Quality IT, Advice, Support and Delivery

Thursday 17 March 2016

SQL Server 2005 End Of Life

Last year we saw Microsoft retire Windows Server 2003 and this year will see Microsoft retire yet another product. SQL Server 2005 is the latest Microsoft product nearing its end of life date of April 12, 2016.



What does End of Life mean for end users?
Every product we use is likely to have a lifecycle, and Microsoft products are no different. All that Microsoft mean by the end of life of any of their products, SQL Server 2005 included, is that Microsoft will no longer support the product. Ultimately this means that Microsoft will no longer provide automatic fixes, updates or online technical support for retired products.

After April 12, 2016 SQL Server 2005 will no longer receive assisted technical support from Microsoft, software and content updates or the security patches that help provide protection from harmful viruses, spyware and other malicious software, thus resulting in an insecure and unstable infrastructure for your business. Not migrating away from SQL Server 2005 will expose you to an elevated risk of cybersecurity dangers or malicious attacks.

What are the options?
Literally speaking you have two options, you can upgrade to a newer version of SQL Server or you can continue to use an unsupported SQL Server 2005. However it is highly advisable that you do upgrade, not only for security reasons, but also because continuing to use an outdated system can cause compliance issues and end up costing a small fortune in maintenance costs.

Why upgrade?
Continuing to use out of date software poses potential security risks and is likely to make you a prime target for hackers, as it is easier for cyber criminals to exploit vulnerable software. After April 12, 2016 it is highly likely that you will need to invest in extra security to protect the vulnerable SQL Server 2005, and the cost for maintaining aging hardware will continue to increase with time. Another key reason to upgrade is compliance, many compliances require up-to-date, patch databases, just like they do with the operating system.

Additionally software has progressed since the release of SQL Server 2005 and so there are significant improvements and features that have been added to newer versions of SQL Server. For example SQL Server 2014 provides higher availability and scalability, with dramatic performance improvement, compared with the soon to be outdated SQL Server 2005. The benefits of upgrading to a modern data platform far outweigh the costs of maintaining security, support and compliance for an unsupported database.

Act Now – Upgrade
Upgrading is an opportunity to provide new value to your business, by enabling you to achieve breakthrough performance.

Here are the three key steps for upgrading away from SQL Server 2005:  discover, target and upgrade. 

Step 1 – Discover:
It is highly recommended that you start by determining which applications are running SQL Server 2005. This process can be done using the Microsoft Assessment and Planning Toolkit or by collaborate with Practical Networks, a Microsoft Partner, who will be able to assist with the whole
upgrade.

Step 2 – Target:
In this step you need to determine a migration destination for each application, whether on-premises, virtualized or in the cloud. The choice of destination will be driven by factors such as speed, ease of migration, cost and desired functionality, with the most common choice being Windows Server 2012 R2.

Step 3 – Upgrade:
The final step is to plan and execute the upgrade, this may require additional assistance. Such assistance is available from Practical Networks a trusted Microsoft Partner.

If you would like more information or any assistance with your upgrade, please do not hesitate to get in touch with either David Philps or Andy Potts on 01723 587240.

Friday 12 February 2016

Dell Latitude 2-in-1

Practical Networks are delighted to report that DELL have launched the Latitude 2-in-1 Ultrabook. The new Latitude 2-in-1 is a secure, manageable, reliable and high performance Ultrabook with a detachable 13" tablet. This 2-in-1 is perfect for businesses who want to increase productivity on the move, wherever business takes you, the Latitude 2-in-1 allows you to work how and where you want, without compromising performance or security. 




True Business Productivity
The Latitude 2-in-1 is designed to keep you productive, on the road, or in the office, with it's powerful business-class features. 


Enjoy a high-performance Ultrabook and a detachable 13-inch tablet in one lightweight device with industry-leading security to keep your data protected. Working on the go has never been more comfortable with the full-size business-class single-point ISO keyboard with standard backlight. The Latitude 2-in-1 also offers the convenience of two USB 3.0 ports on the keyboard base. Plus, with superior connectivity options, including LTE/HSPA Mobile Broadband and Bluetooth 4.0, you can stay connected anywhere. 

For more information about this or other DELL products contact us, a DELL Partner on 01723 587240 or email info@practicalnetworks.co.uk

Thursday 14 January 2016

What is Office 365?

What is Office 365:
Office 365 is a Microsoft subscription plan that includes access to Office applications and other productivity services that are enabled over the internet (Cloud Services). These services include Lync web conferencing and Exchange online hosted email for business, and additional online storage with OneDrive. Office 365 is available in business and enterprise tiers, where each tier offers various plans with varying features and functionality.

Business-class Mobile Apps:
With an Office 365 for Business subscription, you get mobile apps that help you get more done from your favourite device while keeping your data secured. Office 365 provides built-in security and tools to manage access across phones and tablets. You can apply device-specific security policies with ease, allowing you to ensure that data is synced and accessible on authorised devices only. Office 365 also allows you to wipe data remotely from selected devices.
Office 365 provides a consistent experience across devices for storing, sharing and updating your Office documents, while keeping content and formatting intact.  With 1TB of cloud storage with OneDrive for business you have plenty of file storage.

