Cetus Solutions

Blog, Cetus Solutions, IT Solutions, Technology, Uncategorized

Are You Digital Enough?


No Comments

My excellent colleagues and I recently had a bit of an email debate about our
‘Mobile Workspaces’ proposition. It went something along the lines of:

– Our strategic vendors have moved away from ‘virtual workspaces’ to a much more, erm, modern ‘Modern Workspaces’ or ‘Digital Workspaces’ paradigm; so maybe we should update ours?

Taking each suggestion in turn; my response went something like this:

Modern Workspaces? Well, that just sounds like a new kitchen to me (sorry Microsoft) – or maybe your place of work has one of those cool chairs with no back; you know, the ones where you sort of kneel in the chair and look massively uncomfortable?

Digital Workspaces? Well, ‘digital’ isn’t a particularly new term. In 1897, the Oxford English Dictionary defined digital as “of or pertaining to a finger, or to the fingers”. So it’s not as modern as, say, tweeting or blogging. In modern usage, digital does imply the use of a computer, but that could imply a workplace comprising a desk and a desktop PC – hardy the epitome of a 21st century IT environment.

Digital is also a bit over used in my opinion. Organisations are clamouring to undergo Digital Transformation in order to become a truly Digital Company; Digital Currencies are seeing massive adoption; even the UK Government has a Digital Marketplace – that’s right: the UK Government. What this all means is that organisations and the general population are clamouring to ‘use computers’ – very leading edge I must say.

So, back to my point. Digital doesn’t imply modernity. I honestly believe that ‘Mobile Workspaces’ captures the essence of one of our core propositions. Your working environment allows you to access desktops, applications and documents on any device from any location. This simple principle has allowed hundreds of our clients to free their employees from their desks and to, instead, work from anywhere. As a result they have addressed countless business needs, including: agile working, acquisitions & mergers, property rationalisation, Total Cost of Ownership and Business Continuity. Not bad I reckon.

If you’d like to better understand how, like many of our clients, we can help your organisation to accelerate your path to becoming a Digital Company (through a process of Digital Transformation) using Digital … sorry; ‘Mobile’ Workspaces then have
a chat with one of our experts today. Please note that, unfortunately, we don’t currently accept Digital Currencies – but I’m sure my excellent colleagues will convince me that we should do so very soon.

Speak to an expert

Blog, Cetus Solutions, Check Point, Cloud, IT Solutions, Our Upcoming Events, Security, VMware

WannaCry: What We’ve Learned One Year On


6 Comments

It felt like the world was held to ransom. All over the globe – an astounding 150 countries in fact -, little red boxes popped up on computer screens, causing dread and havoc. ‘Ooops, your files have been encrypted!’ they read, asking for between $300 and $600 (£230 to £470) in bitcoin for the safe release of the files. On Friday May 12th 2017 nations of the world collectively gasped as these faced the most devastating and widespread cyber security incident at that time. Over 200,000 machines were affected, with the perpetrators scamming over $112,000.

In Britain, the NHS was hit the hardest. The little red WannaCry pop-up appeared at 1pm on the screens of only four trusts, demanding the ransom. By 4pm, when the ‘kill switch’ was accidentally found, it had spread to 16 trusts. The cyber-attack threat was officially ‘stepped down’ by NHS England a week later, but not before the affected reached a staggering 80 out of 236 hospital trusts as well as 603 primary care and affiliate NHS organisations. Public health in the UK was seriously affected, since the ransomware attack resulted in thousands of cancelled appointments, infected systems and the diversion of A&E patients to other hospitals.

In hindsight, and a little bit of digging, it was a disaster waiting to happen. The NHS had been warned as far back as 2014 that their level of cyber security just wouldn’t cut it. With a failure to undertake the most basic of IT security procedures, which included patching and updating software, as well as not putting a strategy in place to properly deal with a cyber security incident, it’s a miracle that it didn’t happen sooner. But it was a huge wake-up call, not only to the NHS but to businesses globally. No longer would cyber security rest on the hopes of a flimsy firewall that hadn’t been updated in several years – this is a real risk, with significant consequences. So, in the year since WannaCry, what exactly have we learned?

