moving forward. This will be the pacesetter by which all building blocks will either rise or fall specifically on the call to action to go cloud in an expedited manner…..security being a forethought,” Tran said.

However, the effectiveness of a move to the cloud to improve security among these federal systems remains up to debate. John Pironti, cyber-security expert and president of IP Architects, said that it could create a double-edged sword.

“The idea of standardization of security controls and capabilities through a cloud-only mandate in theory may make sense to establish an enhanced baseline for security, but at the same time creates a central target and common set of controls and capabilities that adversaries can then focus their attention on in order to be successful in their attacks,” Pironti said.

Following a central set of control standards and common technology platforms, combined with the centralized nature of the cloud, could actually make the federal IT systems weaker than their current iteration, Pironti said, which utilizes “distributed and varied computing assets and security controls.” And if hackers can find and exploit a weakness in this kind of system, it could lead to a bigger impact.

Pironti said that he believes the mandate will start out with the proper intentions, but if the affected government agencies simply follow the prescribed behaviors with no deviation, they may not be able to keep up with the changing threat landscape. While Pironti said that he’s in favor of accountability, he believes that the approach should be risk-based instead of mandated.

“I do not believe all agencies should be forced into a cloud model or required to follow the same set of prescriptive security controls,” Pironti said. “If an agency can prove that they are effectively operating in a reliable, available, and secure fashion then they should be allowed to continue to do so.”

Another question raised by the mandate is the feasibility of moving these systems to the cloud. Tran said that the executive order builds on an existing foundation, but the “proof is in the pudding.” The order, like other security plans, must be executed in a timely manner and show clear improvements in boosting security visibility and early threat detection, but it also must clearly show what “good” and “bad” security looks like in cloud infrastructure, Tran said.

“That’s really hard to do under an average planning and deployment timeline. Your compass needs to be ‘dead on,'” Tran said.

The impact of the executive order could also be seen in the private sector, Tran said, driving the growth of stronger policy, compliance, and governance around cybersecurity.

“The unique aspect of this current environment is security can’t effectively operate in a ‘de-regulated’ fashion by the mere nature that it’s security… Imagine if the TSA and FAA had no security protocols and structure?” Tran said. “Cybersecurity is no different whether it’s brick-and-mortar or click-and-mortar.”

The 3 big takeaways for readers

  1. Trump recently signed an executive order on cybersecurity mandating all federal IT systems move to the cloud, but questions remain about the feasibility and effectiveness of such a mandate.
  2. The move to the cloud could help modernize the systems’ approach to security, but it could also create a central point of attack for hackers, an expert said.
  3. The executive order could also impact the private sector, leading to more regulation and compliance around cyber-security initiatives, an expert said.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Cloud computing: We’ll never be all in, say most companies

In a new report from SolarWinds, 92% of companies say adopting cloud is critical to long-term success. But, most don’t think they’ll ever be fully cloud.

On March 29, IT management software provider SolarWinds released its annual report titled IT Trends Report 2016: The Hybrid IT Evolution, detailing some interesting trends around cloud adoption in the enterprise and the rise of hybrid IT.

First off, according to the results of the report, cloud adoption is a foregone conclusion for most businesses. The report found that 92% of the IT professionals who were surveyed said adopting cloud was important to long-term success in their business. Nearly 30% labeled it extremely important.

However, despite this widespread adoption, most organizations aren’t fully embracing the cloud within the whole of their organization. Joel Dolisy, CIO of SolarWinds, said that is because the cloud isn’t the best option for all workloads.

“The findings of this year’s study paint a clear picture: Cloud adoption is nearly ubiquitous, but it’s not now and will not in the foreseeable future be suitable for all workloads, and even if it were, very few if any companies would convert all of their existing applications to run in the cloud,” Dolisy said in a press release.

The data to support Dolisy’s statement came from the report as well. Only 43% of respondents said that half or more of their IT infrastructure will make it to the cloud over the next 3-5 years. And, 60% said it is unlikely that their entire infrastructure will ever be fully cloud-based. Additionally, 9% said they hadn’t migrated any piece of their infrastructure to the cloud.

Dolisy called the resulting dynamic hybrid IT, where an organization blends critical on-premises tools with cloud-based technologies. This affects IT as well, he said, because it shifts the dynamic of the corporate IT professional to one who can guarantee always-on performance regardless of where he or she is based. Additionally, these professionals need new skills and tools to effectively deploy and manage these environments.

Basically, the rise of this hybrid IT means that IT professionals are faced with two key tasks: Leveraging the cloud to increase efficiency and performance, while maintaining security of critical systems.