Security:
Office 365 is a secure service, designed following the Microsoft Security Development Lifecycle. Microsoft brings together the best practices from two decades of building enterprise software and managing online services, to give you integrated software-as-a-service solution.
Office 365 uses a defence-in-depth approach to provide physical, logical, and data layers of security features and operational best practices. Office 365 gives you enterprise-grade, user and admin controls to further secure your environment.
Additionally Office 365 offers privacy controls, allowing you to configure who in your organisation has access and what they can access.

Up-to-Date:
Office 365 stays up to date, so you’ll always be working with the latest version of your Office applications, without any extra upgrade cost. In addition Office 365 takes care of all the installing, updating and making sure everything stays in sync, so that you can spend your time working. Also, because your files are automatically saved online, you can access, edit and share the latest versions, even on the go.

Business Benefits:
• Anytime, anywhere access to emails, documents, contacts and calendars, on any device.
• Complete offering of solutions, including desktop productivity apps, online portals, e-mail, voice mail, web conferencing and unified messaging.
• Simple to use communication and collaboration with colleagues and partners.
• Integrates seamlessly with Microsoft Office and other Microsoft programs.
• Flexible pricing options that gives you predictability and flexibility for all or part of your organisation.
• Business-class service, including IT admin phone support, financially backed 99.9% uptime guarantee, geo-redundant data centers, disaster recovery, robust security, privacy controls and standards.


For more information about Office 365 and the plans available, or to set up a trial, contact us on 01723 587240.

Monday 30 November 2015

7 ways to spot a Phishing Email

One of the most common ways to contract a virus or infection on your PC or Laptop is through phishing emails. Typically Phishing emails are designed to look like they are from a well-known and trusted company, usually banks, financial organisations or couriers, in order to trick you into providing sensitive information. 

Here's 7 ways to spot a Phishing Email:

  1. Emails often contain links, phishing emails are likely to contain links with mismatched URLs. In Outlook if you hover your mouse over the top of any URLs this will display the actual hyperlinked address. If the hyperlinked address is different to the address displayed in the email, it is highly likely that the message is fraudulent or malicious.                    
  2. Emails filled with spelling mistakes and poor grammar are likely to be fraudulent. Spelling mistakes are one of the most common signs that an email isn’t legitimate, as legitimate companies would normally have editors who review their marketing emails carefully before sending them out.                
  3. A prompt for personal information should be a warning sign, no matter how legitimate the email may look! Regardless of who you bank with, your bank will never email you to ask for your personal details.                                                                 
  4. A common type of phishing email is one that appears to be from a delivery company with attachments or links portrayed as tracking information. If you are not waiting for a delivery or don’t recognise the details in the email it is safest to just delete it.                                        
  5. Phishing emails often try to trick you into clicking a link by claiming that your account is on hold or that there has been some fraudulent activity that requires your immediate attention. The best thing to do in this case is to delete the email and just log into the account in question, by visiting the appropriate website, and then checking your account status.                                                                                                                                                        
  6. If you get an email saying you have won a contest that you didn’t enter, the chances are that this is a scam. No matter how inviting the prize may look avoid clicking the link and certainly don’t provide any of your personal details.                                                                                                                       
  7. Emails from financial organisations such as; banks, PayPal, eBay etc. will address you by name and so watch out for emails addressed "Dear Valued Customer" as these are likely to be fraudulent.

Thursday 12 November 2015

Phishing FAQ's

What is Phishing?
Phishing is a type of online identity theft, which typically uses emails and fraudulent websites, in order to steal information such as credit card details, passwords, account details and other personal information. Phishing emails and websites often falsely claim to be an established legitimate enterprise in an attempt to get you to share your private information.

How does phishing work?
Phishing works by pretending to be from a legitimate enterprise, such as banks, or other websites where you may have cash or credit card details stored, with the key aim of acquiring your private information. Criminals can then use the information provided for many types of fraud, such as steal money from your account, open new accounts in your name or to obtain official documents using your identity.

The most common form of phishing is fraudulent emails, prompting the recipient to “confirm your password”, “verify your account” or “confirm your identity”. Such emails are linked to fraudulent websites that are designed to look like those of legitimate enterprises or links that, once clicked, will download a virus or spyware onto your computer without your knowledge.

Can a phishing scam contain official company logos?
The simple answer is YES! Phishing scams almost always try to mimic established legitimate companies, the scam relies on people being tricked into thinking they are actually being contacted by the company. It is relatively simple make a website look like that of a legitimate organisation by mimicking the HTML code or to copy company logos.

How can you protect yourself against identity theft?
There are a number of precautions you can take to avoid becoming a victim of a phishing scam, and here they are:
  • Avoid clicking links in email messages
  • Type website addresses directly into your browser, to ensure you know you are on a legitimate website
  • Avoid entering your personal or financial information in pop-up windows
  • Keep your computer software current with the latest security updates
  • Never give out sensitive information
  • If you are worried about an account, call the company or organisation directly to inquire about it
What should you do if you receive a phishing email?
If you receive an email that you believe to be a phishing email, the best practice is not to respond and to simply delete the email. Alternatively you could report it to the company the email is mimicking in order for them to warn their customers.

What should you do if you think you are a victim of a phishing scam?
There are a number of steps you should take if you believe you have fallen victim to a phishing scam, such as:
  •  Changing your passwords and secure answers for any potentially compromised accounts should be done immediately
  • You may want to contact your bank or financial adviser to alert them to the fact that your accounts may be compromised, this will allow you to put a fraud alert on your accounts
  • Regularly monitor your emails and financial statements so that you can identify any false charges or suspicious activity as soon as it appears
  • Run a full virus scan on your computers, to ensure you don’t have any viruses or spyware that could potentially steal your personal data
Do phishing attacks only happen through email?

While email is the most common form of phishing attack, this is not the only way phishing is carried out.  Another form of phishing attacks is malware, some malware can track how you use your computer and send valuable information to identity thieves. Phishing attacks can also occur through phone calls, texts and instant messages. It is vital that you remain cautious when asked to provide your credentials and other personal information.

Thursday 29 October 2015

Veeam Availability Suite & Veeam Backup Essentials

What is Veeam Availability Suite?
Veeam Availability Suite provides availability for all applications, by combining the industry leading backup, restore and replication capabilities of Veeam Backup and Replication with the advanced monitoring, reporting and capacity planning functionality of Veeam ONE. Veeam Availability Suite delivers everything you need to reliably protect and manage your VMware vSphere and Microsoft Hyper-V environments.

Veeam Availability Suite Version 9:
Veeam have announced that version 9 of Veeam Availability Suite is to be released soon, offering a number of new features, such as:
·   Veeam Integration with EMC snapshots
·         Fast and secure cloud-based disaster recovery
·         Fast and low impact backups with EMC, NetApp, HP and more.
·         Enterprise-level enhancements for Veeam Explorers
·         Availability for the enterprise
·         Veeam integration with HP StoreOne Catalyst and other backup storage integration
·         Unlimited scale-out backup recovery


Veeam Backup Essentials

What is Veeam Backup Essentials?
Veeam Backup Essentials provides small businesses with a reliable, effortless and affordable enterprise-class backup solution, designed to help businesses remain always-on. Veeam Backup Essentials offers the same functionality as Veeam Availability Suite, but is priced for small businesses.

Veeam Backup Essentials Key Features include:
·       High-speed recovery
·         Data loss avoidance
·         Verified Protection
·         Leveraged Data
·         Complete Visibility


       For more information please contact Practical Networks a Veeam Partner on 01723 587240 or email info@practicalnetworks.co.uk




Thursday 15 October 2015

Veeam ONE

What is Veeam ONE?
Veeam ONE is a virtual management and optimisation tool, offering monitoring, reporting and capacity planning for VMware vSphere, Microsoft Hyper-V and the Veeam backup infrastructure. It helps enable availability for the modern data center, by providing complete visibility of the IT infrastructure, in order to detect issues before they have an operational impact. Veeam ONE offers an automated, flexible and dynamic way to categorise and group your clusters, hosts, VMs and data stores by criteria such as business unit, department, purpose and SLA. With Veeam ONE business categorisation, you can view and manage your virtual infrastructure based on your organisation’s needs and priorities.

The features:
  • 24x7 real-time performance monitoring and alerting
  • Detailed dashboards with informative drill-downs
  • Monitoring of failover clusters, CSVs and SMB shares
  • Performance and infrastructure analysis
  • Integration with vCloud Director
  •  Documentation and management reporting
  • Predefined and customisable dashboards
  •  Infrastructure assessments
  •  Multi-tenant reporting and monitoring for VMware
  • Custom report builder
  • Automated and on-demand reporting for Veeam Backup & Replication
  • Complete visibility of your entire virtual environment
  • Change tracking
  • Advanced capacity planning

24x7 Real-time monitoring:
Veeam ONE boast real-time, agent free and unattended 24x7 monitoring of your backup and virtual infrastructures, providing you with notifications of backup and performance issues before they negatively impact applications and users.
Veeam ONE monitoring includes functionality such as:
  •  Fast troubleshooting with detailed information designed to help you isolate the root cause and resolve issues quickly.
  • An extensive knowledge base with 200+ preset alarms to ensure you are the first to know when issues are impacting availability.
  • Graphs and charts with additional drill-down data to provide more information, when you need it.

Multi-tenant reporting and monitoring:

Multi-tenant reporting and monitoring for VMware is new to version 8, allowing IT managers to delegate reporting and monitoring to system admins over a limited scope of assigned VMs. Managers will have the ability to pre-build backup reports for the entire team, pre-populating individual dashboards with filtered results.

For more information about Veeam ONE please contact Practical Networks on 01723 587240