It’s horrifying to think that WannaCry was a Gen-V cyber threat, while according to Check Point’s Cyber Security Generations Survey from March 2018, only 10% of IT security professionals are at Gen-IV and, worse still, only 3% are at Gen-V.

According to a recent report by cyber security firm Tanium, most organisations would still be unprepared should another incident like WannaCry happen again. The survey of 500 frontline IT security workers in the UK is shocking; 40% admit that their organisation is even more exposed than last year. Only 31% confessed that their organisation had invested in new security systems since WannaCry. As I stated already slightly higher up, it was basic IT security procedures that were the gateway for WannaCry, yet a staggering 66% of the IT security workers admitted that they still hadn’t improved their patch management process.

The results are definitive; it’s time to start safeguarding against further, potentially more devastating, cyber-attacks.

It’s all about the patching
WannaCry sneaked through a Windows weakness where there was a lack of security. Shockingly, it had been discovered and there had been a patch for the offending loophole two months before the attack. I know having to update is a major pain, but guys, it just needs to be done. WannaCry was a Microsoft Windows ransomware, a software that locked the files by encrypting them. This particular ransomware was particularly nasty because it was network enabled, which allowed it to essentially spread like a virus throughout not only the local network, but the internet as well. What your organisation needs right now is a patch management solution in place to patch for known vulnerabilities as soon as they arise, so that no little malware buggers can infiltrate your systems.

Backup, backup again, and verify
Had your organisation been hit with the WannaCry malware and you’d had all of your data backed up, you’d have been laughing – for the most part. Regardless of encrypting malware potentially hitting you, backups are critical for all things disaster recovery and business continuity. Whether it be tape or cloud (like Cetus Continuum), all of your data needs to be replicated somewhere safe. Regardless of where you store it (and we really do suggest cloud), it should all be encrypted. Security is, after all of this, a priority.

Use all of the threat intelligence and prevention
If you haven’t heard, micro-segmentation is really in right now. Which is really great in the face of cyber security. Life may be like a box of chocolates, but your data centre needs to be more like a hotel and protect itself from east/west traffic. This next point is important; invest in some good threat intelligence and threat security. At the moment, we’re working with Check Point and VMware to highlight how merging Infinity and NSX can create the ideal security solution to protect you.

Figure out where you stand with a security posture review
There are hundreds of ways to fall foul of a cyber-attack in this day and age. With work no longer confined to the office, mobile workspaces have become all the rage – and for good reasons. Being able to work while on the field instead of having to wait to get back to the office, being able to work from home, or just simply being able to sort out an urgent matter when on holiday is revolutionary. And everyone’s trying to get into it. However, using some random Wi-Fi is always a risk. Honestly, you’ve not lived until you stand outside an O2 store trying to rob a second of Wi-Fi to send an email. In the rain. But how secure is that? A security posture review is essential to identify where your security has slipped. And it just so happens that we offer complimentary security posture reviews, where we analyse network traffic to detect a variety of security threats, evaluate end-point security, assess any threats that lurk in your infrastructure as well as other crucial little things. Have a chat with our experts to see where the danger can find a way in.

One thing is for definite; cyber security has never been so important, and making sure that your IT reflects that is the way to protect yourself as much as possible from an attack. It’s important to be proactive in your cyber security, or you’ll be reacting to a security breach instead.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, Cloud, IT Solutions, Our Upcoming Events, Technology, Uncategorized

Minimising That Pesky Cloud Sprawl


2 Comments

It’s one of the biggest challenges facing organisations when it comes to virtualisation; cloud sprawl. Unfriendly work portals and slow loading of documents would easily lead a whole department to seek an easier, faster way of sharing files and getting work done. And it’s a nightmare.

