Tuesday, October 1, 2013

What is cloud computing?

Technically speaking…

Cloud computing is Internet-based computing, whereby shared “resources” (servers, disk space, firewalls, backup, software and the services needed to install and support it) are provided to users to their personal computer, laptop and other devices on-demand, like a utility (electricity, water, etc.). SaaS, or “software as a service” is a cloud computing service. The hardware, software and support required to host and deliver the application is the sole responsibility of the SaaS provider, not the end user. The end user only pays for the service of using the software on an as-needed, subscription basis, or simply uses the service. Some examples of cloud-based applications are Quickbooks Online, Office 365, and DeskSpace Attorney,etc. Some examples of free cloud applications are Facebook, Gmail and even your bank’s online access.

What is cloud computing? 

The best way to illustrate what cloud computing is and why it’s spreading like wildfire is to compare it to the modern electric utility industry. On September 4, 1882, Thomas Edison opened the Pearl Street electricity generating station in New York city, introducing the concept of electricity as a utility. There were four key elements introduced by Edison’s concept of electricity as utility that were, previously, unheard of: 1) reliable central generation, 2) efficient distribution, 3) a successful end use (in 1882, the light bulb), and 4) a competitive price. Up until 1882, factories or other entities requiring electrical power were required to build and maintain their own generators – a very expensive, time consuming distraction for most companies whose core business centered on producing a product or other service. The idea of being able to pay for electricity as a utility as opposed to producing it on their own was a highly-attractive proposition for businesses who didn’t want the cost and distraction of producing their own power.
Cloud computing is essentially offering the same promise to businesses today. Until recently, the cost of building and maintaining your own computer network in house has been a “necessary evil” of running a business. But now, thanks to major advancements in Internet connectivity and technology, businesses can simply pay for basic IT necessities on a “utility” basis. Of course, cloud computing isn’t ideal for everyone just yet and we will see a period of hybrid networks where businesses have some applications in the cloud and others on site; but it IS a much smarter, lower-cost way of meeting basic computing needs (e-mail, spreadsheets, word processing, backup, and file sharing for example).

What cloud computing is NOT:

The term “cloud computing” gets thrown around a lot and is often used to describe the following services, which are only pieces of a cloud computing solution:
  •       A data center
  •      Colocation of data in a data center
  •      Managed hosting or hosting
  •      A simple “aaS” platform (IaaS, PaaS or SaaS )


Why would a business owner choose cloud computing over a traditional network?

There are a few key advantages:
  •      The cost of buying, installing and supporting a computer network goes down dramatically.
  •      You gain greater flexibility in accessing your computer network (files, applications, etc.) remotely and from various devices (laptop, iPad, Blackberry, etc).
  •      You gain the benefit of having built-in disaster recovery and data backup.
  •      You can purchase cheaper workstations (devices) and get them to last longer since the computing “power” is in the cloud and not on the individual workstation.
  •      Since you are paying for the service like a utility, it’s cheaper and easier to add and remove workers from your network.
  •      You avoid hefty network upgrade costs.
  •      You no longer need to pay for someone to maintain your network (server, firewall, patch management, backups, etc.)

Tuesday, August 27, 2013

5 Tips For What NOT To Do When Creating A File Naming Structure

1. Do not develop a file name dependency

File names are not actually part of the file, but rather part of the file system and are therefore not dependable as being persistent over time and across systems. The Unique ID (UID) assigned to the object should be the constant identifier used to track and maintain the provenance of the file. The UID may end up being the same as the file name, but whatever the case be sure to embed the UID inside the file in an appropriate and documented place.

2. Do not overthink

Whether the filename is a randomly generated value or not, be systematic. Think, “Is this logical? Can I spell out the rules easily enough to do batch renaming?” In trying to create the perfectly contained and expressed filename or UID structure, there is a strong temptation to overthink them to the point that they become non-systematic or too idiosyncratic to be logically parsed. If a naming structure is not systematic enough to have a piece of software perform a series of logical renaming steps, there will be lots of manual hours spent retyping names if a mass renaming of files is required at some point in the future.

