Category Archives: mobility

Picking the Right Backup Strategy

As part of our backup series, we will be continuing our discussion on backing up your most valuable business asset, your data.

Having a great backup application, like the StaySafe Protection Program, isn’t enough if you don’t have a good backup plan.

A good backup plan includes three components:

  • schedule and frequency
  • retention
  • recovery

Schedule and frequency

When considering your backup strategy, you need to know how often and what time you want your backup to be performed.

Most businesses simply default their programs to nightly because that is what they were told. There was a time when that was the prevalent strategy because of technology limitations. Backups would take all night, clog bandwidth and cause any day time work to come to a screeching halt.

However, times have changed. Newer “smart” programs like StaySafe Protection Program can send data incrementally, thus reducing the network load. They can also detect what has changed and only update those files that have been altered.

Good backup strategy goes beyond technology. Businesses need to consider how they are using their data to properly devise a schedule and frequency.

For instance, let’s say you have an accounting program that is only run once a month after payroll. It would be a wasted effort then to perform daily checks and backup of the data since it only changes every month. Alternatively, there might be a program that collects critical information every second, such as a highly regulated environment. This data may require more frequent backup but only during office hours.

All data shouldn’t be treated the same. Some of your information is more critical for your operation than others. Correctly identifying this information and isolating it will help ensure your backup plan protects your business at the right levels.

Retention

Now that you’ve backed up your data, how long do you keep it?

In a hypothetical world, we’d love to keep the data forever and never risk losing anything. In the real world however, storing data takes up valuable space. Be it a local storage device or remote cloud service, that space is finite and costs your business to increase thus you can’t consider your retained copies as an infinite storage.

So what is the right retention policy?

In many ways it comes down to:

  • schedule and frequency of backup
  • size and type of data
  • BUDGET

If your backup schedule is only monthly and you only retain a month of data, then you will only be as good as the last copy of events. This is hardly any protection from loss or corruption. If you store large files, such as graphic images or videos, the space you require per file increases drastically. The biggest consideration is – how much are you willing to spend on something you may never look at again?

As you can imagine, there is much to consider in this space before you start any backup plan

Recovery

Most business owners are knowledgeable when thinking in terms of backup but many never really spend any time to think about recovery. They assume that as long as the data is “backed up” it must be recoverable.

Unfortunately, that is not always the case. In some situations, the process of backing up changes the data format, making it unreadable by the original application.

Alternatively, the process of recovery could take hours if not days to become operational once more.  Having the appropriate Business Continuity Device, such as the devices by Cornerstone Backup, a Solve-IT.ca partner, can ensure your operation is back in a short period of time.

In still other situations, such as email, newer information may be lost if the backup were to be restored. A decision and procedure needs to be in place to ensure important new information isn’t erased by the recovery procedure.

In still other situations, the business has not set up the right schedule/frequency and retention for backup and the necessary copy of the information is not available for recovery.

The worst situation is when there is an emergency occurs and the necessary people can’t be contacted to get the recovery started.

In all situations, it is advised that after the business has devised a backup plan, including recovery procedures, they include the plan as part of their Business Continuity Plan. At scheduled times this plan is reviewed and tested to ensure it works. Consider it as a “fire drill” for all components including your backup recovery.

Without considering all 3 aspects of recovery, the best backup program in the world cannot properly safeguard your data.

If you need help coming up with a properly developed plan or would like a demo of our StaySafe Protection Program, call us at 905-388-2597 or send Solve-IT.ca an email or contact us directly and we will be happy to work through a plan with you.

 

Safeguarding Your Laptop

In today’s fast paced world, business is always on the move. If you are like many businesses today, this means more than just some glossy metaphor. With lighter, more powerful laptops, your office can travel with you. You don’t have to be out of touch with your critical information simply because you’re “on the road”. With cloud computing and virtual desktops, every aspect of your business can be available to you at the tips of your fingers.

But what happens when you lose the ability to use that laptop? What happens when you have information stored on your laptop that you just can’t afford to lose? Perhaps it’s that latest details of your next major project or the start of a presentation you’re planning on delivering. Perhaps it’s a copy of an agreement or revision notes you’ve taken while you were speaking with a client. Can you afford to lose that work?

As we’ve discussed before, information is one of the most valuable assets of your business. Losing it can cost you and your business a lot.

There are many ways you could lose your laptop, including but not limited to:

  • theft
  • hardware failure
  • damage or dropping your device
  • hard drive corruption

Is the information on your laptop safe from these situations?

According to FBI’s Computer Crime Survey, the estimated cost of computer security incidents is $67.2 billion annually. And based on a recent study by Ponemon Institute, organizations lose up to $7.2 million each data breach and an average of $49,246 of data per lost laptop.

If you are concerned at all, consider the StaySafe Protection program. The Protection program is the newest member of our StaySafe suite of services all designed to help keep your most valuable asset, your data, safe. What makes StaySafe Protection unique is that is has a laptop specific component, Mobile Vault, designed for the “on-the-go” business person.  Mobile Vault provides your laptop will receive industry leading business-class backup service, fully encrypted data transfers, IP tracing and remote data removal. Compare this with traditional backup strategies.

Traditional Backup Plans StaySafe Protection Mobile Vault
Business-class backup of data
AES 256-bit encryption of data ?
Load balance/silent data transfer ?
IP Tracing of devices
Remote data destruction

Business-class backup of data

Let’s face it, not all backups are created equal. Business-class backup comes with a level of integrity that you can’t get from at home versions of backup. Business-class backup includes:

  • redundant systems to ensure optimal uptimes
  • professional level software enabling greater level of control over data
  • ability to apply policies and create procedures the increase compliance of data

AES 256-bit encryption of data

One of the greatest dangers of working with data over the Internet these days is the fear the information can be stolen. Without proper encryption, your business intelligence and competitive advantage is just floating out there for someone to pick up and steal. AES 256-bit encryption is the latest and greatest in industry techniques.