Picture this; you’ve just installed a new IT solution to connect the whole company. Now your employees can work from home, from a café, and sort out an urgent matter while on holiday. It’s simple to share large documents between each other. Everything is safe and secure, stored on company servers where you have full control over what data you have, who can access it, and where it goes. Except the whole system is a shambles. It’s not user friendly, employees have to spend minutes waiting to load simple documents, and everyone is just sick of it.

It’s easy for your employees to get caught up in the hype of cloud; once you start thinking about it, why wouldn’t the future be cloud-first? The result; they start storing sensitive files in free ‘cloud systems’; Google Drive, Dropbox and anything else that takes their fancy. It’s a GDPR nightmare.

We are talking about unregulated and unapproved cloud solutions that are used; from CRM to email to marketing automation to document storage. The consequence of these poorly managed, end-user cloud solutions and deployments results in redundant, fractured and inefficient cloud systems – and your IT department has no control over them. It’s an issue, and one that needs attention as soon as possible. So how do you go about minimising that pesky cloud sprawl?

Survey your applications
First of all, it’s crucial that you survey all of the applications and resources that your employees use to do their jobs. There are a lot, from Office 365 to Sharefile to SalesForce, and every other application under the sun. It’s important that these systems are accounted for. Administration access is another factor that needs to be refined. Often, too many employees have administrative access to your applications, making changes without the knowledge or consent of those who manage the whole lot – your IT department. Only a handful of employees should have access, and work closely with IT to approve changes following formal requests for new cloud resources.

Define your administrative role to virtual and cloud resources
Too many administrators are a big issue when it comes to virtual machines and cloud sprawl. Passwords, administration access, big ideas; when there are too many people trying to have their say and work semi-independently on a project, it’s easy to start getting confused. Assign a cloud sprawl manager to keep everything in check by managing the cloud that you have created. We’re talking no more of that crazy clutter that was taking up space in your physical data centre and the costs associated with it will be monitored, too. It’s just that easy.

Just as important is your actual cloud solution. Regardless of whether you’re considering public, private or hybrid, the trick is to avoid pre-packaged, one-size-fits-all cloud solutions. Your business is unique. It’s definitely worth your while to get an IT solution designed on the number of employees in your company and what you actually need out of your cloud solution. At Cetus Solutions, designing, building and supporting secure application and delivery platforms to fit your needs is our speciality.

Speak to one of our experts today to see how we can help you make the most of cloud.

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, Cloud, Continuum, Technology, Uncategorized

Keeping Up With The Backup Trend


5 Comments

It’s 2018. IT is evolving at the speed of light. Our mobile phones can do just about everything and still fit in the palm of our hands. We’re talking about 5G data and the possibility of never having to think about broadband again. Scientists are predicting holidays on Mars, being able to travel in drones and creating huge underwater cities- that we could live in. So obviously, in our little corner of computing, all things IT solutions are moving at the speed of light, right?

Right! IT solutions are keeping up and ahead of trends and security risks, while creating new and improved ways to work and use our mobile devices- and this is every day. And this includes backups.

Disaster recovery, business continuity, backups; we all know how important it is to have copies of our data ‘just in case’. And the most prolific of those is,- and has been for over sixty years-; the humble tape. But why? Surely, surely, some IT geek out there has come up with something better, cheaper, more reliable- I don’t know, digital? It’s crazy that in a world where Netflix replaces DVDs and Sky, and Spotify replaces cassette/vinyl/CD collections, we can still be storing our entire businesses onto tape en masse. Especially when we have other options to keep things safe; USB, replication, CDs? So why, with all the new advances in tech, are we still using tape?

Tape does have its limitations, there’s no doubt about that. If a file gets corrupt, you’re stuck; any error and your data will be unrecoverable. Tape can be lost; fire and floods will most definitely disagree with them. If you haven’t a good enough backup you could lose a significant amount of data. Hardware failure, poof. Gone. And if you want to be extra safe and store your backup tapes in a separate location, say to avoid losing everything in the case of a building flood or fire, the time it would take to transport all of those servers would be a cost in and of itself.

