Wednesday, February 26th, 2014
By Eric Hunter
Ask any of our clients who have had issues with computer viruses, not only is it a royal pain, but it also leads to employee downtime. Currently we have been testing Symantec Endpoint Software internally with great success. We hope to have it tailored to our clients’ needs very soon and deployment available in the next month. Its usability is off the charts!
Watch this Video from Symantec
The difference between standard virus protection and an endpoint manager is that it is customizable to our specific clients’ needs. It protects against zero-day attacks, malware, spyware, virus threats to emails and downloads. It has the ability to blanket protect all the users devices, whether you are using a Mac or PC…. it protects everything, file server, terminal server, iPhone, other smartphones, and tablets. This make my job easier as it allows me to be proactive not reactive when dealing with security threats and that is the key to keeping our clients happy. Another reason why I love my job!
This is what AV Test had to say about Symantec Endpoint Protection, winning the AV-Test Award for Best Performance 2013-Corporate Users
Wednesday, February 19th, 2014
The Pro’s and Con’s of Cloud Computing
By Greg Reid for KSP Technology Inc.
The idea of cloud computing has been around since the 1950s and the infancy of the computer age. The ‘want’ has always been there for a point-to-point sharing tool but the problems have been in the bandwidth speed and availability of the internet. Step forward 60 years and the need to connect to our data is a must in our business and personal lives. Whether you are accessing your gmail and google docs, your online CRM like Salesforce, or your company’s file server remotely through a portal like Citrix. Cloud computing has revolutionized the way we live and do business.
The key to cloud computing is Virtual Machines or VMs. Developed by IBM in the 1970’s to allow administrators to build multiple environments on large mainframe computers, it wasn’t until the 1990’s that the concept launched on the internet. The ability to host more than one VM on a single server has fundamentally changed the way networks are built. By having their computing environment hosted on a VM with multiple other users VMs, it has allowed small businesses to have the same quality of products as their big business counterparts without the hardware expenditure of building out their own network. Furthermore, because the data is virtualized, in the event of a hardware failure, the environment is easily transferred to another network with little downtime, increasing the positive ROI.
Cloudy with a Chance of Rain
Dependency on the provider has become the biggest concern with cloud solutions. Users must trust in their provider that they have secured their data from intrusion and stored their data in a suitable facility. This requires the consumer to do their homework regarding the provider. Remember, you are trusting this provider with what could be sensitive and confidential data that could substantially impact your company if compromised.
Technical difficulties do occur, whether it is power or internet outages, or provider’s hardware or software malfunctions. The user must be sure again to ask the specific question of a back up plan if such problems do occur. Downtime is costly to all businesses – coming up with procedures to minimize this is very important to your technical ROI.Questions we suggest asking before signing with a provider; track record-have you had any security breaches or hardware failures that have caused any substantially downtime? Can we speak or have references from current clients? Where is my data being stored and in what kind of environment? Remember If your business is located in Canada and your data is stored in India, you are dependent on the speed of the connections from both countries. It is best to utilize a a local provider.
Bright Skies Ahead
Cost has become a key factor in businesses switching to a cloud solution. This has enabled large and small companies alike to outsource their IT needs to a managed solution provider. Small businesses can now benefit from the same infrastructure as their large business counterparts by lowering the capital cost of a developing and managing a network on their own. Large businesses also benefit by eliminating costly internal IT staff.
As your company grows and expands, scalability and availability become key components in a businesses IT infrastructure. With cloud-based solutions, memory or processing power can be added without difficulty. Because it is an internet-based solution, as long as there is a good connection, you can access your data anytime or anywhere. Mobility has become easy with cloud access being available on computers, tablets and smartphones, giving users more flexibility and collaboration with other employees.
Backup and data recovery are vital to rebuilding after an IT disaster. Most cloud solutions are built on a robust network with maximum redundancy for storing users data. Your solution will come with a team that will make sure data is stored properly and have a disaster recovery plan in place in cases of disaster.
The Time has Come
Although there are some disadvantages to the cloud solution, the best way to over come these is by doing your due diligence. The cloud will be a viable option for some businesses because it can be a cost effective and reliable solution. Asses what your business needs are, and weigh your options.