So, what are the benefits of this hybrid IT infrastructure? The SolarWinds report listed three in ranked order:

  1. Infrastructure cost-reduction
  2. Increased infrastructure flexibility/agility
  3. Relieving internal IT personnel of day-to-day management of some infrastructure

However, there are some challenges to managing this type of infrastructure as well. Of the respondents, 62% listed security as the top challenge within these type of environments.

Then, of course, there are also inherent challenges to encouraging cloud adoption as well. SolarWinds pegged the top three barriers to overall cloud adoption (which, in turn, affects hybrid IT) as follows:

  1. Security/compliance concerns
  2. Legacy system support
  3. Budget limitations

Nearly 70% have migrated their applications to the cloud, almost 50% have migrated their storage, and 33% have moved their databases.

So, how does this affect your organization? Well, new trends in infrastructure often require new skills to support them.

According to the survey, only 27% are convinced that their IT department has the skills needed to fully support a hybrid IT environment. To succeed in hybrid IT, respondents said they needed better monitoring tools, application migration support, distributed architectures, service-oriented architectures, and automation or vendor management tools.

Hybrid IT also require support from leadership as well. Of those surveyed, 56% felt that they had the support needed to do hybrid IT right.

“In short, IT is everywhere,” Dolisy said. “Effectively managing and monitoring the new environment—from on-premises to the cloud with multiplying endpoints—to be able to act when needed is more critical now than ever.”

The 3 big takeaways for readers

1. Hybrid IT, a mix of cloud and on-premises solutions, is growing as the prevailing trend in IT architecture. Almost all respondents said cloud was critical to future growth, but many felt that their organization would never be fully cloud.

2. Hybrid IT can offer cost reduction, increased agility, and management relief. But, it also brings security challenges, issues with legacy systems, and budget challenges.

3. If your organization is engaging hybrid IT, your IT professionals need the proper tools and skills to stay on top of it. Look into monitoring, different architectures, and automation to help support your staff.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

The 10 most important lessons IT learned in 2015

Every year brings with it new challenges, and new lessons, for IT in the enterprise. Here are 10 of the lessons IT learned this past year.

IT lessons

 

The end of a year is always a good time for reflection, especially so if you’re evaluating what your business did right and what you can improve upon. In an increasingly digital world, IT has quickly become one of, if not the most, important aspects of an organization. So, it should be with great care that executives and admins look back on their year and try to glean some wisdom about what can be done differently in the year to come.

Here are 10 of the most important lessons that IT learned in 2015.

1. BYOX is here to stay

As smartphone use grew to near ubiquity in the enterprise, it brought with it the trend of BYOD, or, bring your own device. While that originally referred to mobile devices such as smartphones and tablets, it spawned as host of “bring your own” everything else.

“BYOX is the new mantra with consumers bringing their own applications, cloud sharing tools, social media into the enterprise; essentially bringing their own expectations of which technology they want to use and how and where they want to work in a corporate environment,” said Chuck Pol, president of Vodafone Americas.

2. DevOps is no longer just a buzzword

The term “DevOps” gained huge popularity in 2015 as a reference to an agile method that stresses the collaboration of development and operations. The goal is to connect the writers of the code with those who maintain the systems that run it. However, DevOps continues to evolve and, although it has its own set of challenges, it could be poised to become the method of choice for enterprise IT starting in 2016.

3. Data is currency

Data, especially as it relates to big data has been steadily growing in value but 2015 felt like a tipping point. Tools for both structured and unstructured data exploded in popularity and major data service providers went public, adding credibility to the field and likely creating a better inroad into the enterprise. Also, businesses got better at distinguishing between relevant and irrelevant data.

“It is no longer credible to look at data as big static objects in a deep lake, but rather be considered a set of fast moving assets in a raging river,” said Neil Jarvis, CIO of Fujitsu America. “In 2016 and beyond, companies need to look at the data that creates business-relevant information for today and tomorrow.”

4. Finding talent is problematic

Talent shortages don’t just affect startups on the West Coast. CompTIA CIO Randy Gross said that current estimates suggest there are more than one million IT job opening across the US alone, ranging across skill level from support specialists to network admins. Enterprises are going to have to work harder to attract and retain talent.

“Wise employers with IT jobs to fill have engaged in a self-examination of the tactics and strategies they’re using to attract new talent—and adjusting accordingly,” Gross said. “For some companies, new telecommuting and remote work options have helped them fill their talent gaps.”

