Skip to main content

Posts

Showing posts from September, 2014

Ensure security of your network

Whether you are using a wired router or a wireless one, if it is not configured properly, both of them could pose potential security risks. The common notion that wireless routers or networks are not secure or less secure is true, but only in circumstances where it is used right out of the box without correctly configuring its security settings. If your wireless network is ‘unsecured’ or ‘open’, an intruder can easily gain access to your internal network resources as well as to the Internet, all without your consent. Use following steps to ensure security of your network.

Configure stronger encryption Enable Wireless protected access (WPA) and ideally WPA2. This provides much stronger encryption for securing your communications than WEP, which hackers can easily crack.

Use a strong password Even WPA2 can be cracked by the bad guys if you don't use a secure password. You won't have to type your password very often, but it could prevent bad guys from watching what you do online. Ens…

3 main differences between cloud and on-premises storage

Few things you should know before moving to Microsoft Office 365

There is a lot of excitement & rush in small and Medium businesses about Microsoft Office 365.Here are our few things one should know before moving their business to Office 365:

WHAT IS OFFICE 365?

Office 365 is the same Office you already know and use every day. And then some. Because Office 365 is powered by the cloud, you can get to your applications and files from virtually anywhere—PC, Mac, and tablets—and they're always up to date. Same goes for updates to features—you get them automatically.

OFFICE 365 SECURITY

Your people and your data are your most important assets and so, as you consider Office 365 for your productivity needs, we want to do our best to answer your top questions upfront. The Office 365 Trust Center is the place where we share our commitments and information on trust-related topics.
Office 365 ensures security with:
1.Built-in security
Service-level security through defense-in-depth
Customer controls within the service
Security hardening and operational best pr…

Hazards of PST Files

A HIGH SECURITY RISK 

PST files are very portable; they can be removed from Outlook and copied or moved to other Outlook client with ease.  They can be protected using password, however internet is filled with several of programs that can crack these passwords.  This puts your data and intellectual property on high risk.
UNRELIABILITY CAUSES PRESSURE ON IT SUPPORT
PSTs are not designed to hold large email data yet people keep dumping emails into them  Once they crosses recommended size between 1 to 1.5 GB  they often get corrupt.  Power outages, System crash or inadvertently closing the PST disconnects it from the Outlook  profile. It’s then usually overlooked or lost, creating orphaned PST which is invisible to SUpport teams. They can still contain valuable information that needs to be preserved. These files become major call drivers of an IT departments daily helpdesk calls. 
FAILURE TO MEET COMPLIANCE REQUIREMENTS
PST is just a container file and does not fall under compliance requirements but…

Get More power with Hyper-V VMs

Maximum supported configuration for Hyper-V VMs?

Microsoft focused on developing Hyper-V to further extend its maximum supported configurations in Windows Server 2012. The latest version supports more memory and virtual processors, and has new features to compete with leading virtualization vendors, such as VMware. This all means Microsoft Hyper-V virtual machines (VMs) in Windows Server 2012 are more scalable than in previous versions.

Memory: Hyper-V virtual machines can be configured with a maximum of 1 TB of memory. It is important to note that Hyper-V hosts must have more than 1 TB of RAM available before the VMs can be configured. Since Windows Server 2012 hosts support up to 4 TB of memory, it is now possible to configure VMs with 1 TB of RAM.

Virtual processors: Hyper-V allows you to configure a maximum of 64 virtual processors (vCPUs) for a VM. Windows Server 2012 and 2012 R2 hosts support 2,048 vCPUs.

Maximum hard-disk size: 
For Hyper-V VMs using VHD files, a maximum of 2,048 GB…

How virtualization reduces cost for small & medium business

If you are a small & medium business owner, there are many short and long term advantages from virtualization and you don't need a big budget which makes virtualization attractive in today's economic climate.

>> Add more business resources (application, database) without increasing the number of physical hardware servers you have to worry about.
No matter how well you are prepared, it's tough to anticipate when your business may need to accommodate an inflow of new human resources or new clients that could put a pressure on your technology resources. Now with virtualization you can consolidate your multiple servers into fewer, more powerful servers and get tasks done efficiently.
Get a solid disaster recovery option. Virtualization allows a small & medium business to create ongoing back-up snapshots image of a database or business application that can be replicated in more than one place. If the main piece of hardware fails, the application can be restored from the …

Difference between Exchange 2013 on-premises, Online, office 365 and Windows Azure Powershell

Difference between 
Exchange 2013 on-premises, 
Office 365 and Windows Azure Powershell 



The Exchange Online is able to manage the users and permission of Exchange service. 

The Office 365 (Windows Azure AD) is to manage the whole Office 365 service.

Windows Azure can use to manage users, domain and other things which will  affect  the  whole  Office  365  service.

It  is  not  able  to  be  used  to  manage  Exchange  service,  Lync  service  and SharePoint service. 

To manage Exchange service, you need to use Exchange Online PowerShell to perform the activity.