Todas las entradas hechas por GreenPages Blog

Guest Post: How to Minimize the Damage Done by Ransomware

Below is a guest post from Geoff Fancher, Vice President, Americas Channels at SimpliVity Corporation

Have you ever woken up in the middle of the night, sweating profusely, scared half to death, and terrified that your data center was infected with ransomware? If so, you’ve had an IT nightmare. Just be thankful it was all just a dream and your data isn’t lost.

Though IT nightmares come in all forms, one thing all IT pros fear nowadays is ransomware. That’s because ransomware is becoming increasingly commonplace and is evolving to become even more vicious and hard to stop once it has entered an IT environment. The cost to business productivity can be crippling, and the data loss that can occur can set a company back for days.

According to Ponemon Institute, the average cost of IT downtime is $7900 per minute. Per minute! The reason recovering from ransomware attacks can be so costly is that backing up from restores can take a long time, typically measured in hours or days depending on where and how backups were stored. Also, depending on when the most recent backup took place, a lot of data could be lost once the backup is recovered.

With the cost of downtime due to ransomware being so high because quick restores aren’t an option, many organizations are choosing to pay the ransom to get their data back. The most notable example comes from Hollywood Presbyterian Medical Center. The hackers infected the hospital’s computer systems, shutting down all communication between the systems, and demanded $17,000 to unlock them. The hospital, being in an a high-pressure situation without the correct resources to be able to quickly shut down its systems and restore from a recent backup, was forced to pay the ransom to receive the decryption key and get back online.

The fundamental piece, then, to avoiding paying the ransom demanded by cyber criminals is to have a disaster recovery plan in place. You should know what to do if a ransomware attack happens. As the old adage goes, “Hope for the best. Prepare for the worst.” That’s the attitude to take and the way to do it is to have a plan.

One company that instituted a solid disaster recovery plan just in the nick of time was an enterprise manufacturing company based in the Netherlands. The company was infected with ransomware while its IT partner was in the process of migrating VMs to a new hyperconverged infrastructure environment that had built-in data protection. Most of the infected folders were already on the new solution, which was lucky because they were able to use the solution’s backup to restore within fifteen minutes, when just a day before, on the previous infrastructure, it would have taken about three hours to restore to the most recent backup. The partner was also performing hourly backups on the new solution, so they lost less than an hour’s worth of data during the restore. Before deploying hyperconverged infrastructure, the partner was backing up to tape every 12 hours, so they saved the company about 11 hours of data loss on the new hyperconverged solution. What a difference a day makes.

For a disaster recovery plan to be successful, the IT team needs to define recovery time objectives (RTOs) – how long it takes to restore the backup – and recovery point objectives (RPOs) – the nearest backup they can restore from. Basically, businesses have to ask themselves two questions: How long can the business shut down while waiting for the restore to take place? And, how many hours of business-critical data can the company afford to lose? There are data protection plans for every size of company and for every budget. The first step to a data protection plan is defining the organization’s requirements.

Hyperconverged infrastructure, for example, can dramatically cut down the hours it takes for businesses to recover from IT downtime. By making data efficient from the start of its lifecycle, businesses are able to quickly recover from a previous backup.

With SimpliVity hyperconverged infrastructure, companies are able to backup quickly and efficiently with minimal data loss because SimpliVity’s solution is designed to meet even the most stringent RTOs and RPOs to ensure businesses functions aren’t interrupted for long in case of a disaster or ransomware attack. If you’re heading to GreenPages’ Summit Event next week, definitely swing by the SimpliVity booth to chat!

 

 

 

Tech News Recap for the Week of 7/18/2016

Were you busy this week? Here’s a tech news recap of articles you may have missed for the week of 7/18/2016! Remember, to stay up-to-date on the latest tech news throughout the week, follow @GreenPagesIT on Twitter.