Thankfully, the future has arrived. The answer to the modern question; replication.

Replication is the copying of an organisation’s data and then moving it between that organisation’s sites. Unlike a tape backup, replication only stores a ‘snapshot’, keeping the most recent copy saved, instead of the file’s history. But, while it is expensive, it is more in tune with business continuity; should your original system go down, it can take only milliseconds (if you’ve a good one) to switch to the second site- even if it’s hundreds of miles away. You shouldn’t even notice the switch. For all businesses, this is a crucial factor; time offline can cost hundreds of thousands, even if only for a few hours.

Continuum is Cetus Solutions’ answer to all things backup. It comprises four distinct but interconnected elements to give you the best experience in backup. A local Veeam backup solution will gather backups and provide you with a local backup and restore repository. A local cloud backup will provide you with the optimum offsite cloud location for the local repository to target. A backup archive provides a long-term, deep archive repository for replicated backups. And finally, hot running provides the ability for the client’s infrastructure to be run in the Cetus Continuum Cloud. It was designed with your business needs in mind, addressing business continuity challenges that you haven’t even thought of yet;

1. Full infrastructure recovery- and not just data.
For every well-defined disaster recovery plan, there is a focus on data. And this is the focus of Continuum; recovering and protecting the underlying server and desktop infrastructure to make sure that your data remains secure and accessible is one of our top priorities after a disaster, just as much as getting your business back on its feet.

2. We test. A lot.
Testing once a year is no good. You know that, we know that. In the face of a disaster, knowing that everything was hunky-dory when we tested it out a year ago just isn’t going to cut it when you’re having issues now. So we automatically verify and check the integrity of each virtual backup server on its way to the cloud. On top of that, we perform a full recovery test on a regular basis to suit your business needs, that way you just know that if something were to happen, we’ll have you back up and running with minimal disruption. That’s true peace of mind.

3. Fully. Managed. Service.
You read that correctly. Cetus Continuum provides you with not only the state-of-the-art technology, but a whole team of IT professionals who are working behind the scenes to make your business float. We’re on hand 24 hours a day to make sure that your replications and backups are completed successfully each day, and initiate the recovery process in the face of a disaster. So you know that we’re behind you at all times, ready and waiting to come save the day. You could almost call us superheroes.

4. A holistic backup and recovery solution.
What we do at Continuum isn’t rocket science, it’s basic sense. Our ‘secret’? We combine a local backup repository with our secure cloud repository. Tah dah! Because we do it this way, Cetus Continuum provides local file and VM restoration- either under your control or ours, whichever suits you best-, restoration from our cloud or full infrastructure and workspace recovery in our cloud.

We do rave and rave about backups at Cetus. We know that while it is such an important part of your IT, it’s one of those niggly bits that you can easily ignore and put on the long finger- until disaster strikes and you kick yourself for not having sorted it out sooner.
So have a quick chat about Continuum with our experts today and step into the 21st century’s answer to backup.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, Check Point, Cloud, IT Solutions, Security, Technology, Uncategorized

Practice Safe Mobility – Protect Your Endpoints


No Comments

It’s not the naughties anymore – the age of consequence-free mobility is over I’m afraid. It’s time to start practicing safe mobility. It’s time to put some endpoint protection on your ‘device’. The result of not doing so exposes your business to risk from threats, data loss, and unauthorised access.

For decades now, endpoint security has been the domain of anti-virus software. This was because Windows endpoints were the primary target, and we all ‘knew’ that they were vulnerable. Many businesses installed AV software on endpoint and moved on to more important matters…

So, what’s changed? Well, I would suggest that things have changed from two perspectives: the ‘use case’ has changed, and the threat environment has changed.
Taking each in turn…

From a use case perspective:
• The age of the virtual desktop seemed to be upon us (at least from Cetus’ perspective) – and then came ‘the well-managed Windows 10 desktop’.

• We’ve been acting like consumers for years now – buying smart phones, tablets and phablets and then wanting to use them for work.

• We’ve also been liberating ‘our’ data – storing it in personal cloud stores like Dropbox and sending it via our personal email accounts in an effort to be more productive
So what’s changed from a threat perspective?

• The days of good ‘old-fashioned’ viruses seemed to disappear when the use of nation state cyber weapons ransomware became an everyday thing (think Wannacry).

• Threats are now specifically targeting mobile devices (think Man-in-the-Middle Attacks. Women-in-the-Middle attacks are also a threat).

• Public cloud services are now part of most corporate strategies (think OneDrive), extending network boundaries into ill-defined, global data centres.

• Increased legislation with regards to the protection of individuals and their personal data (think the GDPR and its somewhat over stated, but none the less terrifying €20m fine).

The above list is by no means exhaustive, and tries to give a flavour of the changing threat landscape. So where am I going with this? Well, the good news is that our friends at Check Point have a solution to your cyber woes. Our cyber security portfolio provides Check Point End Point Security and Security Gateway Appliances that allow us to provide end-to-end security that encompasses your data centre, end points and the Cloud.
Specifically, from an endpoint perspective – Check Point provides data security, network security, threat prevention and a remote access VPN for complete Windows, Mac OS X and mobile device security.

If you’ve been playing fast and loose with your endpoints then we’re here to help. Our free-of-charge Security Posture Review will provide you an opportunity to discuss your endpoint security challenges, as well as your wider cyber security posture with regards to perimeter, data centre and cloud components.

Speak to an expert

Award, Blog, Cetus Solutions, IT Solutions, News, Uncategorized, VMware

Going Above and Beyond with VMware


No Comments

It’s been an incredible start to 2018 for Cetus. You may recall a recent blog when we announced that we earned VMware’s highly sought-after competency in Network Virtualisation– now we can proudly declare that we have been recognised as the VMware Rising Star of the Year 2018!

After being nominated and shortlisted earlier on this year, we were holding our collective breaths as a small group of Cetus elite travelled to London beneath sunny skies on the 18th of April. The prestigious VMware awards were presented at the 8th Partner Recognition Dinner in the Amba Hotel in Charing Cross- very fancy altogether.
VMware hosts the annual awards as recognition for those partners in the UK who have gone above and beyond in the field of IT solutions and are key to the growth and success of the major vendor- so of course we’d at least be nominated! That being said, we knew that we’d be up against some very tough competition. But we rose above the other nominees, having proven that Cetus are one of the best in the delivery, service and support to users of VMware solutions.

The Rising Star award recognises Cetus Solutions as a quality provider of VMware, going farther than most to design a bespoke solution to fit your business and be there for you when any problems arise. It guarantees excellent service, from the moment you start researching the answer to your IT problems, all the way through to its the implementation and beyond.

“We are delighted to win the award for Rising Star 2018 at VMware’s prestigious UK&I Partner Recognition Dinner. For us, the award celebrates what has been a fantastic year helping our customers to transform their organisations with market-leading technologies from VMware. The award recognises our continued investment to achieve and maintain the highest levels of technical competency, knowledge and experience across VMware technologies to ensure we deliver first-class solutions, service and support for our customers.” said Claire Gibson, Head of Marketing and Strategic Vendor Alliances, who went to London to collect the award.

“It is a great honour to be recognised by VMware as the Rising Star for 2018 with our focus on the NSX / VSAN solutions. Cetus have been working with VMware since the early days of GSX/ESX Server virtualisation platforms and continue to develop customer solutions based on proven technologies. The award is a great testament to my team’s commitment and this recognition is proudly received,” said Managing Director Mike English.

If you want to work with VMware’s brightest star to solve your IT solution challenges, speak to one of our experts today. Alternatively, our free-of-charge security posture review will provide you an opportunity to discuss your endpoint security challenges, as well as your wider cyber security posture with regards to perimeter, data centre and cloud components.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, IT Solutions, Our Upcoming Events, Security, Uncategorized, VMware

When ‘Traditional’ Approaches to Security Are No Longer Enough…


1 Comment

Security attacks are without doubt increasing in sophistication and frequency. With the average time to detect a breach over 200 days(!) the damage an attack could cause is frightening… Simultaneously, for many organisations their IT infrastructure and networks are becoming increasingly complex – with 83% of businesses believing the complexity of their organisational structures and IT infrastructure is putting their companies at even greater risk for security breaches.

In recent years, the number of high-profile data breaches compromising sensitive information has continued to rise. Although breaches were achieved in different ways, the majority exposed the fundamental weakness of the perimeter-centric network security model: after all, once the perimeter is breached, it is difficult to stop threats from moving laterally (east-west) throughout the data centre. These attacks have proven that investing in perimeter firewalls is insufficient and that more investment is needed to secure east-west (server-to-server) traffic.

One solution is virtualisation. Virtualisation abstracts the underlying infrastructure from the applications running on top of it, giving IT departments full visibility into the data path. Abstracting applications from the infrastructure provides the ideal enforcement point to compartmentalise applications through micro-segmentation of the network. This allows simplified security-policy creation and management. It also helps reduce the overall application infrastructure attack surface and provides the ability to effectively prevent threats from breaching the data centre. Leveraging abstraction in the data centre also protects the infrastructure from any compromise.

In our attempt to help more organisations improve their security posture, we are proud to announce that last year Cetus Solutions earned VMware’s highly sought-after specialist competency in Network Virtualisation. VMware, who pioneered the term software-defined data center (SDDC), awarded Cetus with the accolade after demonstrating technical competency, experience and expertise in delivering NSX solutions.

VMware NSX is the network virtualization and security platform for the software-defined data center. VMware NSX brings security inside the data center with fine grained policies tied to the virtual machine they protect. Essentially, with NSX, IT departments can programmatically create, snapshot, store, move, delete, and restore entire networks with the same point-and-click simplicity and speed of a virtual machine—delivering a level of security, agility, and availability never before feasible with hardware-centric or traditional operational approaches.

Our Managing Director, Mike English, had a few words on the achievement;

“We are delighted to have secured the Network Virtualisation competency from VMware. In the last twelve months, we have seen an uplift in conversations centred around data center security and particularly micro-segmentation. VMware NSX’s capabilities makes this level of protection economically and operationally feasible for the first time for a lot of customers. By gaining this competency, it shows our commitment to helping customers define, deliver and manage their security strategy in line with their business requirements.”

With the threat landscape increasing ‘traditional’ security approaches are failing to effectively secure a modern organisation. Now is the time to revaluate your approach to security. Our free-of-charge security posture review will provide you an opportunity to discuss your endpoint security challenges, as well as your wider cyber security posture with regards to perimeter, data centre and cloud components.

Speak to an expert

Blog, Cetus Solutions, Cloud, IT Solutions, Technology, Uncategorized

Busted! Top Cloud Security Myths


No Comments

In the lead-up panic to GDPR enforcement on the 25th of May, I thought I’d go ahead and clear up a few of the cloud security myths that have been knocking around lately. As it is, according to Steve Morgan in the Cybersecurity Business Report, malware is projected to cost the world a whopping six trillion dollars a year- and that’s by 2021. And with cloud hosting getting more popular by the day, it’s nice to know where your priorities should lie while you’re trying to sort out your GDPR compliance. So, here we go! I’m counting again (if you missed that disaster on reasons to move to cloud in 2018), so we’ll see how it goes.

1. The cloud is still a new concept, and is therefore insecure.
It’s been over fifty years since the idea of cloud became an actual thing. And it was around then that the distrust started surrounding the concept. It’s an understandable worry- data in your control is far safer; you know exactly where your data is, how it got there and who has access (in theory- but we’ll save that for a further point). The point is, the cloud isn’t new. Neither is encryption or the risk of malicious people hacking in to cause chaos. As issues surrounding these breaches have come up, cloud providers have kept up and ahead, upgrading and designing new cloud solutions to ensure continuous improvement of cloud.

