Category Archives: Security

Stay Systems Safe with Patch Management

In the two years since the May 2017 large scale cyber-attack called WannaCry there has been much publicity about the widespread mayhem that cyber attacks can cause across many thousands of organisations worldwide. Since that time, we’ve seen an increase in the number of organisations asking about our Managed Service. With the benefits of multiple layers of security, our customers have accurate spam filters, antivirus, antimalware, filtering, content control, firewalls and more.

Patch management is the most common type of IT service offered by managed service providers (MSPs). After all, patch management is an effective way to strengthen security. We thought it would be a good time to talk about why patch management is so important. With Microsoft end of support for Windows 7 looming, business owners will be stuck without security patches after January 14th2020.

What is Patch Management?

Put simply for anyone reading this blog who doesn’t manage IT; patch management adds changes to existing software to add up-to-date security functions. Using a patch is used to address a specific bug or cyber attack; it’s often called a fix.

Why Outsource Patch Management?

For any IT managers looking to justify spending a part of their IT budget on keeping track of addressing IT threats, patch management is vital. Depending on the number of workstations and system involved, it can be a full-time job for someone hands-on. Fortunately, a managed services provider can deliver the service remotely.

Our monitoring processes discover latest vulnerabilities every day. We receive releases of critical patches from worldwide security experts and implement patches as soon as they are available.

We know from experience that reserving work related to core business needs and business specific IT issues is best for organisations own in-house IT team.

How to Find the Best MSP for you.

Many MSP providers claim to have excellent patch management programs. We’re happy to provide proof, customer testimonials, industry certificates. And you can see from our track record of growth, that our customers refer other business owners to us.

For an MSP to trust, please do contact us for more information.

How to choose the right size Backup Solution for your Business

When it comes to backups, it’s certainly not a case of one size fits all

There are so many great options available, so how do you know which is best for you and your business?

Should you be using cloud or on-site storage, image or file-based backups?

Here’s my practical, simplified guide about what you need to consider and why.

First, let me explain two critical backup measurements – Restore Point  – Restore Time. Continue reading

What is “The Cloud”?

This phrase “The Cloud” has become so commonplace over recent years that many people are now afraid to ask what it is. As the technology is talked about all the time, most believe that they should already know all about it, so think that asking would make them look silly or uneducated.

Continue reading

Ransomware Cyber-Attack Information

It will not have escaped your attention that Friday 12th May 2017 an unprecedented large scale cyber-attack has been causing widespread mayhem across more than 150 Countries and affecting thousands of organisations, including the NHS.
This attack has been all over the news and there has been lots of differing advice passed on from multiple sources, leaving people confused and concerned.  This information is intended to help clarify the situation and reassure computer users on how they can protect themselves from becoming a victim.

Continue reading

Cirrus IT Services Extend Backup Portfolio with Nakivo Partnership

Cirrus IT Services (UK) Limited are proud to announce our new Partnership with Nakivo that allows us to add to our portfolio and to offer a new choice of backup solutions that can be tailored to your requirements based on what best suits your business infrastructure.

Whether you have a fully virtualised environment or a hybrid mixture of virtual and physical servers and desktops, we now have an option for every eventuality.

NAKIVO-Backup-and-Replication

What is NAKIVO Backup & Replication?

NAKIVO Backup & Replication is an all-in-one VMware VM backup, replication, and recovery solution designed to protect VMs onsite, offsite, and in the cloud.

Nakivo_Diagram

Download the Nakivo Backup & Replication v5.7 Product Datasheet here -> : NBR-DS

FAQ’s

How many VMs can NAKIVO Backup & Replication protect?

NAKIVO Backup & Replication is a modular solution that can be fully installed on a single machine to protect small and mid-sized environments, as well as scale out horizontally and support large distributed environments with 10,000+ VMs.

Does the product support live applications and databases?

Yes, you can back up, replicate, and recover live VMs running Exchange, Active Directory, MS SQL, Oracle, and other applications and databases. Using the application-aware mode, NAKIVO Backup & Replication ensures that data inside VM backups and VM Replicas is consistent, and that you can recover files, application objects, and entire VMs.

Does the product support large VMs?

Yes, you can back up, replicate, and recover 500+ GB VMs with NAKIVO Backup & Replication.

