Quality IT, Advice, Support and Delivery

Friday, 12 February 2016

Dell Latitude 2-in-1

Practical Networks are delighted to report that DELL have launched the Latitude 2-in-1 Ultrabook. The new Latitude 2-in-1 is a secure, manageable, reliable and high performance Ultrabook with a detachable 13" tablet. This 2-in-1 is perfect for businesses who want to increase productivity on the move, wherever business takes you, the Latitude 2-in-1 allows you to work how and where you want, without compromising performance or security. 




True Business Productivity
The Latitude 2-in-1 is designed to keep you productive, on the road, or in the office, with it's powerful business-class features. 


Enjoy a high-performance Ultrabook and a detachable 13-inch tablet in one lightweight device with industry-leading security to keep your data protected. Working on the go has never been more comfortable with the full-size business-class single-point ISO keyboard with standard backlight. The Latitude 2-in-1 also offers the convenience of two USB 3.0 ports on the keyboard base. Plus, with superior connectivity options, including LTE/HSPA Mobile Broadband and Bluetooth 4.0, you can stay connected anywhere. 

For more information about this or other DELL products contact us, a DELL Partner on 01723 587240 or email info@practicalnetworks.co.uk

Thursday, 14 January 2016

What is Office 365?

What is Office 365:
Office 365 is a Microsoft subscription plan that includes access to Office applications and other productivity services that are enabled over the internet (Cloud Services). These services include Lync web conferencing and Exchange online hosted email for business, and additional online storage with OneDrive. Office 365 is available in business and enterprise tiers, where each tier offers various plans with varying features and functionality.

Business-class Mobile Apps:
With an Office 365 for Business subscription, you get mobile apps that help you get more done from your favourite device while keeping your data secured. Office 365 provides built-in security and tools to manage access across phones and tablets. You can apply device-specific security policies with ease, allowing you to ensure that data is synced and accessible on authorised devices only. Office 365 also allows you to wipe data remotely from selected devices.
Office 365 provides a consistent experience across devices for storing, sharing and updating your Office documents, while keeping content and formatting intact.  With 1TB of cloud storage with OneDrive for business you have plenty of file storage.

Security:
Office 365 is a secure service, designed following the Microsoft Security Development Lifecycle. Microsoft brings together the best practices from two decades of building enterprise software and managing online services, to give you integrated software-as-a-service solution.
Office 365 uses a defence-in-depth approach to provide physical, logical, and data layers of security features and operational best practices. Office 365 gives you enterprise-grade, user and admin controls to further secure your environment.
Additionally Office 365 offers privacy controls, allowing you to configure who in your organisation has access and what they can access.

Up-to-Date:
Office 365 stays up to date, so you’ll always be working with the latest version of your Office applications, without any extra upgrade cost. In addition Office 365 takes care of all the installing, updating and making sure everything stays in sync, so that you can spend your time working. Also, because your files are automatically saved online, you can access, edit and share the latest versions, even on the go.

Business Benefits:
• Anytime, anywhere access to emails, documents, contacts and calendars, on any device.
• Complete offering of solutions, including desktop productivity apps, online portals, e-mail, voice mail, web conferencing and unified messaging.
• Simple to use communication and collaboration with colleagues and partners.
• Integrates seamlessly with Microsoft Office and other Microsoft programs.
• Flexible pricing options that gives you predictability and flexibility for all or part of your organisation.
• Business-class service, including IT admin phone support, financially backed 99.9% uptime guarantee, geo-redundant data centers, disaster recovery, robust security, privacy controls and standards.


For more information about Office 365 and the plans available, or to set up a trial, contact us on 01723 587240.

Monday, 30 November 2015

7 ways to spot a Phishing Email

One of the most common ways to contract a virus or infection on your PC or Laptop is through phishing emails. Typically Phishing emails are designed to look like they are from a well-known and trusted company, usually banks, financial organisations or couriers, in order to trick you into providing sensitive information. 

Here's 7 ways to spot a Phishing Email:

  1. Emails often contain links, phishing emails are likely to contain links with mismatched URLs. In Outlook if you hover your mouse over the top of any URLs this will display the actual hyperlinked address. If the hyperlinked address is different to the address displayed in the email, it is highly likely that the message is fraudulent or malicious.                    
  2. Emails filled with spelling mistakes and poor grammar are likely to be fraudulent. Spelling mistakes are one of the most common signs that an email isn’t legitimate, as legitimate companies would normally have editors who review their marketing emails carefully before sending them out.                
  3. A prompt for personal information should be a warning sign, no matter how legitimate the email may look! Regardless of who you bank with, your bank will never email you to ask for your personal details.                                                                 
  4. A common type of phishing email is one that appears to be from a delivery company with attachments or links portrayed as tracking information. If you are not waiting for a delivery or don’t recognise the details in the email it is safest to just delete it.                                        
  5. Phishing emails often try to trick you into clicking a link by claiming that your account is on hold or that there has been some fraudulent activity that requires your immediate attention. The best thing to do in this case is to delete the email and just log into the account in question, by visiting the appropriate website, and then checking your account status.                                                                                                                                                        
  6. If you get an email saying you have won a contest that you didn’t enter, the chances are that this is a scam. No matter how inviting the prize may look avoid clicking the link and certainly don’t provide any of your personal details.                                                                                                                       
  7. Emails from financial organisations such as; banks, PayPal, eBay etc. will address you by name and so watch out for emails addressed "Dear Valued Customer" as these are likely to be fraudulent.

Thursday, 12 November 2015

Phishing FAQ's

What is Phishing?
Phishing is a type of online identity theft, which typically uses emails and fraudulent websites, in order to steal information such as credit card details, passwords, account details and other personal information. Phishing emails and websites often falsely claim to be an established legitimate enterprise in an attempt to get you to share your private information.

How does phishing work?
Phishing works by pretending to be from a legitimate enterprise, such as banks, or other websites where you may have cash or credit card details stored, with the key aim of acquiring your private information. Criminals can then use the information provided for many types of fraud, such as steal money from your account, open new accounts in your name or to obtain official documents using your identity.

The most common form of phishing is fraudulent emails, prompting the recipient to “confirm your password”, “verify your account” or “confirm your identity”. Such emails are linked to fraudulent websites that are designed to look like those of legitimate enterprises or links that, once clicked, will download a virus or spyware onto your computer without your knowledge.

Can a phishing scam contain official company logos?
The simple answer is YES! Phishing scams almost always try to mimic established legitimate companies, the scam relies on people being tricked into thinking they are actually being contacted by the company. It is relatively simple make a website look like that of a legitimate organisation by mimicking the HTML code or to copy company logos.

How can you protect yourself against identity theft?
There are a number of precautions you can take to avoid becoming a victim of a phishing scam, and here they are:
  • Avoid clicking links in email messages
  • Type website addresses directly into your browser, to ensure you know you are on a legitimate website
  • Avoid entering your personal or financial information in pop-up windows
  • Keep your computer software current with the latest security updates
  • Never give out sensitive information
  • If you are worried about an account, call the company or organisation directly to inquire about it
What should you do if you receive a phishing email?
If you receive an email that you believe to be a phishing email, the best practice is not to respond and to simply delete the email. Alternatively you could report it to the company the email is mimicking in order for them to warn their customers.

What should you do if you think you are a victim of a phishing scam?
There are a number of steps you should take if you believe you have fallen victim to a phishing scam, such as:
  •  Changing your passwords and secure answers for any potentially compromised accounts should be done immediately
  • You may want to contact your bank or financial adviser to alert them to the fact that your accounts may be compromised, this will allow you to put a fraud alert on your accounts
  • Regularly monitor your emails and financial statements so that you can identify any false charges or suspicious activity as soon as it appears
  • Run a full virus scan on your computers, to ensure you don’t have any viruses or spyware that could potentially steal your personal data
Do phishing attacks only happen through email?

While email is the most common form of phishing attack, this is not the only way phishing is carried out.  Another form of phishing attacks is malware, some malware can track how you use your computer and send valuable information to identity thieves. Phishing attacks can also occur through phone calls, texts and instant messages. It is vital that you remain cautious when asked to provide your credentials and other personal information.

Thursday, 29 October 2015

Veeam Availability Suite & Veeam Backup Essentials

What is Veeam Availability Suite?
Veeam Availability Suite provides availability for all applications, by combining the industry leading backup, restore and replication capabilities of Veeam Backup and Replication with the advanced monitoring, reporting and capacity planning functionality of Veeam ONE. Veeam Availability Suite delivers everything you need to reliably protect and manage your VMware vSphere and Microsoft Hyper-V environments.

Veeam Availability Suite Version 9:
Veeam have announced that version 9 of Veeam Availability Suite is to be released soon, offering a number of new features, such as:
·   Veeam Integration with EMC snapshots
·         Fast and secure cloud-based disaster recovery
·         Fast and low impact backups with EMC, NetApp, HP and more.
·         Enterprise-level enhancements for Veeam Explorers
·         Availability for the enterprise
·         Veeam integration with HP StoreOne Catalyst and other backup storage integration
·         Unlimited scale-out backup recovery


Veeam Backup Essentials

What is Veeam Backup Essentials?
Veeam Backup Essentials provides small businesses with a reliable, effortless and affordable enterprise-class backup solution, designed to help businesses remain always-on. Veeam Backup Essentials offers the same functionality as Veeam Availability Suite, but is priced for small businesses.

Veeam Backup Essentials Key Features include:
·       High-speed recovery
·         Data loss avoidance
·         Verified Protection
·         Leveraged Data
·         Complete Visibility


       For more information please contact Practical Networks a Veeam Partner on 01723 587240 or email info@practicalnetworks.co.uk




Thursday, 15 October 2015

Veeam ONE

What is Veeam ONE?
Veeam ONE is a virtual management and optimisation tool, offering monitoring, reporting and capacity planning for VMware vSphere, Microsoft Hyper-V and the Veeam backup infrastructure. It helps enable availability for the modern data center, by providing complete visibility of the IT infrastructure, in order to detect issues before they have an operational impact. Veeam ONE offers an automated, flexible and dynamic way to categorise and group your clusters, hosts, VMs and data stores by criteria such as business unit, department, purpose and SLA. With Veeam ONE business categorisation, you can view and manage your virtual infrastructure based on your organisation’s needs and priorities.

The features:
  • 24x7 real-time performance monitoring and alerting
  • Detailed dashboards with informative drill-downs
  • Monitoring of failover clusters, CSVs and SMB shares
  • Performance and infrastructure analysis
  • Integration with vCloud Director
  •  Documentation and management reporting
  • Predefined and customisable dashboards
  •  Infrastructure assessments
  •  Multi-tenant reporting and monitoring for VMware
  • Custom report builder
  • Automated and on-demand reporting for Veeam Backup & Replication
  • Complete visibility of your entire virtual environment
  • Change tracking
  • Advanced capacity planning

24x7 Real-time monitoring:
Veeam ONE boast real-time, agent free and unattended 24x7 monitoring of your backup and virtual infrastructures, providing you with notifications of backup and performance issues before they negatively impact applications and users.
Veeam ONE monitoring includes functionality such as:
  •  Fast troubleshooting with detailed information designed to help you isolate the root cause and resolve issues quickly.
  • An extensive knowledge base with 200+ preset alarms to ensure you are the first to know when issues are impacting availability.
  • Graphs and charts with additional drill-down data to provide more information, when you need it.

Multi-tenant reporting and monitoring:

Multi-tenant reporting and monitoring for VMware is new to version 8, allowing IT managers to delegate reporting and monitoring to system admins over a limited scope of assigned VMs. Managers will have the ability to pre-build backup reports for the entire team, pre-populating individual dashboards with filtered results.

For more information about Veeam ONE please contact Practical Networks on 01723 587240

Thursday, 1 October 2015

Veeam Backup & Replication

What is Veeam Backup & Replication?
Veeam backup and replication is a backup software, providing VM backup for VMware vSphere and Microsoft Hyper-V virtual environments. Veeam leverages virtualisation, storage and cloud technologies to deliver a recovery time of less than 15minutes for all applications and data.
Veeam backup and replication brings backup and replication together in one single solution to both increase the value of backup and reinvent data protection for virtual environments.

The Features:
The key features of Veeam backup and replication are:
• High-Speed Recovery
• Data Loss Avoidance
• Verified Protection
• Leveraged Data
• Complete Visibility

High-Speed Recovery:
• Instant VM recovery provides recovery of a failed VM in as little as 2 minutes.
• Instant file-level recovery allows you to recover guest OS files and folders.
• Low recovery time objectives for Microsoft Exchange, SharePoint, SQL Server and Active Directory with Veeam Explorer.

Data Loss Avoidance:
• Ultra-fast backup from storage snapshots with leverages storage snapshot capabilities for HP and NetApp.
• 50% faster backups and 10x faster synthetic full backup file creation and transformation with EMC Data Domain Boost integration.
• Veeam Cloud Connect helps you avoid the risk of catastrophic data loss.
• End-to-end encryption to secure your data.
• Improve your offsite recovery with WAN-accelerated replication, replication from backup and 1-click site failover with support for planned failover.
• 2-in-1 Backup and replication, providing near-continuous data protection for any virtualised application.
• Store entire VM backups or individual files on tape, and restore from tape whenever needed.

Verified Protection:
• SureBackup and SureReplica automatically verify the recoverability of every backup and every replica, every time.

Leveraged Data:
• Virtual lab helps you avoid deployment problems by testing and troubleshooting your applications in an isolated, production-like environment without creating any impact on your production infrastructure.

Complete Visibility:
• Veeam Enterprise Manager Web Client allows you to federate multiple backup servers from multiple locations in a single pane of glass without having to log in to the company network, providing centralised management.
•Monitor your backups infrastructure directly from the vSphere Web Client.

For more information about Veeam Backup and Replication or other Veeam products, please contact Practical Networks on 01723 587240 or email: info@practicalnetworks.co.uk