A hacker who claims to have stolen 10 million patient records is extorting victims for money. Microsoft is almost done moving its Skype consumer service to Azure. Like AT&T, Verizon is going virtual for enterprises. Earlier this week, Microsoft announced they are offering a free preview of Microsoft Stream, a new business video service. Salesforce is acquiring data center optimization startup Coolan, a majority of companies say their trade secrets are most likely compromised, and more top news you may have missed this week!

Tech News Recap

 

Did you miss last week’s webinar about the current landscape of the hyper-converged market? Download here!

 

By Ben Stephenson, Emerging Media Specialist

 

Preview of Microsoft Stream – a New Business Video Service

Earlier this week, Microsoft announced they are offering a free preview of Microsoft Stream, a new business video service. Anyone with a business email can now sign up for a preview. Microsoft’s goal of the new offering is to allow employees to communicate and collaborate with video in an easier way. Currently, Microsoft is delivering the following features:

  • Sign up in seconds: Get started with Microsoft Stream in as few as five seconds with easy signup and no credit card requirements.
  • Easily upload and organize your video: With easy drag and drop capabilities, upload your videos and organize them by either starting a channel or contributing to a channel based on team, group, topic etc.
  • Discover relevant content: Enhanced content discovery through “trending” videos powered by machine learning, as well as search by hashtag, most liked videos and other key search terms.
  • Watch anywhere, on any device, anytime: View videos in Microsoft Stream on all your devices from anywhere, anytime.
  • Secure video management: Manage who views your video content by determining how widely to share within your organization, and to what channels. Secure application access is enabled by Azure Active Directory, a recognized leader in identity management systems, to protect sensitive corporate content.
  • Follow what matters: Follow channels to see content you want in your Microsoft Stream homepage.
  • Engage with content: Socialize videos by sharing via email, “Like” your favorites and embed videos to webpages within your organization.

To get the full scoop on Microsoft Stream, check out their blog post.

 

Looking for more information around Microsoft cloud solutions? Download our recent webinar!

By Ben Stephenson, Emerging Media Specialist

 

Tech News Recap for the Week of 7/11/2016

Were you busy this week? Here’s a tech news recap of articles you may have missed for the week of 7/11/2016!

Scammers are creating fake websites targeting Olympic fans, Australia was victim to more than 200,000 ransomware attacks over the past two months, and Oregon Health and Science University has agreed to pay federal authorities $2.7 million for two data breaches in 2013 that involved more than 7,000 patients. According to IDC, IaaS revenue will triple as enterprises adopt public cloud computing as a viable option to on-premises hardware. Amazon just bought a small startup called Cloud9 that specializes in software development tools. Microsoft wins an appeal over the U.S. government, Tesla is standing firm in the use of its self-driving Autopilot feature, and more top news from this week.

Follow us on Twitter to stay up-to-date on the latest news throughout the week!

Tech News Recap

 

Did you miss yesterday’s webinar about the current landscape of the hyper-converged market? Download here!

 

 

By Ben Stephenson, Emerging Media Specialist

 

 

AWS – Monitoring the Memory of your Virtual Machine (AMI)

Out of the box, AWS CloudWatch by default monitors 4 things:

  1. CPU
  2. Network
  3. Disk
  4. Status Checks

Can you tell which resource CloudWatch doesn’t monitor out of the box? Memory! (update:  According to AWS technical support “Right now, you do not need to deploy anything in you AMI to monitor your instance. Metrics like memory utilization and disk space require us to look into the OS running in the instance and that is why we do not have these valuable metrics.  We are looking at ways to provide more insight into your OS and applications and will have more details as we firm up the plans”).  Amazon provides 2 articles for doing this, one for most Linux flavors and another for Windows. This article is basically a walkthrough of the Linux article (since I know Windows and want to learn more Linux anyway).

