Time for a Server Refresh?

There is no crystal ball for an IT manager to look at to accurately predict when a server will need to be replaced, but there are some general guidelines you should observe to ensure that this critical piece of equipment is running properly.

A server refresh cycle is the length of time that typically passes between installations of new servers.  Generally, the refresh cycle averages 3 to 5 years. Replacing your server will allow your organization to deploy updated equipment intended to improve reliability, enable new capabilities and save money in the long term.

Here are a few things to keep in mind:

Is your equipment more than 3+ years old?  If your server is three years old (or more), you should seriously consider replacing it.  Your reaction may be “I just bought it”.  You may be tempted to try to squeeze a little more life out of it.  You definitely could do that – perhaps you already have, but the reason you want to replace a server after three years isn’t just to avoid a potential server outage.

According to IDC, “the moment your server hits its fourth birthday, support costs raise by approximately 40%. Your users often won’t report the troubles they’re having with your slow server – employees are notorious for working around these issues.” 1

If a process takes much longer than it is supposed to, lost productivity costs your organization money and that lost time adds up.

Warranty.  Your server should never outlast the warranty it came with.  The reason you will want to replace your server after the warranty runs out is that if it crashes, you will be able to get it fixed or replaced. At the point in which the manufacturer is not going to do this, you should take this as a sign that your server may have reached its use-by date. If your server has a very high workload, it may limit its lifespan.

When you’re choosing your new server warranty, they often come with different support levels to fit your needs. Typically, it covers replacement parts and an on-site tech to replace those parts.

Hardware Support.  When you’re considering replacing your server, you should check to see if it is still being manufactured.  If your server is still in production, that’s the first piece of good news.  If something breaks, it won’t be that hard to find replacement parts.

If it’s no longer being built, hardware issues may be difficult to fix. The parts you may get are going to be more expensive, possibly second-hand, and may take a while to get to you.  That’s why if your server is out of production, it’s good to make sure you shelve it as well. That way you won’t be hit as hard by hardware failure.  Much like with a warranty, if your manufacturer has decided to shelve the server, it’s likely you should too.

Your Server Has Issues.  Oftentimes people try ignoring a temperamental server instead of just replacing it.  The longer you ignore it, the worse it will get, and you put your organization at risk if it completely shuts down.  There are some things that can’t be fixed no matter how many parts you replace.

You Need More from Your Server.  Growing organizations place higher demands on their servers. When use of your server reaches 70% of maximum, or drive space is running low, you’re going to see a drop in server performance.  This is where virtualization can come in handy. If you have two or more servers – or you suddenly have the need for them, you can purchase one really good server and run virtual machines off it.  Since you can scale virtual machines to your needs, this means you can change your infrastructure to fit your growing business needs.  If your organization is expanding with new locations, it’s time to consider upgrading your server.

Your organization’s server hardware is there to support your operating system and applications that you’re running off it.  If you are barely running Windows Server 2008 properly, then it won’t handle moving to 2012 or 2016.  When you’re upgrading your operating system, it is the perfect time to upgrade your server as well.  This effort will take some planning and additional work, but doing it in a phased-approach is much easier.

Before deciding whether or not to upgrade your datacenter servers or virtualize your environment, talk to Bryley Systems.  Our team of experts will help you navigate through this process and the important decisions including determining how to size your physical or virtual server hardware for the workloads that you are planning to put on it. Contact us at 978-562-6077, or by email at ITExperts@Bryley.com to learn more. We are here to help.

References:

1 –  IDC

Tech Target

Business Technology News

 

 

 

Why Invest in a UPS?

UPS stands for uninterruptible power supply. This electrical device is meant to provide a power supply in the event of a power outage or when the power input fails.

Power outages can result from electrical poles being damaged by storms, traffic accidents, fire, flood and other disasters.  Faults in the grid or power plant can also cause blackouts.  We cope with these inconveniences but our computers, unfortunately, just are not hardwired to cope with them in the same way.  Sudden power loss during data transfers can be damaging making the hard drive inaccessible.

Computers can be fragile pieces of machinerySevere damage can occur with a sudden power outage or fluctuation.  Components in a computer such as a hard drive can be affected and data can even get lost when power goes off and you have not properly shut down your computer.  It is especially damaging to the computer’s hard drive when there is power interruption.  When power is suddenly cut off, your hard drive spins down without being shut down properly.  When power comes back and you restart, you may find that much of your work has been lost. When power is restored, it is often accompanied by fluctuations which may turn your computer off again.  Hard drives can only take so much, and in some cases, computers can be destroyed. To protect your computer’s hard drive from these unfortunate scenarios, you need to plug your computer into an electrical device called a UPS system.

Right at the moment of a power blackout, these handy devices will act as a battery backup power supply which will automatically provide power to your computer for enough time to allow you to save your data and properly shut down your computer.

Because the circuit in this power device continuously monitors the voltage, it can sense surges, spikes and outages. When the UPS senses an electrical problem, it switches to AC power which is generated by a battery which provides you with protection.

Ultimately, a UPS backup battery gives you peace of mind while working. You won’t have to cringe when a thunderstorm rolls through, wondering if it would be better to simply power down your machine and wait it out. In addition, you won’t have those fears in the back of your mind that a power blackout may instantly cut off your work, wasting your time and efforts, and even worse, destroy your computer.

Remember, having a plan and being prepared is your first line of defense.  If you would like more information about emergency power outage strategies please contact us at 978.562.6077or by email at ITExperts@Bryley.com.  We are here to help.

Anna D. is a Bryley Systems HERO!

Anna D., Bryley’s  Manager of Client Relationships, recently passed D&H’s HPE HERO (Heighten and Elevate Revenue Opportunity) Program with flying colors, scoring an impressive 100%.

The HPE HERO Program involves training in ALL HPE product areas, including Servers, Storage and Networking devices, as well as access to dedicated Solution Specialists. In addition it provides Bryley Systems the opportunity to leverage exclusive tools and cost savings, enabling our clients to stretch their IT investment even further.

Congratulations Anna!

Pop Quiz: How Prepared is Your Company to Recover If Disaster Strikes?

You depend on your IT systems every day, but how dependable are they really?  If your company was subjected to a sudden loss of power could you keep working, or would business stop?  What if the power didn’t come back on for several days, or even a week?  Most importantly, have you already asked yourself these questions, and if so, do you have a written action plan to address them?

If you are at all unsure of how a disaster would impact your business, and how you might recover, here is a great little quiz to help you get the wheels turning.

1. How frequently are your company’s critical systems backed up?  Is it more than once a day?

2. If your company lost power, would your systems keep running without any interruption?

3. In the event of a system failure, could your company’s data be restored to working order quickly?

4. If your company experienced a security breach, do you have a clean set of data backups available and could they be restored in a timely fashion?

5. Does your company have a fail-over site it could revert to if your primary systems become inaccessible?

6. Does your company have a written disaster recovery plan to refer to in case of emergency?  If yes, do your employees know where to find it, and are they trained in implementing it?

If you were able to answer “yes” to these questions, congratulations!  Your company is in relatively good shape in terms of its ability to cope with a disaster.  If you answered “no” to any of the questions on this list, however, it would be a good idea to spend some time putting a plan together to address any gaps in your ability to recover from a disaster.

As a Managed IT provider, Bryley Systems specializes is helping companies plan for disaster and mitigate the risk of a loss of data.  If you think you could use a hand putting together an effective disaster recovery plan, why not give us a call at 978.562.6077.  We are here to help.

3 Recommended Practices to Keep Your Servers Running All Winter

Based in Central Massachusetts, wild New England weather is nothing new to us.  While simply making it in to work during a storm can be a significant challenge in itself, in a modern business environment, keeping essential technology systems operational 24/7 can prove even more critical.  That is why we have put together this list of three best practices we recommend you follow to keep your technology working, even when you are stuck at home shoveling out your driveway.

1. Deploy Uninterruptible Power Source (UPS) Devices – And Check Them Regularly

Deploying UPS devices for critical network equipment, as well as high priority PCs and workstations, is an excellent way to protect your most essential devices in the event of a power failure.  This is even more critical if you have on-premise servers.  It is important to ensure that any servers are able to communicate with their UPS(s) so the server can detect that it is running on stand-by power, giving it a chance to shut itself down properly.