One of the advantages to cloud hosting is the investment cloud providers make into security. Since your data is being stored with a cloud provider, it’s up to them to update all its firmware and configuration changes. I don’t know about you, but I’m not very reliable when it comes to updating my malware or firewall. It’s so easy to ignore that annoying notification that pops up on the bottom right-hand corner of your screen when you boot up your laptop first thing in the morning. Cloud providers have much greater expertise in the area of data hosting, and they have the technical staff to deal with any issues that arise. Isn’t that one less headache to worry about?

2. On-premise hosting is best.
You gently brush your fingers down the server casing, cool to the touch, like a whisper shared only between the two of you. You know your server, it knows you. Stored in this piece of tin is not only data, but years of intimacy between you, an intimacy that you have been relying on for so long.

Except you can’t actually rely on it.

There’s a weird concept that when your data is stored on-premise it’s safer. I understand how, in our current GDPR-focused reality, being able to see exactly where your precious data is being housed can help quell fears. But in reality, on-prem hosting brings with it a whole other host of issues- issues that are your responsibility to deal with.

Take, for example, the destruction of your building. Fire, flood, paranormal activity- you get the idea. Everything goes, and it stays goes- er, gone. Then you have the possibility of questionable back-up processes, that aren’t questionable until you actually need to rely on them and realise that they haven’t been done in the last month. Oops. Then you have to ask yourself if the security measures that you’ve put in place are up to a high enough standard to protect all of your data.

And while you’re so worried about protecting yourself from the threats of the outside, what about that troublesome employee that you’ve finally gotten rid of after years of problems? Or an accidental or negligent security breach? These are far more common than getting hacked, but they could have the same disastrous consequences for your business.

3. All cloud systems provide the same levels of security.
There is a difference between a personal ‘data cloud’ and a cloud business system. One would understandably have to have far more stringent levels of security; I’m sure you can guess which. At the same time, you can’t assume that all cloud business solutions employ the same levels of security, and it’s important to make sure that you have a checklist for the kind of security measures that are required.

A ‘best in class’ cloud provider would normally have a top-quality data centre architecture that would be geographically apart (see ‘fire, flood, paranormal activity’ of the above point). Access is a big one; a good cloud provider would ensure plenty of application security that would comprise the industry standard SSL encryption. Restricted user access; does this person work for your company, and if so, are they allowed access to the data that they’re looking for? On your checklist should also be a dedicated security team who would identify and deal with any suspicious activity. And, of course, look out for ‘best in class’ security certifications to make sure that you’re in the right hands.

So that’s the myths of cloud covered. Now, imagine this; it’s gorgeous outside, you don’t fancy sitting in your grey office for the day, and your boss agrees to let you get your work done from home. Except you don’t. You find the nearest Costa/Starbucks/Café Nero with free wifi and big bay windows to let the sun in, and you plonk yourself there for the day. With your tiny laptop, you have all the power that you’d have if you were sitting in your office building. You’re able to connect to your company desktop through Citrix, and you’re able to write and edit the documents you were working on back at the office, thanks to Office 365.

Still not sure what exactly you should be worried about? Come speak to one of our experts about our free-of-charge security posture review. It will provide you an opportunity to discuss your endpoint security challenges, as well as your wider cyber security posture with regards to perimeter, data centre and cloud components.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, IT Solutions, Technology, Uncategorized

World ‘Your-Systems-Shouldn’t-Have-Gone-Down-In-The-First-Place’ Day


6 Comments

Having been asked to write something for World Backup Day I got to thinking: what does ‘backup’ mean? In fairness I didn’t spend long thinking about it – it means “back up” of course. So; world backup day is about getting your systems back up then. A bit dull when you think about it; I mean – wouldn’t World ‘Your-Systems-Shouldn’t-Have-Gone-Down-In-The-First-Place Day’ be a day more worthy of celebration?