  1. Create a CloudWatch role in IAM (if you don’t know how to do this see my previous article)
  2. Spin up a new Amazon Linux AMI instance using the new CloudWatch role in the IAM section of the instance creation (check out THIS article if you get stuck)
  3. SSH into your new instance & run the following command:
    1. sudo yum install perl-Switch perl-DateTime perl-Sys-Syslog perl-LWP-Protocol-https
    2. curl http://aws-cloudwatch.s3.amazonaws.com/downloads/CloudWatchMonitoringScripts-1.2.1.zip -O
    3. unzip CloudWatchMonitoringScripts-1.2.1.zip
    4. rm CloudWatchMonitoringScripts-1.2.1.zip
    5. cd aws-scripts-mon
  4. At this point you have downloaded and unzipped the Perl script necessary to make the remote calls to CloudWatch and installed the Perl bits needed to run said script.

 

To read the rest of Chris’ post, click here!

 

By Chris Williams, Enterprise Consultant

 

Tech News Recap for the Week of 7/5/2016

Were you busy this week? Here’s a tech news recap of articles you may have missed for the week of 7/5/2016!

Gartner is predicting that corporate no-cloud policies will be extinct by 2020. Wendy’s released a list of restaurants that were hit by a data breach that compromised debit and credit cards. Microsoft’s new Dynamics 365 will bundle ERP and CRM in the cloud. Google acquired video software company Anvato and is testing Chrome encryption that is meant to withstand attacks from quantum computers. You can now send files with Skype when the recipient is offline, Windows 10 has an anniversary, and more top news you may have missed this week!

Follow us on Twitter to stay up-to-date on the latest news throughout the week!

Tech News Recap

Register for upcoming webinar, ” The Hyper-Converged Landscape: What’s New, What’s Hot, and What’s Possible

 

By Ben Stephenson, Emerging Media Specialist

 

 

VMware Announces General Availability of Horizon 7

Yesterday, VMware announced the general availability of VMware Horizon 7. There are a number of new capabilities that are worth catching up on. According to our CTO Chris Ward, the biggest one is Instant Clone, which is a big architectural change vs. having to use View composer. A few other changes that VMware highlights are:

  • Transformational user experience with Blast Extreme
  • Applications with Modernized Lifecycle Management
  • Smart Policies with Streamlined Access

For more information, here is VMware’s blog post from yesterday that covers what’s new with Horizon 7.

 

 

By Ben Stephenson, Emerging Media Specialist

 

Tech News Recap for the Week of 3/14/2016

Were you busy this week? Here’s a tech news recap of articles you may have missed for the week of 3/14/2016!

VMware has patched two serious vulnerabilities in its vRealize software which could lead to remote code execution and the compromise of business workstations. Users should upgrade as soon as possible. Home Depot is paying $19.5 million to customers in a data breach settlement. The Legal Cloud Computing Association has set new cloud security standards for the legal industry. PureStorage is announcing FlashBlase, a platform designed to store petabytes of unstructured data. Contrary to recent trends, this week there were two examples of companies moving away from AWS (DropBox and Apple). March Madness Apps may create security risks for BYOD users, the CIA appoints a new CIO, Google traffic is 77% encrypted, and more top news from this week you may have missed!

Tech News Recap

  • 11 Things We Learned at SXSW 2016
  • VMware patches severe XSS flaws in vRealize software
  • Home Depot To Pay $19.5 Million in Data Breach Settlement
  • Legal Cloud Computing Association Sets New Cloud Security Standards for Legal
  • Pure Storage’s upcoming FlashBlade will store petabytes of data at less than $1 per gigbye
  • Dropbox takes the reins, moves off AWS and onto its own infrastructure
  • Google just scored a huge win against Amazon by landing Apple as customer
  • Frankly Speaking: IT Execs on Moving to Managed Services: Strategies, Curveballs, Results
  • AT&T to Virtualize 75 Percent of its Network by 2020
  • CIA appoints new CIO
  • Two recent reports confirm that your greatest security threat is your users, not outside hackers
  • Report: March Madness Apps May Create BYOD Risk for Enterprises
  • You can now find IBM Watson in Formula One racing pits
  • IoT Bringing Changes To Company Networks, Big Data Projects
  • Google Traffic Is 77% Encrypted
  • Microsoft will continue to support bitcoin after ‘inaccurate information’ was posted online
  • Data Storage for Media and Entertainment

We’re hosting a webinar on 3/31 at 11am featuring two IT executive guest speakers. GreenPages’ Geoff Smith will moderate the panel discussion. Register now to hear directly from two of your peers!

