Putting off a decision on backup?Doing nothing is really risky and pointless.The tech is awesome the cost is affordable and getting caught is a really bad experience. There is no better time than now to get your affairs in order. We live in a world where the risk of losing your important files, resources and reputation is no longer a topic for our employers to worry about. The risk has left the office and is now invading our homes and professional lives. As I begin to write this article I am deliberately avoiding the more sensationalist topics about this risk. There is plenty of information on line today you can read and get your fill if needed of just how bad it can be if you do nothing. In this article I intend to speak about practical steps that you really should take now. These steps will protect you and your communities from losing digital assets. I am referring to the assets you assume will last forever. Assets you intend to pull out and share with friends family and grandchildren in the future. Perhaps you have files and information you use for your business, professional and community purposes, and overlooked that these won’t be replaceable if ever lost. For example, these assets may include photo’s, camcorder footage, scans of invoices, certificate, passports. They could be databases, presentations, forms, procedures and more. The point is some if these you may never have the time, opportunity or will to recreate if you loose them. Even movie and photo collections, losing these will at best cost you time to recreate, at worst the subject matter, person or holiday moment will never come again. I for one don’t want to be explaining to grandchildren why photos of their childhood are gone. So now I have your attention, let’s be pragmatic about what we should protect ourselves against. It helps to make a list of requirements, and this is usually birthed from a list of risks. The risk list is simple enough to understand, some examples are:
In short too many risks to list, the point is you need a plan. WAIT WAIT, before you tune out or start skipping or not reading this article carefully, I fear I should share a quote from a friend of mine. A lovely Italian lady lives in Sutherland, who lost a bunch of files recently. Photo’s, memories, files for work and interests, all were important to her when her notebook (of many years) failed and had to be reformatted. She lost everything. I hope I can do her justice, however in my defense I don’t speak Italian, but it went something like this.
Surprisingly she has a good set of lungs which appears to of resulted in a series of shock waves. The CSIRO, just 5 Km from her home was in lock down for the rest of the day. OK just joking, not as funny now I read what I have just written, but her experience was genuine and I am sure we have all felt that anger and frustration before. Your plan needs to:
So I guess your saying,
Well you’re in luck because we have a kick starter guide to fast track you through! Step 1: Make a list of requirementsThis is absolutely the simplest and safest place to start. Most people will start with a list of risks, but since your thinking about making an investment that will be with you for many years, why not make that investment do more than just protect! Buying a NAS today should be fun, because the devices will perform a lot more than just backup. By this I mean a decent NAS capable of providing a solid backup for the home or office, will these date give you a lot of other nice things that you probably were not expecting. So your list of requirements can and should include a list of additional functions and nice to have features. Modern smartNAS devices are very clever and can do a lot more than backup, networking and remote access. Plus most of the better products have these features built in at no extra cost. A quick way to examine your requirements if the smikbox Quick Quiz and requirements tutorial. Just by going through this quiz you will learn more about what you need to be considering. Home / Office Requirements TutorialTo complete this tutorial, click on the accordions below and the tutorial in that section will be shown. This configurator has 3 sections:
You should complete Sections 2 and 3. If you’re intending to use smikBox for business or professional purposes please also complete Section 2. Sections 1 and 2 have an introductory video at the top. Please watch the introductory video before answering questions. When you have completed the questions enter your email in the place provided, and make sure to use the same email you will use when placing the order. Your configuration report will be sent to the email provided. If you complete this questionnaire more than once, the last submission is recorded as your stated requirements.
Fill out my online form.
//
var q1vdr2um0ugte00;(function(d, t) {
var s = d.createElement(t), options = {
'userName' : 'mediacomms01',
'formHash' : 'q1vdr2um0ugte00',
'autoResize' : true,
'height' : '516',
'async' : true,
'header' : 'show',
'host' : 'wufoo.com',
'entSource' : 'wordpress',
'defaultValues' : ''
,'ssl' : true };
s.src = ('https:' == d.location.protocol ? 'https://' : 'http://') + 'wufoo.com/scripts/embed/form.js';
s.onload = s.onreadystatechange = function() {
var rs = this.readyState; if (rs) if (rs != 'complete') if (rs != 'loaded') return;
try { q1vdr2um0ugte00 = new WufooForm();q1vdr2um0ugte00.initialize(options);q1vdr2um0ugte00.display(); } catch (e) {}}
var scr = d.getElementsByTagName(t)[0], par = scr.parentNode; par.insertBefore(s, scr);
})(document, 'script');
// Fill out my Wufoo form!