Can I stage (seed) the initial VM backup or replica?

Yes, you can perform initial backup and replication to a removable media (such as a USB drive), then transfer the media to a remote location, and then run forever-incremental backup and replication jobs to that new location, thus saving time and bandwidth.

Can I exclude VM disks from backup and replication jobs?

Yes, you can choose what disks you would like to back up or replicate in NAKIVO Backup & Replication.

Does the product provide granular recovery?

Yes, you can instantly recover files and Microsoft Exchange objects directly from compressed and deduplicated VM backups without recovering the entire VM first.

How does data deduplication work?

Deduplication significantly reduces storage consumption by saving only unique data blocks to a repository. During backup, NAKIVO Backup & Replication compares each new block of data to ones that are already available in the backup repository. Only unique data blocks are written into the backup repository, while those blocks that are already available in the repository are skipped. This way one block of data can be used to recover several different VMs.

Protect your servers, workstations and laptops against viruses, spyware & other malware

ControlAntivirus provides real-time threat protection against viruses, spyware and other malware in minutes. Optimized to scan for security threats without hogging system resources or slowing down PCs – even during scans and updates.

Benefits:

  • › Doesn’t slow down PCs
  • Centralizes antivirus management
  • Protects against threats in real time
  • Saves time, costs and IT resources

Endpoint protection, central management

ControlAntivirus makes it easy to deploy, manage and automatically address threats on your computers from the cloud;
from scheduling scans and pushing definition updates to identifying infected machines. The small-footprint agent
installs and scans on the endpoint, so no sensitive data leaves your network for scanning.

Advanced threat detection

ControlAntivirus defends against malware threats, including zero-day threats in real–time with Active Protection™ and
other highly sophisticated detection methods: heuristics to identify new viruses and new variants of known viruses,
signatures to search for known malicious patterns in data and MX- Virtualization™ to analyze file behavior in a virtual
environment.

Real-time threat data integration

ControlAntivirus integrates with technologies which are backed by malware processing tools which analyze thousands
of threat samples daily, ensuring the definitions are always up to date.

Try it out for yourself free for 30 days and be up and running in just a few minutes: http://www.controlnow.com/platform/free-trial/?CPID=387384

Want to Increase security and gain control of user web browsing?

ControlWebProtect delivers extensive web security across your distributed infrastructure; protecting computers from websites pushing malware, phishing sites, proxies, spyware and adware, botnets and SPAM. With no dedicated server and no proxies to configure, the easy to use web-based management console allows you to quickly gain control of user web browsing.

Benefits:

  • Up and running AND protected in minutes
  • Users stay safe and productive
  • The business stays protected from legal liability
  • Puts you in control of web browsing – even for laptops on the move
  • Avoids costs or a throttled network, by staying on top of bandwidth usage

Take charge of web security

ControlWebProtect enables IT admins to manage Internet usage on servers, workstations and laptops* to effectively
protect against productivity losses and web-based security risks. This level of protection helps users avoid landing on
sites that can either get them into trouble or break down computers, which IT admins are then expected to clean up
and restore.
Whether you are in the office or on the road, ControlWebProtect you are always in control of web security, URL filtering
and web monitoring.

Increased productivity in the workforce

Time-based restrictions can be applied to limit web browsing during core business hours and Internet usage can easily
be monitored across the network or on individual computers. This helps reduce the time users spend on websites not
needed for work such as social networking sites.

Keep bandwidth usage in check

Stay on top of bandwidth usage with real-time visibility of when devices exceed bandwidth consumption thresholds.
Easily spot excess usage by device, URL or website category and quickly remediate issues to avoid a throttled network.

Simple to set-up and maintain

To simplify web security and save you time everything is controlled through easily configured policies.
Policies contain the settings needed to co-ordinate web security and URL filtering, including:

  • Blocking security categories
  • Block/Allow 80+ categories of URLs
  • Policy-based White and Blacklist URLs
  • Time-based browsing rules

With ControlWebProtect, your configurations can be quickly and easily applied across groups of computers from one central location, while still offering override options on single computers, for more granular control.
Browsing controls can be automatically and intelligently applied from install; ensuring the right protection is in place for each device type across your distributed network.

