Blog 2 Column

Conventional IT Support as opposed to Pay as you go (Subscription)

The whole of the IT Industry needs to review the way in which we provide technical support to end users. This has been a time to think and to adapt to newer ways of working both in work and at home. Laptop sales were falling until the pandemic hit us all and we started to throw money on the fire rather than on our future strategies.

Lots of companies have had to place people from home buy them IT equipment which was not budgeted for against the unforeseen circumstances that has had a hold on us all for the last nine months.

DATA security has been at the forefront with staff now carrying DATA on home equipment and where loss and theft should be of great concern.

We may need to emphasize on operational costs rather than capital costs as we steer ourselves out of the pandemic and that too has fallbacks because operational costs are a derivative of sales income.

The cost of ownership in managing your own IT assets based on an industry standard calculates to about four times the purchase price because the overheads of maintaining that IT asset cannot be excluded or ignored these are mostly direct costs for a business.

A laptop purchased for say £600 will eventually cost around £2400 to allow for maintenance, training, infrastructure, and the cost of admin/IT Support. Then after three to four years the cycle starts again by wanting faster speeds and more memory and storage. At this point the mean time between failures has almost reached it average and productivity will be affected adding another cost to the cost of ownership.

People who have their own IT assets occur lots of indirect costs, which are not considered such us operating system crashes and applications not working, which can lead to substantially quite a lot of invested time for the individual and again if that was a cost contributor then surely be higher than the cost of the equipment.

The alternative is to consider a subscription-based model pay as you go monthly within a secure and reliable environment. Scalable for the duration required and quickly made available wherever globally.  The cost of maintenance is much lower and infrastructure is available 99.99%, which in itself pays back for not having lost productivity.

The cost model varies from a multiple factor of two or three times the cost of buying a piece of conventional hardware.

If we are to stay competitive then this needs to be decision made by IT directors and finance controllers within businesses sooner than later.

Monthly subscription would involve some sort of mobile device with an internet or WiFi connection with a choice of either an office setup or a more demanding graphical setup Windows virtual desktop.

IT providers are now offering FREE workshops to discuss and demonstrate how the subscription model would be of benefit to them.

Fortinet devices compromised due to poor configuration.

This was highlighted by Fortinet back last year. If you have been “hit” because you did not carry out their advice on critical patching your Fortinet appliances. We can help in patching in getting this done improves security on the method of authenticating your users onto your network.

TAGZ Cloud is an Accredited Fortinet partner, so get in touch if you need assistance.

Protect yourself from Phishing emails

95% of all attacks on enterprise networks are the result of successful phishing tactics. Greater increase of such attacks have increased in 2020 due to the spread of COVID-19, with cybercriminals taking proper advantage of stay-at-home workers that are not under the safeguarding protection from their in house IT support strategy and policies. Other weakness can be related to not having the correct technology configured or utilising out of date Antivirus definitions not been able to detect phishing.

False luring websites can look very realistic and convincing, but then it is too late once you submitted the asked for criteria. Users need to be taught on recognising such pitfalls before being lured into a trap, such as mass emailing to company user’s which can be disguised as an legit official body, colleagues, unpaid invoices, delivery collection. Hackers know our weaknesses and exploit them to their advantage

 Here is some basic information you can carry out.

  • First Think! Before opening the email, do you recognise the sender address, is it in the correct email address format or does it have some other details in the email address.
  • If the email was opened, are they asking you to do anything?
  • Are there any attachments such as word, pdf, text files, excel etc, they have asked for you to look at say “outstanding invoice” etc. As opening the attachment could then take you to a website for collecting your details
  • Never feel embarrassed contacting your IT TEAM for advice, they will guide you and what action to take.
  • Always keep AV up to date, and don’t visit websites you being ask to visit by someone, unless you can validate them as a genuine contact
  • If your unsure DELETE the email, any genuine company would call you if they not received any action from you, or best still call them to confirm they have genuinely sent you the email in the first place!

TAGZ Cloud utilises as well as offers it’s customers Advanced Threat Detection solutions to protect your company with a range of industry led cyber detection solutions

To ensure a timely response to threats, complimented by automation across an organization’s security infrastructure, delivering unparalleled protection and visibility to every network segment, device, and appliance, whether virtual, in the cloud, or on-premises.

The need for adequate Network and Device Protection against Ransomware.

New types of cyber threats are being discovered every day. The only things standing between our data and malicious activities are the type of security defence systems and up to date software, we have in place. Many devices may already have an antivirus software running locally, but this will not protect you 100%, why? because as new trojans, ransomware, PC boot sector, file destroyers and many more vulnerabilities are released into the internet domain, these systems will not detect such new instances quickly enough, until those respective bodies create newer definition files to detect the new sources onwards. Virus definitions only detect known issues from past and notified threats. New threats are always imminent and thus the cybersecurity industry will always continue to thrive in this type of detection. Larger corporations invest towards intelligent hardware devices and cloud software, even with a robust security strategy, these are only as good if there constantly monitored, kept up to date and tested for various weak spots in your defences, so anyone connected to your company computer network is at risk.

A Teleworker Solution

Facilitating Remote work for your employees has been challenging as well as being a new concept to some companies. For companies that don’t utilise newer cloud technologies, they have to ask the question, how do I deliver a safe IT environment keeping our company data secure and collaborate with colleague’s. Companies making use of the cloud this is straightforward as the cloud service offers protection as part of it’s service. But what about non cloud users?. Our teleworker solution enables companies to use devices that allow secure VPN ( virtual encrypted private network) with different types of industry led authentication methods allowing your employees or contractors to login to your company network thru their current home based internet connection. This is like having access to your company resources as if you were in the office. This new telework model can benefit employees due to the geographic freedom, the reduction in commute, and flexible schedule. There are also occasions in which remote work may be the only option for some. Studies have shown that Home bases teleworkers are known to be more productive from being in the office, organizations need solutions that enable business continuity, supporting employees as they work from alternate locations. The transition to the teleworker model opens users and companies up to a myriad of security threats including malware, all forms of phishing attacks and trojans and many more if not properly implemented with the right technology behind it.

Teleworker White Paper Fortinet

Welcome to our download page and thank you for your interest in our products and services.

Please note that as if you have not received the download link email shortly,

it may have been blocked or placed into your email client SPAM or JUNK folder, if this is the case, simply move it to your inbox to access the download link.

If you encounter any problems, please use our chat facility on our website for further assistance.
FREE DOWNLOAD

Send download link to:

A FORRESTER TOTAL ECONOMIC IMPACT™ STUDY COMMISSIONED BY MICROSOFT AND INTEL

Welcome to our download page and thank you for your interest in our products and services.

Please note that as if you have not received the download link email shortly,

it may have been blocked or placed into your email client SPAM or JUNK folder, if this is the case, simply move it to your inbox to access the download link.

If you encounter any problems, please use our chat facility on our website for further assistance.

A FORRESTER TOTAL ECONOMIC IMPACT™ STUDY COMMISSIONED BY MICROSOFT AND INTEL

The following downloadable PDF was conducted by  FORRESTER TOTAL ECONOMIC IMPACT™ STUDY COMMISSIONED BY MICROSOFT AND INTEL.

 

The Total Economic Impact™
Of Microsoft Windows Virtual
Desktop
Cost Savings And Business Benefits
Enabled By Windows Virtual Desktop
JANUARY 2021
FREE DOWNLOAD

Send download link to: