Quality IT, Advice, Support and Delivery

Thursday, 25 June 2015

Panasonic NS 1000 Business Communications Server

16:57 Posted by Practical Networks No comments


The NS 1000 business communications server by Panasonic is designed to deliver solutions to business challenges, while flexibly adapting to the way each organisation works. The NS 1000 provides solutions such as:

• Simplifying & improving communications

• Lowering costs

• Diversifying the workplace

• Improving productivity


These solutions are provided by integrating hardware and software in a modular way, allowing for businesses to tailor their communications system to fit their own specific needs. This system works for a wide range of businesses, regardless of whether it is used in a small office with two people or in a large company with several locations.
  

Key Features include:

• IP & SIP network communication server

• Integrated unified messaging

• Reliable backup system, designed to survive system failures

• Call center solution with voice guidance for customers

• High-performance applications

• Seamless integration for smart phones & tablets, allowing for BYOD

• Innovative unified collaboration & communication environment, including desktop tools & an interactive voice response system


With its fully transparent network features, first-class voice quality in HD wideband audio and swift capacity expansions, the NS 1000 is the most complete Panasonic solution to date.

More information can be found here >>http://bit.ly/1NkfeY6

Thursday, 11 June 2015

What are Unified Communications?

What are Unified Communications?


Unified communications (UC) is the term used to describe communications which integrate to optimize business processes and increase user productivity. UC’s optimize business processes and increase user productivity by eliminating device and media dependencies and managing flows. UC systems typically include the means to integrate real-time or near-real time unified messaging, collaboration and interactive systems; however such integration takes on numerous forms. 

Unified communications are not a single product, but a collection of components, including but not limited to the following:

• Call control & Multi-modal communications
• Presence information
• Instant messaging
• Unified messaging
• Speech access & Personal assistant
• Conferencing (audio, web & video)
• Collaboration tools
• Mobility
• Business process integration

Unified communications are purpose built to grow and change with the pace of your business, providing numerous benefits along the way. These benefits include:


We are now suppliers of both Cisco and Panasonic systems, which provide benefits such as; reducing costs, increasing productivity, diversifying the workplace and allowing for quick and effective call response.  For more information about UC’s call Practical Networks on 01723 587240.

Thursday, 28 May 2015

Windows Server 2003 Migration Planning

Windows Server 2003 end of life is the perfect excuse for business innovation, so why not take advantage of the opportunity. Migrating away from Windows Server 2003 allows you to update your system and take full advantage of the updated features available with newer software. The migration solutions available offer new data center automation and a flexible infrastructure that breaks through the traditional boundaries of storage, virtualisation and identity, while providing an application platform to support the growing demands of today’s businesses.

As you may have read in our Windows Server 2003 End of Life post, there are a number of other reasons why it is ideal for businesses to migrate before the end of life date of July 14, 2015. Migration is a lengthy process and will take a lot of planning and preparation; however it is worth the time and effort. Migrating will help you achieve concrete benefits such as; improved performance, reduced maintenance requirements and increased agility and speed of response. 

Migrating – Where to start:
As a Microsoft Partner we recommend using the following four stages to plan your migration:     
      Ã¼  Discover
      Ã¼  Assess
      Ã¼  Target
      Ã¼  Migrate
A document detailing these stages in full can be found here >> http://bit.ly/1zk7Rgx

Stage 1 – Discover

In order to plan what application need to be upgraded or migrated you need to establish what applications and workloads you have running on Windows Server 2003. When making a note of all of your applications it is also important to make a note of the versions, licensing agreements and what hardware they run on. 

Stage 2 – Assess
Now you need to categorise and analyse all of your listed workloads and applications based on type, criticality, complexity and risk.  This can help you to evaluate whether to re-host, refactor, revise, rebuild or replace applications and also help you to prioritise workloads and applications for migration by identifying issues or opportunities such as:
      Ã»  Vital business-critical applications and workloads that need immediate attention and additional                                    capacity
      Ã»  Redundancies in your environment and mismatched service levels
      Ã»  Applications without the right level of IT control
      Ã»  Misallocated resources for underutilised or unneeded business-critical projects


Stage 3 – Target

This is the phase where you need to determine the migration target destination for each application and workload. In this phase you have the opportunity to transform your business by embracing newer, more efficient and cost effective ways of delivering IT solutions to your users. Different workloads and applications will logically lead to certain targets, while others may offer the possibility of migration to multiple target destinations. The choice will ultimately be driven by factors such as; speed, ease of migration, cost and desired functionality.

 Stage 4 – Migrate
The migration itself will require smart planning and focused execution, in order to make sure goals are met. Choosing the right migration plan for your organisation may require additional analysis and assistance.

As a Microsoft Partner, Practical Networks are readily on hand to provide any guidance or assistance that you need with your migration. For help starting your migration plan call Andy on 01723 587240 or email migrate@practicalnetworks.co.uk


Wednesday, 13 May 2015

Windows Server 2012 R2 - Upgrade Now!



As cybersecurity is set to be a major focus for businesses this year, we feel it fitting that our software pick this quarter is the Windows Server 2012 R2. Windows Server 2012 R2 is the most recent version of Microsoft’s Windows Server Platform and so is the most logical choice when migrating from Windows Server 2003, which retires in June.



What is Windows Server 2012 R2?
Windows Server 2012 is an enterprise-grade, open application and web platform that forms a foundation for businesses, by helping build, deploy, and scale modern applications and high-density websites for the datacentre and the cloud. Windows Server 2012 R2 also enables IT to empower users by providing them with flexible, policy-based resources while protecting corporate information.


The Benefits:
• Simplified deployment of IT services

• High service uptime

• Secures corporate data

• Easily scales to continuously run the largest workloads

• User Centric

• Application focused

• Simple & Cost effective

• Disaster recovery & Business continuity

Disaster Recovery & Business Continuity:
Windows Server 2012 allows you to achieve affordable, multi-node business continuity scenarios with high service uptime and at-scale disaster recovery. Windows Server 2012 has powerful availability features to protect against service outages, along with automated protection and recovery for cost-effective business continuity. These features allow for improved workload SLA’s and a reduced downtime risk.

User Centric:
Business technology has become increasingly mobile and user centric and with Windows Server 2012 end users will have access to information and data regardless of the infrastructure, network, device or application. Windows Server 2012 also makes it possible for you to provide consistent access to corporate resources by managing and federating user identities and credentials across the organisation, while providing secure access to your corporate network. Additionally Windows Server 2012 helps you better protect information and manage risk, by validating user identities, verifying their devices and taking advantage of data classification.


So if you’re looking to migrate away from Windows Server 2003 or just want to update your system, look no further. For more information or for assistance in migrating call Andy on 01723 587240.

Thursday, 30 April 2015

Cybersecurity & Mobile Security Tip for Businesses!

Cybersecurity is becoming more and more of an issue for businesses, as security attacks are evolving at an alarming rate. Last year in particular saw a number of high profile security breaches, such as; Heartbleed and Shellshock, positioning cybersecurity as a major concern for businesses and individuals alike. So here are 10 tips on how to protect your business against cyber-attacks:

1.       Establish basic security practices and educate all of your employees in these practices. This will help ensure all of your employees understand how to handle and protect vital business and customer information.

2.       Make sure all computers and networks are protected, by making sure that anti-virus, anti-spyware and firewall software is installed and kept up to date on all corporate PCs. It is also in good practice to schedule regular anti-virus scans on all PCs.

3.       Protect your internet connection with firewall security and make sure that firewalls are maintained. It is also important to make sure that employees who work from home have a secure internet connection.

4.       It is vital to keep your operating system and all your software up to date, by installing the latest updates and security patches. Updates can be set to install automatically, saving time and ensuring they are installed as soon as they are available. (Cyber criminals will take advantage of vulnerabilities found in out of date or unpatched software)

5.       Employ some form of disaster recovery and backup strategy, to regularly backup all of your data. In the case that your computer does become infected, you will be able to restore all your files once the malware has been deleted.

6.       Don’t allow unauthorised individuals to use business computers and secure your Wi-Fi network with passwords (preferably not the password that the device came with).

7.       Ensure all employees use a strong password, one that uses a mix of numbers, upper and lower case letters and symbols. Also make sure passwords are changed regularly.

8.       Limit employee’s access and authority according to their roles. Only provide access to the specific data systems that are needed to carry out their roles.

9.       Make sure all employees know to avoid opening emails or email attachments from unknown sources or that don’t appear to be legit. It is often the case that email attachments carry malware so be cautious and one infected PC could put the whole network at risk.

10.   Enforce strict rules about installing new software and only install software from trusted sites. 



       The number of businesses allowing for BYOD is increasing, and so it is important for them to keep their data secure on all devices. Malware is not just a problem for PC’s, as cybercriminals have taken to hiding their malicious codes inside mobile apps. So we have some Security Tips to protect your Mobile Workforce.

7 Tips for a Secure Mobile Network:

1.       Don’t let mobile security be your blind spot; mobile devices need the same protection as your corporate PC’s, so implement security precautions on all mobile devices.

2.       Add security measures to your wireless network - a password or security key can keep unauthorised devices from accessing your wireless connection. Encryption technology can also help, by protecting the information transmitted through your network.