2. Add an In-Line Generator

If you have devices that must continue running in the event of a power failure, adding an in-line generator is your best bet.  When the power goes out the generator takes over, powering equipment and feeding UPS devices.  At Bryley Systems we utilize an in-line generator to ensure that our local data center is always operational, no matter what.

3. Establish a Fail-Over Site

It is a good idea to develop a disaster-recovery plan that includes the ability to migrate to a fail-over site in the event that your primary data center becomes unavailable.  This will ensure that your data is always accessible, even under the worst of conditions.

You can learn more about how Bryley Systems is able to ensure business continuity through the use of our own fail-over site on our Back Up/Data Recovery page.

Stay safe this winter!

 

Smartphone Security

We all love receiving new technology during the holiday season, but we must remember to protect it.  Whether we like it or not, cell phones and laptops are no longer simply devices – they are an extension of ourselves.  They house important information and records that we wouldn’t dare give a stranger (social security numbers, passwords, confidential information). In fact, we use them for socializing, shopping, banking, browsing, and much more.  Simply for the ease of use, it becomes a habit to stay logged into your accounts on your devices, but the downside is that if your phone is lost or stolen, it can lead to identify theft.  Someone could also hack your phone and access information via web-pages you have visited.  The importance of smartphone security is something we should all be aware of and implement right away.

Nearly 40% of data breaches are caused by mobile devices.

  1. Employee negligence is typically due to employees who are busy, traveling constantly, or hurrying through a task, and simply not knowing or paying attention to the risks involved.
  2. Theft is a big problem since there are ways to breach a smartphone.
  3. Malicious attacks. Hackers are responsible for the majority of breaches and thrive on those who leave the doors wide open to an attack.  Don’t leave yourself vulnerable.

Here are some tips to enjoy that new device as well as protect your privacy and information:

  • Activate Screen Lock. Perhaps the easiest and first line of defense on any device is the lock screen. After any time of inactivity (usually 30 seconds for cell phones and slightly longer for laptops and desktops), the device should be enabled to auto-lock so no one else can access your information.  On a cell phone, the code is usually four characters, but can be longer.  No matter how protective you may be of your devices, there’s no guarantee that you may not accidentally leave it somewhere.
    • Encryption can do a lot to protect your phone’s data and the good news is that all iPhones and newer Android versions come with their phone automatically encrypt once you set a password.
  • Mind your Apps. We all like the simplicity and efficiency that apps provide, but it’s important to keep an eye on them. There has been an increase in malware attacks, especially on smartphones, since most users gain access to confidential information.  Always read the small print and consider the personal information the app requires. If an app requires significant personal information, reconsider installing it.
    • Always use official app stores. App stores generally approve and vet apps prior to granting them space on the platform. (Always make sure the Web site URL starts with a secure https:// and contains a locked padlock icon.)
    • Check permission for the app. Some apps will ask permission to access certain aspects of the device. While it will make sense for a GPS to ask for your location, the same cannot be said for a flashlight app asking permission to access your text messages.
  • Browse Carefully. When you access a web browser on your smartphone, you should be very careful because it is easy to accept messages that pop up. For instance, you might decide to save your password and other information as it leads to easier access later on.  Unfortunately, that can provide others a way to copy your data. Always use reliable and safe websites and never enter your information on new or unknown websites, especially when they are asking for sensitive information like your credit card or bank details.
  • Remote Wipe. Have security knowing that if your phone is lost or stolen, you can safely wipe the device to protect the data from falling into the wrong hands.  A similar feature can be enabled after a certain number of failed passwords to access the phone (usually it is around 10 attempts before the device is wiped).  This service provided to our clients enrolled under the CSP agreement.
  • Use caution with any links you receive via email or text message. Exercise caution when clicking on links. Phishing scams are not limited to email – a text message can incite you to click on a malicious link or ask for personal information.
  • Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone, while making it more susceptible to an attack.
  • All Wi-Fi was not created equal. Be mindful when using open Wi-Fi. When you are not using your wireless connection, you should keep it switched off. This can ensure that no one else can connect to your device without your permission or knowledge. You should also check your device’s network settings as they might be configured to connect to a network automatically when in range and may not ask for permission. In addition, your home wireless router should also be protected through a password or security code.
  • Run the Updates. Don’t put off downloading updates. Many updates tweak and fix several flaws on your phone that could open a backdoor for hackers.
  • Wipe data on your old phone before you donate, resell, or recycle it. Your smartphone contains personal data you want to keep private when you dispose your old phone. To protect your privacy, completely erase data off of your phone and reset the phone to its initial factory settings.