Try it out for yourself free for 30 days and be up and running in just a few minutes: http://www.controlnow.com/platform/free-trial/?CPID=387384

Are you a DR expert?

dr-expert
Play our game to find out and download our FREE Disaster Recovery Kit .

There are a lot of conceived ideas out there about disaster recovery practices. Are you armed with the right arguments to know what’s fact or fiction?

Download our FREE Disaster Recovery kit with valuable information on DR best practices and a free DR plan in the Unitrends cloud!
You can also play our DR ‘What’s your comeback’ game to practice your DR pitch and test your DR knowledge.  

Unitrends_Logo

Unitrends_Download

About Unitrends

To address the complexities facing today’s modern data center, Unitrends delivers end-to-end protection and instant recovery of all virtual and physical assets as well as automated disaster recovery testing built for virtualisation.

30 Day Free Trial – Cloud Backup

Test our service in your true working environment and see that it meets our claims

Our 30 day free trial is our full service with no limitation
Our trial carries no obligation and no financial details are required

Towards the end of your trial..

As the free trial period draws to a close you will be informed of the cost should you wish to continue and if so will be invoiced for your first quarterly period
If on the other hand you decide it is not what you need or is too expensive, you can simply cancel and we will remove your account and encrypted data from our servers.

Signup for your free trial Here

Download the software Here

Why you should choose Cirrus IT Services (UK) Limited as your online backup service provider:

We are a UK company and store your data in UK data centres.
Our technical support is UK based.
Your data is fully encrypted and protected even before it leaves your computer.
Our fully managed and monitored service is unrivalled.

Continue reading

Cloud Controlled Security as a Service

bit-defender

Bitdefender is the #1 ranked antimalware security product on the market and it is now available as a Service with simple monthly licensing.

corporate-security

Cirrus IT Services (UK) are proud to announce that we are the only Consumer & Business Product Range Certified Bitdefender Partner in the whole of East Lancashire!

Bitdefender Cloud Security is available as part of a managed service agreement with Cirrus IT Services (UK) along with a comprehensive cover package to give you peace of mind, or as a standalone offering for a lot less than you might think considering the features available:

Standalone Service Pricing:

£2.00 per Endpoint, per month (plus VAT) for between 1 and 99 Endpoints
£1.80 per Endpoint, per month (plus VAT) for between 100 and 499 Endpoints
£1.60 per Endpoint, per month (plus VAT) for between 500 and 999 Endpoints
£1.50 per Endpoint, per month (plus VAT) for between 1000 and 4999 Endpoints
£1.40 per Endpoint, per month (plus VAT) for between 5000+ Endpoints

Features include:

  • Antivirus
  • Antimalware
  • Web Filtering and Content control
  • Two-way Firewall with IDS
  • Device Control
  • Browser integration
  • Protection for Windows Desktops, File Servers, Macs, Linux and Microsoft Exchange protection*
  • Remote deployment and uninstall of competitive solutions – Using Windows Network Discovery Bitdefender detects all unprotected computers and allows you to deploy protection. Competitive solutions are uninstalled when deploying the Bitdefender client kit.
  • Granular policies, reports and alerts – The cloud based console enables you to apply different policies for specific groups. A quick status is available through the dashboard or predefined reports.
  • Configurable Roles and Privileges – It’s now easier to map each individual’s responsibility and role within the management console.
  • Optimized Bandwidth Consumption – With the new security relay mechanism, external traffic is minimized by using the local network to distribute updates or deploy new clients.
  • Simple usage-based licensing – We invoice you based on the total number of computers protected each month. It’s easy to sclae up or down each month as necessary with no long term commitment.
  • Control Center console is hosted, so there are no onsite hardware or software requirements for a management server.

*Additional charges apply for Microsoft Exchange protection module

As with most of our services, we can arrange for a free 1 month trial.  Please contact us to arrange this as we will setup an installation package specific to your needs.

Free trials are for 30 days, there is commitment, no card details are required, there is no limit to the number of endpoints you can install the free trial onto and the software is fully featured and not limited in anyway.

>>>> Click here to arrange your free trial now <<<<<

editors-choice

bit defender tests

2014-product-of-the-yearaward-2014-proactive-goldaward-2014-malware-removal-goldaward-2014-proactive-gold