Now, don’t get me wrong; I’m a big fan of backing things up – to tape, to a USB stick, to the Cloud, whatever floats your boat. It’s good to be prepared for a disaster so that you can recover from it. You might call it something like ‘Disaster Recovery’ – a good, strong sounding thing, very positive.

I was chatting with one of our excellent customers at one of our excellent events the other day. He said to his colleague, in jest, “An outage – what’s one of those? We haven’t a system outage in 5 years”. I say he said it ‘in jest’, but the truth is, they haven’t. That’s because we designed and built (and also support) their global infrastructure to avoid such things as ‘an outage’. That’s because outages cost money and, in their case, a LOT of money. Incidentally, if you’re a bit sceptical that our client said this; drop me a line and I’ll put you in touch with him – he’d be delighted to tell you all about his systems.

What our client has is a system that allows business operations to continue, despite the loss of individual infrastructure or system components. You might call it something like ‘Business Continuity’. Definitely better than having to recover, or to get ‘Back Up’.

And that’s what we do at Cetus. We design and build resilient infrastructures that are capable of continuing business operations in the worst of situations. We do so on premise, through the use of active/active and active/passive infrastructure solutions; we do so with our private cloud, to where we can replicate our clients’ infrastructures for near real-time continuity; and we are increasingly doing so by utilising the Public Cloud, by combining Citrix Cloud and Microsoft Azure to provide truly resilient solutions.

So here’s to World Backup Day. And if you’ve enjoyed this blog and have become engrossed – don’t forget to change your backup tapes before you go home. You never know when you might need them to get your entire infrastructure (i.e. business) ‘Back Up’.

Speak to an expert

 

Blog, Cetus Solutions, IT Solutions, News, Technology, Uncategorized

Reasons to Be Cheerful at Cetus Solutions


No Comments

Happy Tuesday! For those of you who don’t know, today is International Day of Happiness. It’s a day to take a step back, realise how good we really have it and do what we can to spread more cheer. And don’t we have so many reasons to be happy? At Cetus Solutions, we’ve all pottered over to work in our beloved Salford Quays in the rain, ready for a productive day and plenty of coffee (or, as we’re mostly Brits in the office, tea).

And there are so many great reasons to be happy at Cetus.

It’s only Tuesday, the beginning of the week, and we’re already motivated to smash our goals and targets. And it’s basically still the beginning of the year; nothing awful has happened just yet. It was only two years ago that we lost so many of our icons and superstars- the world almost came to an end the morning we heard that Bowie had passed. So we’re doing well! The weather is warming up, just, and summer is around the corner. Can you not smell it?!

We’re redecorating the office (slowly, but surely!), look at our fantastic Inspire room; it’s the most chilled spot in the building, and one of my favourite places to retreat to and think. And it’s just the beginning, soon the entire building will get a lick of fresh paint and a splash of colour to liven it up. Make sure to follow us on our social media, we like to share all of our design updates there!

We’re also delighted to be growing our team. I’ve only arrived myself just over a month ago, and we keep finding amazing, intelligent people who share our passion and excitement for all things IT. The office seems to be getting smaller, but our family is only getting bigger, and we’re always looking for more bright-eyed, ambitious people to bounce ideas off.

And despite the crazy weather we’ve been having (who else enjoyed the drive to work through the snow at the beginning of the month?), Britain has remained in the 19th place in a study published this morning on world happiness. Which really isn’t bad considering we’re up against 155 other countries!

Today is the best day to celebrate being happy and going that extra mile to put a smile on someone else’s face; be it your neighbour, your colleagues or yourself (make sure to stop off on the way home to get that bar of chocolate/takeaway you’ve been craving!).

At Cetus, our hosting makes us happy, and we’re proud to make our clients happy too.

Want to know how we can make you happy? Read one of our case studies to see what we can do for you!

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.