 

By Ben Stephenson, Emerging Media Specialist

Frankly Speaking: IT Execs on Moving to Managed Services: Strategies, Curveballs, Results

We’re excited to announce that we’ll be hosting a managed services webinar on March 31st at 11am ET. Instead of a GreenPages presenter, we’re switching up the format and will be interviewing two IT executives. Our first panelist will be Darrell Bodnar, the Director of Information Services at Weeks Medical Center. The second panelist is going to be Dave Widener, the Director of IT & Project Management at Dead River Company.  The conversation will be moderated by Geoff Smith, GreenPages’ Director, Managed Services Business Development. The main topics will be around Darrell & Dave’s experience using Managed Services. There will be live Q&A with the panelists as well.

This should be a great way to hear directly from fellow IT executives to get a better sense of the challenges they were facing, how they approached those challenges, and some of the outcomes of moving to a Managed Services model. Below is some additional information about the webinar. You can register here!

Frankly Speaking: IT Execs on Moving to Managed Services: Strategies, Curveballs, Results

Companies turn to Managed IT Services for many different reasons: M&As, growth, limited staff, need for agility, EOL technology, or to focus on more strategic business initiatives. This is your chance to hear two IT executives from two very different industries—a hospital and a petroleum company—candidly discuss the “why, what, and how” of implementing Managed IT Services in their organizations.

Live Interview & Discussion Format. Hear Darrell and Dave explain:

  • The Business Drivers that pushed them toward a managed services approach, for example 24/7 support for medical staff and increased emphasis on modern IT and business innovation.
  • The Burning Platform Issues that were unacceptable: users pointing out issues before IT knew, no clear visibility across infrastructure, IT lifecycle management, etc.
  • Other Options they considered and why: hiring more staff, adding technology, doing nothing, etc.
  • The Decision Process within their internal IT teams, executive leadership, and across their larger organizations.
  • The Planning & Strategy to address critical areas such as servers, storage, networks, VMs, firewalls, plus integration methodologies and end user experience.
  • Specific Technologies involved including management and support of Microsoft, Citrix, VMware, and Cisco environments.
  • Challenges Faced: anticipated and unanticipated; what worked, what didn’t, onboarding curveballs, change management, etc.
  • Results & Lessons Learned: short- and long-term outcomes, system availability and stabilization, and areas for improvement.

 

REGISTER NOW!

 

By Ben Stephenson, Emerging Media Specialist

VMware NSX and Cisco ACI: NSX Now Supported on ACI (We Were Right!)

In May of 2015, we did a video around VMware NSX vs. Cisco ACI. As part of that video, we made the prediction that VMware NSX and Cisco ACI would not be an either/or discussion in the future (I also did a webinar on the topic that you can download here). At the time, the common question we were getting from clients was if they should be using NSX or ACI. My opinion was that Cisco ACI quite well complimented the feature sets of VMware NSX and that one could really support the other.

Now let’s fast forward to last month (February 2016) to Cisco Live Berlin where an announcement was made that supported just that idea. In  sessions at the conference, they talked about a number of overlay networks in Cisco ACI and specifically mentioned VMware NSX. So what are these use cases? I’m planning on doing a series of videos to explore the topic further. The next video will discuss heavily utilizing Cisco ACI with an overlay of VMware NSX. After that, we’ll look at the opposite – more heavily leveraging the feature sets of NSX on top of the fabric automation feature sets that exist in ACI.

VMware NSX and Cisco ACI: NSX Now Supported on ACI

Watch on GreenPages’ YouTube channel

 

Download Nick’s on-demand webinar, VMware NSX vs. Cisco ACI: When to Use Each, When to Use Both

 

By Nick Phelps, Moonrock Consulting, a GreenPages Alliance Partner