3.       Encourage employees who use mobile devices for business purposes, to password protect their devices and set them to lock within five minutes. Passwords act as a first line of defence should the device fall into the wrong hands.

4.       Educate your users about carefully examining app permissions before granting access. Most apps ask for access to many unnecessary features on your device.

5.       Develop a policy item to determine which apps can be downloaded or accessed via the corporate network. If an app has a weakness it is easier to hack, posing a threat to your corporate security.

6.       Lose it, Lock it, Wipe it - download an app on your mobile devices that allows you and your employees to lock and wipe the device in the event of theft or loss. Should your device be gone for good such apps will enable you to wipe all of your data including text messages, contacts, photos, email, browser history and user accounts.

7.      Update apps as soon as you are prompted to, as updates can include fixes to new vulnerabilities and exploited security gaps.

For any more information on how to keep your corporate date secure, contact one of the team on 01723 587240




Thursday, 16 April 2015

Mobile Security - A Business Must Have!

Mobile security is becoming increasingly more important for businesses; due to the significant increase in bring your own device (BYOD) workforces. Companies put a lot of effort into building up their network defences for PCs, however most seem to overlook smartphone security, but there are now a great deal more mobile devices than PCs.


The BYOD policy has completely changed the way in which organisations need to approach their network security. Mobile devices have the ability of working inside and outside of the corporate network and can automatically connect to the corporate system, accessing sensitive data and then connect to other networks outside of the organisation. This is all done while bypassing the intense security measures built for PCs, potentially exposing your company data. 


Symantec’s 2013 Norton Report showed that nearly half of smartphone and tablet users don’t use basic precautions such as passwords and security software and that 57% were unaware that security solutions are available for mobile devices. Also according to a study from BT, 41% of UK organisations were hit by mobile security breaches. These are worrying statistics for organisations which allow for BYOD, and so it is important to make sure everyone in your organisation is aware of the importance of mobile security.


Loss and theft both pose a big threat to mobile security, as mobile devices are more vulnerable to loss and theft than PCs. Once lost or stolen any corporate data is at risk without proper security in place, such as passwords, encryption, multi-factor authentication app or apps that allow you to remotely wipe your device in the event that it is lost or stolen. 

Applications also pose one of the biggest threats to mobile security as the number of organisations building their own apps to fit their business needs is growing, with 48 % of businesses expecting to increase their mobile app budgets. Purpose built apps are useful for businesses, however they are also the weakest point of entry for cyber-criminals. Applications have to ask for access to many features on your device, however very few users examine these permissions, making it easier for malicious app developers to gain unnecessary permissions.

While applications, loss and theft pose some of the biggest threats to mobile security there are other threats that you need to protect yourself from. Lookout have suggested that mobile security threats usually fall into one of the following four key categories; application-based, web-based, network-based and physical. Each of these categories can be broken down into further threats, details of which can be found here.

Keep watching our blog for tips on how to keep your business protected from mobile and cybersecurity threats.


Thursday, 2 April 2015

Cybersecurity set to be big issue for Businesses...

Last year saw a number of highly evolved cyber-attacks and data breaches across the globe, with server vulnerabilities such as Heartbleed and Shellshock taking center stage. As a result of the number of high profile security breaches and cyber-attacks, Cybersecurity has been positioned as a key priority for organisations in 2015.

Cyber-security attacks are evolving at an alarming rate, and so the cyber-security products available to businesses are rapidly evolving to keep ahead of cyber criminals.  Therefore it is more important than ever for businesses to keep up to date with the latest versions and updates of their firewalls, antivirus software, intrusion detection/protection systems, VPNs or any other security they may have in place. On top of this it is a good idea for businesses to reassess their cybersecurity practices periodically to ensure they have the best protection available to them.

Cyber security threats come in a wide range of shapes and sizes, such as; malware injection, phishing, social engineering, internal stealing of data among others. However ransomware has been one of the most common forms of malware used over the past few years, and Symantec’s 2014 Internet Security Threat Report noted that ransomware attacks grew by 500 percent in the latter part of 2013. Scammers also continued to run profitable ransomware scams last year, with Cryptolocker making up 55 percent of all ransomware in October 2014 alone.

With the wide range of security products available for businesses, such as; anti-viruses, firewalls, encryption software, intrusion detection/protection systems, it is easy to overlook the need for secure passwords. Passwords still provide the first level of defence against hackers and so it is still important to make your passwords as secure as possible. So why not make sure your password isn’t on SplashData’s worst passwords of 2014 list:
  1. 123456
  2. password
  3. 12345
  4. 12345678
  5. qwerty
  6. 123456789
  7. 1234
  8. baseball
  9. dragon
  10. football
The full list can be found here… “Worst Passwords of 2014”