Fill out my online form.
//
var x16jspvg18fmh26;(function(d, t) {
var s = d.createElement(t), options = {
'userName' : 'mediacomms01',
'formHash' : 'x16jspvg18fmh26',
'autoResize' : true,
'height' : '516',
'async' : true,
'header' : 'show',
'host' : 'wufoo.com',
'entSource' : 'wordpress',
'defaultValues' : ''
,'ssl' : true };
s.src = ('https:' == d.location.protocol ? 'https://' : 'http://') + 'wufoo.com/scripts/embed/form.js';
s.onload = s.onreadystatechange = function() {
var rs = this.readyState; if (rs) if (rs != 'complete') if (rs != 'loaded') return;
try { x16jspvg18fmh26 = new WufooForm();x16jspvg18fmh26.initialize(options);x16jspvg18fmh26.display(); } catch (e) {}}
var scr = d.getElementsByTagName(t)[0], par = scr.parentNode; par.insertBefore(s, scr);
})(document, 'script');
// Fill out my Wufoo form!
Fill out my online form.
//
var ra9bbi41at9jiz;(function(d, t) {
var s = d.createElement(t), options = {
'userName' : 'mediacomms01',
'formHash' : 'ra9bbi41at9jiz',
'autoResize' : true,
'height' : '516',
'async' : true,
'header' : 'show',
'host' : 'wufoo.com',
'entSource' : 'wordpress',
'defaultValues' : ''
,'ssl' : true };
s.src = ('https:' == d.location.protocol ? 'https://' : 'http://') + 'wufoo.com/scripts/embed/form.js';
s.onload = s.onreadystatechange = function() {
var rs = this.readyState; if (rs) if (rs != 'complete') if (rs != 'loaded') return;
try { ra9bbi41at9jiz = new WufooForm();ra9bbi41at9jiz.initialize(options);ra9bbi41at9jiz.display(); } catch (e) {}}
var scr = d.getElementsByTagName(t)[0], par = scr.parentNode; par.insertBefore(s, scr);
})(document, 'script');
// Fill out my Wufoo form!
from SmikBox http://smikbox.com/choosing-the-right-nas-for-your-home-or-office-network/ from https://clintonmcdougall.tumblr.com/post/164252510514
0 Comments
Up till now one of the functions organizations have looked to the Cloud to provide is backup of infrastructure. Now throughout this article wherever there is reference to cloud computing it should be assumed the cloud service could be using an externally hosted using a Cloud service provider, hosted on your own equipment (Private cloud) or a combination of both (Hybrid cloud). Today there is a greater acceptance of the Clouds role within a company’s risk mitigation strategy as this backup a option that has gradually replaced the use of physical on premise equipment. In their haste many companies, haven’t been quite as careful as they should to plan the subsequent changes this shift has made on the security of their platforms, and in some case have opened up new holes that were previously unthought-of. Industry has within this new period found that building complex security options by means of firewalls and control procedures around their physical systems is the most logical precaution, but in doing this it has become clear that traditional security measures come at a high cost and are still not all together without their own risks. The world has been moving towards virtualization for some time. Several years back their was a misconception that Virtual machines were slower but as always technology has advanced to close that gap. This has given rise to an entire industry that uses virtual systems, data processing centers to provide a pay as you go service (SaaS, IaaS, PasS). These new hosted services running on virtual platforms have an altogether new range of issues that a business professional must take into consideration. Typically the issues management should consider are the threat of loss through; system disaster, hacking , neglect, human error , business growth or decline, virus, denial of service just for starters. It makes good sense and is supported by a long list of success cases, to transition your existing on premise systems to virtualized systems running on either a separate sever hosted in the cloud or your own private cloud hosted on premise. All the major development and new ideas will be directed towards this type of technology, and although single purpose server will remain around for many years to come, its clear that all the new innovations will surface first on technologies that take advantage for virtualization principles, be that VMware, Docker (application) contains or Microsoft services. From a security and management standpoint, the first step for any company is to; after moving from physical to virtual servers for hosting of business systems to then merge physical / server centric security / server management systems to those provided by vendors (Virtualization and Hypervisor platforms). Whilst their effectiveness can vary (with virtualization focused strategy for VM’s and hypervisor within the virtual system) , it is clear that using the traditional security practices will not be enough moving forward. A different approach widely adopted can be separate security and infrastructure and that’s where virtualization performs a vital function. Regardless of whether the company increasing it’s use of virtualization or just transitioning existing servers to a virtual platform, here are some ideas on the benefits. Variety provides multiple layers of protectionThe sheer number of software applications, configurations, business requirements, industries and personal creative biases that are used across systems these days, makes it improbable that identical infrastructures are created. Therefore given each company’s infrastructure in itself unique, this helps to provide a security barrier to any would be perpetrator trying to discover, learn a new environment. So it makes the systems more difficult to crack, and even if the penetrator has deep knowledge of a specific product, it is highly unlikely he/she would know how it is used, configured in your environment. The inverse of this is of course new staff joining an organization has to start all over to learn “where things are”, but most firms have induction programs to overcome this. Then there is the number of applications, vendor supplied tools, API’s and technologies making it difficult for any would be hacker to know enough to have sufficient experience across all disciplines to be a threat to a modern system. Again the flip side of this is also that your staff have to be specialized and wont ever become fully acquainted with all the systems in use within your infrastructure. Virtualization is of assistance here as it manages the majority of the tasks needed to protect, recover and maintain the server instances that host your company data and applications. These virtual machines can deploy software using entire server (instances) or as what is called “micro-segmentation” or “application containers” which offer additional layers of protection along side improved performance and further protection against failure coming when applying new software updates. Security solutions are today custom built to each and every environment, and will differ greatly from company to company. Virtualization means systems are always on-lineMore and more people are recognizing new benefits from having systems always available. In the past machines needed to be periodically shut down for a variety of reasons. When they were down or undergoing restart people were locked out of the machine and productivity and business opportunity was lost. Today the nature of virtualization is such that on line backup, snapshot capabilities allow servers to be constantly on and in rare cases where for example an upgrade is underway, people can be quickly provided with a “Cloned” version of a machine to use whilst the main machine is undergoing maintenance. Business FlexibilityAnother benefit of virtualization is in its ability to allow the business to quickly try new ideas and at a low cost. Business units can test a new idea on a server in minutes, whereas with traditional infrastructure, new servers, capital expenditure, staff and resources would need to be found and allocated. This is not so with virtualization. Today businesses are discover the benefits of being able to spin up a new server and test an idea , market or process with minimal additional costs. A functional manager can approve these projects within their local budget. Innovation in a sense becomes more a part of day to day activity rather than a strategic capital outlay. These virtual business experiments can be localized so any possible to avoid security holes being exposed to anyone outside the business unit. Access would always be restricted to specific people or groups to mitigate risk. Centralized controlYour systems can be accessed internally or externally and today security and encryption technologies are much stronger than 10 years ago, but the centralised control of all these machine is what gives your organization the greatest protection through it’s virtualized environment. The premise behind control is not just to protect servers and all their data. It is to manage access to smaller parts of the infrastructure and give granular control and reporting over usage and access that you can manage centrally with the click of a button. ProactiveModern systems are not constrained to the practice of reading log files to identify problems; they are instead systems capable of warning and even take counter measures when there is a problem.
Making businesses more successfulThe cultures of modern companies have changed and users that are no longer just a group of people working in offices around the country. Users are partners, shareholders, the industry and as always customers. All these people communicate with the business at different times and in different ways. The modern-day business really needs to keep up it’s competencies so it can react to these needs as they arise. Much of the initial discussion around use of virtualization within a business starts with the financial justification, which is almost always based on risk and cost saving. Whilst these outcomes and benefits are real and cannot be ignored I would encourage businesses to step back and greet the bigger picture. Virtualization and application containers will be at the forefront of business innovation for the foreseeable future and it’s important to companies to develop the internal competencies needed to use it. It seems likely that company’s all firms will need this to be successful in the future and the earlier adopters should gain an early competitive advantage. from SmikBox http://smikbox.com/benefits-of-cloud-computing-to-business-security/ from https://clintonmcdougall.tumblr.com/post/158877163844 |