 

https://heimdalsecurity.com/blog/smartphone-security-guide-keep-your-phone-data-safe/#
http://www.nsiserv.com/blog/mobile-security-threats
http://www.smallbiztechnology.com/
https://www.networkworld.com/category/malware-cybercrime/
https://www.fcc.gov/smartphone-security
http://pcworld.com

 

2018 Tech Trends

Technology is drastically changing the way we live and work and more adjustments will be apparent in the years ahead.  Instead of thinking “bottom-up” or “top-down,” business and technology needs to be thought of in a hybrid solution.  “From the bottom up, they are modernizing infrastructure and the architecture stack.  From the top down, they are organizing, operating, and delivering technology capabilities in new ways.  In tandem, these approaches can deliver more than efficiency – they offer the tools, velocity, and empowerment that will define the technology organization of the future.”1

IoT is one such tool that continues to gain traction and will have an even larger impact in 2018.  It is estimated that there are currently between 8-15 billion IoT devices.  That’s more than there are humans on Earth!  These devices include everything from home security systems, pacemakers, voting machines, voice-activated cars, personal assistants (i.e. Alexa) and personal health trackers (i.e. FitBit), as well as toys, toothbrushes, and even pillows.2  Having these devices makes life simpler, but will truly help when the devices can “talk” to each other.  Josh Siegal, a research scientist at MIT highlights the importance of interconnected devices and their usefulness: “It’s not about the car or the home, it’s about how your car can talk to your home to tell it that you’ll be arriving home early because your car talked to the roadway to avoid traffic, and now you need to put the heat on a little bit sooner than you would – while still saving energy due to having a smart thermostat. People aren’t used to thinking in such terms today.”2

These new IoT devices must also be able to function with the older technology.  “Having the intelligence in the lightbulb makes it pretty easy to adopt. It’s as easy as screwing in a lightbulb. But the usefulness is diminished when my 8-year-old daughter turns off the light switch – and now my fancy internet-enabled lightbulb is offline.”2

Security is Paramount

Now, more than ever, security is a top concern for organizations.  Individuals were rightfully upset about the Equifax breach, but IoT devices have the potential to leak information that’s just as valuable and sensitive.  It doesn’t help matters that security of these devices seems more like an afterthought.  The most vital, and yet underrated IoT applications are those that “allow administrators to automatically update them when issues are found and enforce strong defaults for things like passwords and encryption.”2 This highlights the importance of conducting due diligence and not rushing the vetting process for a shiny, new technology.  Ultimately, organizations must balance the need for better production and employee satisfaction with protecting company data.  They must know what and where the devices are attaching to the networks and manage accordingly.

IoT Data Analytics

As IoT expands, so too does the amount of information available to organizations.  This information can and will drive business decisions.  A prime example of IoT data analytics helping an organization work more efficiently and profitably is Navistar, who reduced the cost of managing its fleet of 180,000 trucks from 15 cents per mile to just 3 cents.3 Opportunities for cost savings exist in nearly every business, but it must be done judiciously; cost savings needs to be weighed against the cost of storing and sifting through the data.

2018 is poised to see technology have an even greater impact upon organizations.  It helps to have a Managed Services Provider (MSP), such as Bryley Systems to help navigate the ever-changing landscape.  Contact us at 844.449.8770 or by email at ITExperts@Bryley.com to learn more. We’re here for you.

 

1 https://www2.deloitte.com/content/dam/insights/us/articles/Tech-Trends-2018/4109_TechTrends-2018_FINAL.pdf
2 Schuchart, Wendy. IoT for Business: Five Key Trends for 2018. Channel Partners
3 https://www.forbes.com/sites/danielnewman/2017/09/26/top-10-trends-for-digital-transformation-in-2018/#734e6621293a

Warm Holiday Wishes

One of our engineers received this heartfelt card from one of our clients.

It’s a great feeling knowing that they value our partnership.

Wishing you and yours a happy holiday season!