Load balancing and silent transfer of data

Most traditional backup plans will require you set a time to “run” the backup. It utilizes all of your system’s resources to upload the computer’s information into a remote location. This process can take hours to complete and tie up critical systems, slowing down the internet and any other operations on that system. As such, most businesses schedule traditional backup plans to run late at night, when they expect low traffic on their network.

But with remote systems, you can’t always predict when you’ll be hooked up to the internet and available to do this backup. Under the traditional backup plans, that could mean your computer will miss these critical backups. Or worse, your already slow remote connection will move even slower because you’re trying to share the bandwidth with your backup process. Many times, you’re not connected to these remote internet services long enough to truly perform a full backup, thus potentially corrupting your backups and losing your critical data.

Under Mobile Vault, the service is intelligent enough to perform data transfer in increments, transferring small packets so it not only using less bandwidth but can optimize on your limited remote access. If you lose connection to the internet, it will simply resume where it left off and thus prevent data corruption.

IP Tracing and Remote data destruction

One of the scariest things that can happen to any business person is losing their laptop. Not only is it a physical asset loss, it could also mean the loss of critical information and compromise of the business. With Mobile Vault, businesses are now able to track and remove critical information even if the computer is physically lost.

Using the administrative interface, Mobile Vault can put a listener out on the Internet. As soon as the computer tries to connect to the internet again (which is a standard process triggered when most computers turn on), the system will retrieve the location of the computer via IP address. From here, the lost device can be located and any critical information removed remotely from the system.

Interested to learn more about what StaySafe Protection or any services under the StaySafe line can offer your computer? Just give us a call or email today. We’d be happy to assist you further and help evaluate if this service is right for your business.

iPads are not just for play

If you think iPads are just for leisure or for entertainment, think again. With nearly 86 percent of Fortune 500 companies in the US report deploying or testing the iPad, this revolutionary device has become a tool for business too!

Manufactured by Apple, these easy to hold, easy to transport, and easy to use devices use the same operating system as iPod Touch and iPhone. They do not use input devices like the mouse or keyboard and require you to use your fingers to touch and navigate. Thanks to the availability of hundreds and thousands of applications that range from entertainment, media and education to even productivity and business, the iPad can be used as one powerful device in all areas of life and your workplace is definitely no exception.

Here are reasons why you should bring your iPad to work:

Presentations: Presentations are made so much easier by iPads. First off, they are portable and secondly, they contain applications that allow you to import and edit PowerPoint presentations, and even accessories to connect the device to a monitor or projector. You can also do virtual presentations as there are iPad apps that let you stream your presentation via the Internet.

Communication and Collaboration: If it is communication and collaboration you want, the iPad is the name of the game. With the iPad, you get built-in applications for emailing and you also get to add more to support audio and video conferencing. You can manage meetings with the built-in calendar and address book apps and also use the built-in support it has for third-party mail and calendar applications like Microsoft Exchange, Google Mail, and Calendar. If you want, you may also download and use additional applications to help you manage your tasks, monitor projects, share files, post and view your social networks! And the iPad’s larger screen is definitely a plus!

Field assignments: The iPad is the best device for people on the go as it is light weight and portable. You can install and configure VPN clients to securely connect to your office network when in the field, or even use any of the business applications (mainly cloud based ones) you use in the office. Managing your itinerary while on assignment also becomes much easier with the iPad, thanks to the built-in productivity tools.

Travel: With the iPad, you can carry your whole world as you travel. Besides the apps that help you manage your travel itinerary, there are built-in communication and collaboration tools that let you touch base with your office and find out what progress is being made. When you are not using your iPad for work, you can use it as a media viewer or news reader for information and entertainment.

Industry-specific apps: There are many industry specific apps that let you use the iPad for various purposes. You can use it as a point-of-sale display, or even as a point-of-sale device and much more!

You should discuss the best way to deploy your iPad with your trusted Hamilton IT support specialists. Give us a call today and we can help you with all your business mobility needs.

4G Is Coming To Canada

4G is finally here. Though it will initially be available only in a few major Canadian cities, it will be available. With Telus officially announcing the rolling out of this technology starting in mid-2011, the prediction made by Deloitte’s Technology Media Telecommunications earlier this year appears to be coming true.

The report had suggested that the adoption of 4G might be slower than expected as some mobile providers have not fully utilized their existing 3G spectrum. Whatever it is, some of us will be using 4G soon. But what exactly is 4G? The term “4G” has been highly used with different carriers having their own definitions for the term making us more confused by the day.

4G, in simple terms, refers to wireless network-based on fourth-generation technology which will provide faster wireless service over 3G. It will be much more reliable and faster than the existing 3G wireless network, and the technology has been developed to cater to consumer’s growing demand for data to power their smartphones and tablet devices.

4G mobile technology and wireless carriers will have to implement one of the two systems, either Worldwide Interoperability for Microwave Access (WiMAX) or Long Term Evolution (LTE) for the service to work. As far as Telus, the pioneer here, is concerned; it will be deploying LTE network and operate on the Advanced Wireless Services (AWS). Rogers, Bell, and Wind Mobile have also been thinking of using the same system but they have not made any announcements yet.

The transition from 3G to 4G will take some time. In fact, some of it has already been done. In 2009, Telus and Bell had brought forth 3G HSPA+ wireless network (also known as 3.5G). The 4G wireless network, according to Telus, will appear in early 2012 (remember, only in major cities) and it will take a short while for the service to be available nationwide.