Quality IT, Advice, Support and Delivery

Monday, 30 November 2015

7 ways to spot a Phishing Email

One of the most common ways to contract a virus or infection on your PC or Laptop is through phishing emails. Typically Phishing emails are designed to look like they are from a well-known and trusted company, usually banks, financial organisations or couriers, in order to trick you into providing sensitive...

Thursday, 12 November 2015

Phishing FAQ's

What is Phishing? Phishing is a type of online identity theft, which typically uses emails and fraudulent websites, in order to steal information such as credit card details, passwords, account details and other personal information. Phishing emails and websites often falsely claim to be an established legitimate enterprise in an attempt to get you to share your private information. How does...

Thursday, 29 October 2015

Veeam Availability Suite & Veeam Backup Essentials

What is Veeam Availability Suite? Veeam Availability Suite provides availability for all applications, by combining the industry leading backup, restore and replication capabilities of Veeam Backup and Replication with the advanced monitoring, reporting and capacity planning functionality of Veeam ONE. Veeam Availability Suite delivers everything you need to reliably protect and manage your VMware...

Thursday, 15 October 2015

Veeam ONE

What is Veeam ONE? Veeam ONE is a virtual management and optimisation tool, offering monitoring, reporting and capacity planning for VMware vSphere, Microsoft Hyper-V and the Veeam backup infrastructure. It helps enable availability for the modern data center, by providing complete visibility of the IT infrastructure, in order to detect issues before they have an operational impact. Veeam ONE offers...

Thursday, 1 October 2015

Veeam Backup & Replication

What is Veeam Backup & Replication? Veeam backup and replication is a backup software, providing VM backup for VMware vSphere and Microsoft Hyper-V virtual environments. Veeam leverages virtualisation, storage and cloud technologies to deliver a recovery time of less than 15minutes for all applications and data. Veeam backup and replication brings backup and replication together in one single...

Thursday, 17 September 2015

VMware Horizon 6 and how it can benefit you..

What is Horizon 6? VMware Horizon 6 leverages the best of Horizon View and extends these benefits beyond VDI, providing end users with on place to securely access all their desktops, applications and online services, from any device. Horizon 6 allows organisations to deliver virtualised or remote...

Thursday, 3 September 2015

What is Desktop Virtualisation?

What is Desktop Virtualisation? Desktop Virtualisation is a virtualisation technology used to separate a computer desktop environment from the physical computer. Similarly to Server Virtualisation, Desktop Virtualisation relies on a thin layer of software known as a hypervisor, which is run on bare-metal...

Thursday, 20 August 2015

What does Business Continuity actually mean?

What is Business Continuity? While disaster recovery plans cover the steps businesses take to recover, in the aftermath of a disaster, business continuity describes the procedures that businesses operate in order to ensure their business essential functions can continue during and after a disaster....

Thursday, 6 August 2015

What is Disaster Recovery and Why does your business need it?

What is Disaster Recovery? Disaster Recovery is the area of security planning that refers to the specific steps that a business takes to resume normal working business in the aftermath of a disruptive event. Generally, disaster recovery plans involve a set of policies and procedures to enable the recovery...

Thursday, 23 July 2015

Cisco Jabber Business Communications

What is Cisco Jabber? Cisco Jabber is a Unified Communications application for PC, Mac, tablets and smartphones, and can be used with either on premise or cloud-based unified communications services. While adhering to industry standards such as XMPP, SIP and H.264, Cisco Jabber also provides a...

Thursday, 9 July 2015

Cisco BE 6000 IP Telephony System

The Cisco Business Edition 6000 is a purpose built, affordable and simple collaboration system, designed to strengthen your business relationships through improved interactions and experiences. The BE 6000 delivers end-to-end collaboration capabilities for up to 1000 users, 2500 devices, 50 sites...

Thursday, 25 June 2015

Panasonic NS 1000 Business Communications Server

16:57 Posted by Practical Networks No comments
The NS 1000 business communications server by Panasonic is designed to deliver solutions to business challenges, while flexibly adapting to the way each organisation works. The NS 1000 provides solutions such as: • Simplifying & improving communications • Lowering costs • Diversifying...

Thursday, 11 June 2015

What are Unified Communications?

What are Unified Communications? Unified communications (UC) is the term used to describe communications which integrate to optimize business processes and increase user productivity. UC’s optimize business processes and increase user productivity by eliminating device and media dependencies and...

Thursday, 28 May 2015

Windows Server 2003 Migration Planning

Windows Server 2003 end of life is the perfect excuse for business innovation, so why not take advantage of the opportunity. Migrating away from Windows Server 2003 allows you to update your system and take full advantage of the updated features available with newer software. The migration solutions available offer new data center automation and a flexible infrastructure that breaks through the traditional...

Wednesday, 13 May 2015

Windows Server 2012 R2 - Upgrade Now!

As cybersecurity is set to be a major focus for businesses this year, we feel it fitting that our software pick this quarter is the Windows Server 2012 R2. Windows Server 2012 R2 is the most recent version of Microsoft’s Windows Server Platform and so is the most logical choice when migrating from...

Thursday, 30 April 2015

Cybersecurity & Mobile Security Tip for Businesses!

Cybersecurity is becoming more and more of an issue for businesses, as security attacks are evolving at an alarming rate. Last year in particular saw a number of high profile security breaches, such as; Heartbleed and Shellshock, positioning cybersecurity as a major concern for businesses and individuals...

Thursday, 16 April 2015

Mobile Security - A Business Must Have!

Mobile security is becoming increasingly more important for businesses; due to the significant increase in bring your own device (BYOD) workforces. Companies put a lot of effort into building up their network defences for PCs, however most seem to overlook smartphone security, but there are now a great...

Thursday, 2 April 2015

Cybersecurity set to be big issue for Businesses...

Last year saw a number of highly evolved cyber-attacks and data breaches across the globe, with server vulnerabilities such as Heartbleed and Shellshock taking center stage. As a result of the number of high profile security breaches and cyber-attacks, Cybersecurity has been positioned as a key priority...