5. SMAC is still relevant

The SMAC stack, which stands for social, mobile, analytics, and cloud, is also known by some as the “third platform.” As all of these individual components continue to grow and thrive in the workplace, their interdependencies will grow along with them.

“Senior management must become well versed about these technologies and their possibilities to create new value and new competitive advantages in their own business and markets,” Pol said.

6. Cloud lost its fear factor

Cloud acceptance was a mixed bag for a long time, but 2015 brought a more widespread embrace of cloud technologies and services in the enterprise. In fact, some trends are making it almost a necessity.

“The complete adoption of virtualization, as well as investigation into cloud and other strategies, is far more advanced than expected—particularly amongst SMBs,” said Patrick Hubbard, technical product marketing director at SolarWinds. “Making operating systems and applications truly mobile is redefining how companies think about their IT infrastructure.”

7. The security mindset is changing

Anthem BlueCross BlueShield and Harvard University were among the major organizations that dealt with a public security breach in 2015. With today’s social media, you can almost guarantee any data breach that occurs in the enterprise won’t stay a secret. And, with the risk of a breach high, Intel Security CTO Steve Grobman said that teams must adopt a new way of thinking.

“IT must embrace the mindset that they have already been breached, now how do you protect your environment with this new default outlook?,” Grobman said.

8. Shadow IT is a line item

Shadow IT carries nowhere near the same amount of scorn it once did in the enterprise. Some organizations are even openly embracing it, and making it a foundational part of their IT strategy. And, as shadow IT continues to grow, Pol said, it needs to be properly accounted for in the budget.

“As technology continues to transform business, IT infrastructure will become more complex and more difficult to have a complete view of technology across the business,” Pol said. “The role of IT will need to become more strategic and set clear lines of accountability between IT and line of business budget holders.”

9. Employees are the biggest security risk

When most people think about security risks to their organization, the image of the hooded hacker furiously typing away in a dark room. However, employees themselves pose a real threat to the security of an organization as well. Issues such as poor password practices and using unsecured networks with company devices are a real problem. Kelly Ricker, senior vice president of events and education at CompTIA, said mobile, while helping with agility and productivity, is a cybersecurity nightmare.IT

“Every device that employees use to conduct business—smartphones and smartwatches, tablets and laptops—is a potential security vulnerability,” Ricker said. “Companies that fail to acknowledge and address this fact face the very real risk of becoming a victim of cyber criminals and hackers.”

10. Commoditization is a threat

With the plethora of tools available to build and replicate popular tech, it is increasingly important for organizations to guard against the threat of commoditization.

“As development cycles become shorter and the potential for intellectual property to be recreated and copied increases, it is becoming more difficult to create a sustainable competitive advantage for your products and services,” Pol said.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

When free Windows 10 becomes Expensive. You Must Know this!!

Is Microsoft really going to charge $100 to $200 to users who want the Pro edition or who don’t qualify for the free upgrade? Lets take a look at some alternative pricing ideas.

In Last week’s article, qw showed you how to reserve your free copy of Windows 10 upgrade from your Windows 7 and Windows 8.1 System. As you may know, the free upgrade will move you to the same edition of Windows that you’re currently running.

 

Windows 10 cost

“When you upgrade, you’ll stay on like-to-like editions of Windows. For example, Windows 7 Home Premium will upgrade to Windows 10 Home.”

However, what if you get Windows 10 Home and then decide that you would like Windows 10 Pro? How much will it cost to upgrade? What if you are running Windows Vista or XP? Or, what if you are planning on building your own system and want to install Windows 10 from scratch? How much will you have to pay for Windows 10? Let’s take a closer look.

The free upgrade chart

Along with the like-to-like editions description, Microsoft presented an upgrade chart (Figure A).

Figure A

sjt-blog-photo-windows

As you can see, this is how Microsoft will be doling out the free editions of Windows 10. For those getting the Pro edition of Windows 10, this will be perfect. And for most folks getting the Home edition of Windows 10, this will be a fine deal. However, what if you’re really a Pro type of user who just happened to end up with a Home edition of Windows 7/8? Will you be satisfied with the Home edition of Windows 10?

For example, my main system is running Windows 8.1 Pro with Media Center. However, my laptop is running the standard Windows 8.1, because that’s what was preinstalled when I purchased it last year from Dell. I’ve always wished that it had the Pro edition, as there are certain features that I’ve grown accustomed to on the Pro edition that I sorely miss, such as being able to configure my laptop as a Remote Desktop host.

I know that I won’t be satisfied with the Home edition of Windows 10 on my laptop.