3. Do not use filenames as database records

Filenames are not the place to cram in a bunch of descriptive and structural information. That’s what databases are for! All we require from a filename and ID is that they act as a link to the database record for that unique object. Trying to cram excessive descriptive information into a filename creates unwieldy names and is often futile because of how often conditions or conventions change and new scenarios come up over time. Having filenames that are tied to closely to specific scenarios creates inflexible structures that require non-systematic revision when situations change, which and it puts you in the predicament described in tip #2.

4. Do not make it machine-unreadable

There is often an urge to make a file naming structure decodable by humans, but it also needs to be decodable by computers. Avoid characters that are not URL compatible, that require escape characters, or are reserved by operating systems. Limit options to numbers, letters, periods, and underscores.

5. Do not assume you will be the first person naming the file


When establishing file naming conventions for a collection, most people are considering it in terms of newly derived files reformatted from other sources. In reality, there will be more and more born digital content deposited with archives that already have filenames. In some cases, these can be renamed to fit the archive’s naming structure with no loss of information, but at other times, such as with P2 files, the inherited naming structure refers to complex file and directory structures that must be maintained in order to preserve the whole content. Naming structures should be flexible enough to recreate any necessary naming conventions.

Thursday, July 11, 2013

Disaster Recovery: Preventing loss

Have you ever lost an hour of work on your computer?

Now imagine if you lost days or weeks of work – or imagine losing your client database, financial records, and all of the work files your company has ever produced or compiled.

Imagine what would happen if your network went down for days, where you couldn’t access e-mail or the information on your PC. How frustrating would that be?

Or, what if a major storm, flood, or fire destroyed your office and all of your files? Or if a virus wiped out your server…do you have an emergency recovery plan in place that you feel confident in?

How quickly do you think you could recover, if at all?

Many small business owners tend to ignore or forget about taking steps to secure their company’s network from these types of catastrophes until disaster strikes. By then it’s too late and the damage is done.

But That Could Never Happen To Me!
(And Other Lies Business Owners Like To Believe About Their Businesses…)

After working with a number of small and mid-size businesses in Escambia and Santa Rosa counties, I found that 6 out of 10 businesses will experience some type of major network or technology disaster that will end up costing them between $9,000 and $60,000 in repairs and restoration costs on average. 

That doesn’t even include lost productivity, sales, and client goodwill that can be damaged when a company can’t operate or fulfill on its promises due to technical problems.

While it may be difficult to determine the actual financial impact computer problems have on your business, you can’t deny the fact that they do have a negative effect. If you’ve ever had your business grind to a screeching halt because your server crashed, you must have some idea of the frustration and financial loss to your business even if you haven’t put a pencil to figuring out the exact cost.

Most Computer Problems Are Hidden And Strike Without Warning, And At The Most Inconvenient Times
Hardware failure, viruses, spyware, and other problems usually aren’t detectable until they strike by causing a server to go down, data to be lost, or some other catastrophe. Viruses and spyware are particularly sneaky because they are designed to hide themselves while they do their damage. For example, spyware can secretly transmit information about you and your company to an outsider without being visible to you.
Even if your network was recently audited by a computer consultant, viruses, spyware, and hackers are constantly attacking your network (that is why we constantly monitor our clients’ networks because you never know when a new virus is going to strike).

Unfortunately, most computer consultants only offer “break-fix” services. That basically means when something breaks or stops working, they come in and fix it. While this may seem like a good setup for you, it actually leaves you wide open to a number of threats, problems, and other disasters because it is reactive rather than proactive maintenance.