Thursday, February 13th, 2014
By Eric Hunter
Recently KSP Technology bought a Cisco Nexus Switch for our data center. This amazing piece of hardware will allow us to give greater in office network speed. What makes this so amazing for our customers is that it offers a more robust and redundant network. It will allow faster speeds on our hosted services and allow us to re image computers at a quicker rate. Why I enjoy having this piece of hardware is because it allows us to make changes on our network quickly without downtime to our customers, making my job a little easier.
Tuesday, January 21st, 2014
This interesting research document (see below) was brought to the attention of our very own Eric Hunter. Although meant to be amusing it brings up the ever present question, that the old sneakernet might still be faster than transferring large documents remotely. With on-going trouble with big data servers such as dropbox, (see our KSP Blog Post) this method of technology is improving but it still has its limitations. According to Tien Anh Nguyen of OpenView Research:
“I am quite convinced though, that Big Data will continue to grow and may become a mainstream technology market by the end of 2014. More of the startups of today will likely emerge as scaled businesses offering a range of verticalized and segmented Big Data tools and services. Moreover, I’m betting additional standards and best practices will emerge that will allow customers to compare these products and adopt the ones that are most appropriate for their needs.”
In a world where time equals money, we are still not at a stage where file transfer technology is as quick as downloading to a USB hard drive and transporting it by foot, car or in this case carrier pidgeon.
Network Working Group D. Waitzman
Request for Comments: 1149 BBN STC
1 April 1990
A Standard for the Transmission of IP Datagrams on Avian Carriers
Status of this Memo
This memo describes an experimental method for the encapsulation of
IP datagrams in avian carriers. This specification is primarily
useful in Metropolitan Area Networks. This is an experimental, not
recommended standard. Distribution of this memo is unlimited.
Overview and Rational
Avian carriers can provide high delay, low throughput, and low
altitude service. The connection topology is limited to a single
point-to-point path for each carrier, used with standard carriers,
but many carriers can be used without significant interference with
each other, outside of early spring. This is because of the 3D ether
space available to the carriers, in contrast to the 1D ether used by
IEEE802.3. The carriers have an intrinsic collision avoidance
system, which increases availability. Unlike some network
technologies, such as packet radio, communication is not limited to
line-of-sight distance. Connection oriented service is available in
some cities, usually based upon a central hub topology.
The IP datagram is printed, on a small scroll of paper, in
hexadecimal, with each octet separated by whitestuff and blackstuff.
The scroll of paper is wrapped around one leg of the avian carrier.
A band of duct tape is used to secure the datagram's edges. The
bandwidth is limited to the leg length. The MTU is variable, and
paradoxically, generally increases with increased carrier age. A
typical MTU is 256 milligrams. Some datagram padding may be needed.
Upon receipt, the duct tape is removed and the paper copy of the
datagram is optically scanned into a electronically transmittable
Multiple types of service can be provided with a prioritized pecking
order. An additional property is built-in worm detection and
eradication. Because IP only guarantees best effort delivery, loss
of a carrier can be tolerated. With time, the carriers are self-
Waitzman [Page 1]
RFC 1149 IP Datagrams on Avian Carriers 1 April 1990
regenerating. While broadcasting is not specified, storms can cause
data loss. There is persistent delivery retry, until the carrier
drops. Audit trails are automatically generated, and can often be
found on logs and cable trays.
Security is not generally a problem in normal operation, but special
measures must be taken (such as data encryption) when avian carriers
are used in a tactical environment.
BBN Systems and Technologies Corporation
BBN Labs Division
10 Moulton Street
Cambridge, MA 02238
Phone: (617) 873-4323
Tuesday, December 3rd, 2013
If you’re curious about where your Facebook account gets signed in from, or you’re suspicious that someone has been logging into your account without permission, there’s a lesser known feature called Facebook sessions that can tell you exactly where your account is signed in from geographically, and in most cases you can even see what device was used. Here’s how to access the feature with Facebook for iPhone and iPad: (more…)
Thursday, November 28th, 2013
Earlier this year, the Department for Business, Innovation and Skills (BIS) reported that 93% of large businesses fell prey to a cyberattack in 2012.
Similarly, small and medium-size businesses (SMBs) also suffered, with 87% being targeted – up 10% from the previous year.
Now, the reasons why SMBs are at risk has been examined in detail in a recent Sophos-sponsored report by the Ponemon Institute. (more…)