The Windows 10 Pro Pack

Microsoft has released statements to various technology media sites, such as CNET, confirming the existence of an upgrade package called the Windows 10 Pro Pack that will allow you to move up from the Windows 10 Home edition to Pro edition. The Windows 10 Pro Pack will cost $99 (USD).

While that might not sound like a lot, when compared to FREE, it seems kind of unfair.

I understand that I’m getting a like-to-like edition upgrade, but I was hoping for some kind of break. After all, I’ve been a loyal Microsoft customer for years.

How about selling the Windows 10 Pro Pack for $39.99 for a limited time? Say, 90 days after launch? That would be more than acceptable to me–and it’s not unprecedented.

As you may remember, back when Windows 8 was first launched in October of 2012, upgrades to the Pro edition were priced at just $39.99 for anyone using an existing product. That offer ran until January 31, 2013. After that, the price of Windows 8 went up to the regular price point.

Retail packages

Microsoft has also released the MSRP for copies of the new operating system. Windows 10 Home will sell for $119 and Windows 10 Pro will sell for $199. Again, this seems to be a pretty stiff deal when compared to FREE.

This is the price that anyone using Windows XP or Windows Vista on a system that’s capable of running Windows 10 will have to pay for the full install of the new operating system. This also applies to users who are planning on building their own systems.

If the goal is to really get everyone off of old operating systems and onto Windows 10, Microsoft should offer these folks a special price for a limited time.

Again, such a deal is not unprecedented. When Windows 8 first came out, the retail package of the Pro edition cost $69.99.

If Windows XP/Vista users and system builders could get Windows 10 Pro for $69.99 for the first 90 days after launch, I think that a lot more people would go for it than if they have to pay $199.

What’s your take?

If you get a free Windows 10 Home upgrade, will you be satisfied–or will you want to move up to Windows 10 Pro? If so, would you be willing to pay $39 for the upgrade? If you don’t qualify for the free upgrade, would you be willing to pay $69 for Windows 10? Let us know

Have questions?

Microsoft’s Partner are here to help.
Call us at: 856-745-9990 or visit: http://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Pros and Cons of Web Hosting for Data Storage

Web hosting for data storage can offer several advantages.

Web hosting for online storage was once a high-priced option. Now, with the cost of web hosting dropping, many companies are offering what’s come to be called cloud storage: Web-based third-party data storage. Your data is stored on on a network of servers that are owned and maintained by other companies and housed on their sites rather than at your home or place of business.

Backups

Lost laptops and damaged hard drives are less of a disaster if you make regular backups, and having a Web storage system in place can make this easier. You can even automate your backups so that copies of your data are made regularly without you needing to do anything.

Data Loss

While the backup services they offer can be very useful, cloud hosting firms can lose data just like any other company. Firms can suffer fires, thefts, server malfunctions and other incidents that could result in data loss. They can also go out of business, potentially taking your valuable data with them if you don’t have any other copies.

Ease Of Access

Ease of access is one of the main selling points of cloud storage. You can access your data from any computer with an Internet connection, making it easier to work off-site or from multiple different locations. People working on the same project from different physical sites can easily access and share information.

Security Risks

The downside of easier access for you or your staff is that unauthorized access is potentially easier, too. Your information may be less secure than it would be if you restricted it to physical media. Unless you encrypt your data so that it can only be read by authorized personnel, your data is only as secure as your hosting company’s systems. This is a particular concern if you want to store sensitive information such as your clients’ personal details.

Space And Resources

Storage space is generally less of an issue for private individuals, but if your organization handles a lot of data, storage and servers can take up a lot of space. If you have a great deal of storage equipment it can require dedicated climate-controlled rooms. Factors such as insulation and cooling systems mean these may be costly to construct. Increased power consumption can also mean increased costs. There’s also the headache of maintenance and technical support; you may have to take on extra staff, or you might find that your current IT staff have less time available for other duties. If your needs vary, with heavier demand at some times than at others, the lack of flexibility can mean waste. Using online storage and third-party servers allows you to save valuable space and leave the maintenance to a dedicated firm’s (hopefully) expert staff. Cloud storage can also help keep costs down because most companies only charge you for what you use in terms of space and bandwidth.

Cloud Storage Costs

Inevitably your Web-based storage space comes with a price tag—one that gets larger as your needs increase. The more data you store and the more bandwidth you use to upload and download your data from the hosting company’s servers, the more you’ll have to pay. If your storage needs are fairly predictable, it may be more cost-effective to set up your own on-site storage systems.

Call (888) 505-1532 to get started now

CALL US NOW!