Take a look at these statistics:
 Companies experience an average of 501 hours of network downtime every year, and the overall downtime costs an average of 3.6% of annual revenue.  (Source: The Costs of Enterprise Downtime, Infonetics Research)
 93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster, and 50% filed for bankruptcy immediately. (Source: National Archives & Records Administration in Washington.)
 20% of small to medium businesses will suffer a major disaster causing loss of critical data every 5 years. (Source: Richmond House Group)
 This year, 40% of small to medium businesses that manage their own network and use the Internet for more than e-mail will have their network accessed by a hacker, and more than 50% won’t even know they were attacked. (Source: Gartner Group)
 Of those companies participating in the Contingency Planning & Management Cost of Downtime Survey: 46% said each hour of downtime would cost their companies up to $50,000, 28% said each hour would cost between $51,000 and $250,000, 18% said each hour would cost between $251,000 and $1 million, and 8% said it would cost their companies more than $1million per hour. (Source: Cost of Downtime Survey Results, 2001.)
 Cyber-criminals stole an average of $900 from each of 3 million Americans in the past year, and that doesn't include the hundreds of thousands of PCs rendered useless by spyware. (Source: Gartner Group)

What These Failures Are REALLY Costing Your Business
Even if you don’t factor in the soft costs of lost productivity, there is a hard cost of repairing and restoring your network. Most major network repairs will require a minimum of four to eight hours on average to get the network back up and running. Plus, most consultants cannot get on-site to resolve the problem for 24 to 48 hours. That means your network could be down for one to two days.

Since the average computer consultant charges over $100 per hour plus a trip fee and a surcharge if it’s an emergency, the average cost of these repairs is $600 to $1,000; and that doesn’t even include any software or hardware costs that may also be required. Over a year, this results in $1,800 to $3,000 in costs without even considering hardware and software costs, or other soft costs of lost sales and work hours. Of course, those numbers quickly multiply with larger, more complex networks.

What’s most exasperating about this situation is that 100% of these disasters and restoration costs could have been completely avoided or greatly mitigated easily and inexpensively with a little planning and proactive maintenance.

Why Small Business Are Especially Vulnerable To These Disasters
With the constant changes to technology and the daily development of new threats, it takes a highly-trained technician to maintain even a simple 3 to 5 person network; however, the cost of hiring a full-time, experienced technician is just not feasible for most small business owners.

In an attempt to save money, most try to do their own in-house IT support and designate the person with the most technical expertise as the part-time IT manager. This never works out because this makeshift IT person has another full-time job to do and is usually not skilled enough to properly support an entire computer network anyway.

This inevitably results in a network that is ill-maintained and unstable. It also means that the backups, virus updates, and security patches are not getting timely updates, giving a false sense of security.


Visit our website www.youritpensacola.com to learn more about our Disaster Recovery services.

Wednesday, June 19, 2013

FAQs: Regulatory Compliance

What regulations am I likely to encounter?State and federal regulations often set rigorous standards for data protection and privacy. Depending on your industry, your IT infrastructure will need to meet these requirements, and Your IT Cloud Backup can help. Most often, regulations govern industries and the way information is kept and transmitted. Some industry-specific regulations include:
  • Sarbanes-Oxley (SOX) Section 404 for Accountants
  • PCI DDS Requirements 3, 4, 7, and 9 for Retailers
  • Gramm-Leach-Bliley Section 501 (b) for Bankers
  • HIPAA’s Security Rules for Medical and Dental Offices
  • State Legislation like MA 201 CMR 17 and similar laws 
How do these regulations impact data security, storage, backup and recovery?
While these laws govern different industries, all address three common, key items:
  • Protection of data from loss/destruction
  • Encryption of data over open networks
  • Limited physical access to stored data
Regulations prescribe standards for how information is stored, secured, archived and accessed. In some cases, companies are required to maintain records for a period of years and ensure they’re well safeguarded. Working with Your IT Cloud Backup, you can create the IT infrastructure you need to support relevant compli­ances. Your IT Cloud Backup can be a key part of your overall solution, as it offers a highly secure backup supported by redundant data centers that meets or exceeds regulations regarding protection, encryption and physical access. 

What’s my risk if we’re not compliant with industry regulations?
If you fail to comply with relevant regulations, you could face heavy fines and penalties. The U.S. Department of Health and Human Services is responsible for HIPAA-compliance enforcement. Credit card providers will fine retailers who don’t follow PCI guidelines. The SEC oversees Sarbanes-Oxley, which can carry criminal penalties for violations.
Penalties can be substantial. Several multi-million dollar fines have been issued against healthcare providers and insurers found in violation of HIPAA guidelines. In 2012, the agency started turning its attention to smaller providers; a five-physician practice based in Phoenix was fined $100,000 in 2012 following an investigation that found the practice failed to safeguard patient information and take other security measures. PCI violations can often carry five-figure penalties against small, independent retailers who don’t safeguard consumer credit card data. In short, the risk is substantial and real.
Beyond fines and punitive action, you can face the risk of lawsuit liabilities and the damaging impact to reputa­tion and lost business that negative publicity would inevitably bring.

Will I be compliant if I use Your IT Cloud Backup?
Your IT Cloud Backup is a cloud backup, archiving and recovery solution that automates the processes of securely backing up elec­tronic data and file recovery. It was created with these data protection regulations in mind to satisfy the broad need for a safe, reliable, and cost-effective method of backing up data offsite and allowing full file restoration at any time from any authorized location. Your IT Cloud Backup provides a highly secure solution that can be used to meet or exceed regulatory compliance when scheduling, encryption, and archiving rules align with regulations.

Saturday, June 1, 2013

Network Security Diagnostic

A Network Audit is an intensive diagnostic and planning service designed to check the critical components of your computer network for security, reliability and performance. To make sure your network is running at peak performance and protected from data loss, downtime, viruses and security breaches, this audit should be performed at least once a quarter if you are not having your network regularly monitored and maintained.

By evaluating your network once a quarter and reviewing your future business goals and objectives, we can ensure that one of your most valuable business tools, your network and the information it holds, is performing at peak efficiency and safety. One of our trained engineers will perform this audit, and then alert you to any potential problems they discover. We will then advise you on your options for remedying the situation.
The following components will be audited:
  • File servers
  • Backup system
  • Network infrastructure and configuration
  • Workstations, laptops and smart devices
  • Foreseeable company growth and expansion
Within each of these components, a plethora of issues will be investigated and any potential problems will be resolved.
Here are the five most important reasons to perform network auditing:
  1. Vulnerabilities: Using network auditing to assess the security of your systems and identify vulnerabilities is one of the most useful forms of preventative security available to you. These weaknesses can include firewall holes, unapproved services or weak or blank passwords and can be used to assess both workstations and servers. Identifying these issues is the first critical step towards remediating them.
  2. Patch Management: Network auditing can play a key role in your patch management efforts as well. You and your IT expert at Your It Solutions can use network auditing reports not only to identify systems that need to be patched, but also to confirm that patches are successful.
  3. Hardware Inventory: Network auditing can help maintain an up-to-date inventory of all the hardware on your network so you know exactly what you have  and can therefore enable you to easily make hardware related decisions, such as which systems are getting old and need to be updated to keep up with the ever-increasing workload.
  4. Software Inventory: Hardware isn’t the only thing that is important to your workstation. Knowing what is running on your workstations and servers is just as important as knowing what hardware is running. How many Macs still need to be upgraded? Who is still running CS4 or hasn’t updated their PDF reader since 2009? Network auditing can give you a clear and complete view into what software is installed on your workstations and servers so you know just what you have and what needs upgrading.
  5. Compliance: One of the most useful things network auditing can assist you with is your compliance activities. You can quickly and easily ensure that all systems are compliant with your internal policies, and can also be sure that you have licenses for all the software in use on your network. Too often companies find out too late that an open share enabled everyone in the company to install software that was only licensed for one or two users, and have to scramble to upgrade your licensing.
Network auditing may sound like an arduous task, but with the right tools and the right approach, provided by Your IT Solutions, it can be an easy to perform and critical aspect of your network management toolbox.