If you asked me this question 2-3 years ago I would have said yes. It appears that the success of Apple’s OS-X equipped machines has also led to another new phenomenon – exploits. Today as I was reading the latest cert advisories looking for windows, internet explorer or other related issues I noticed several “High” vulnerabilities for Apple Mac OS X. I figured I’d read on to see the typical Microsoft Internet Explorer or related items but there weren’t any. Is this a sign of a change in the tide of OS security? I don’t believe so, I have what I believe is a much more logical explanation. All software of any sort has issues. These issues create opportunities for those out there that would like to undermine our security.
The bigger we as an audience represent the more likely we are to be a target of these efforts. Quite simply, the Mac was not a huge target because it had very little market share and mainstream appeal. That has changed and so has the efforts that are made to exploit it. This is not a universal answer, there are of course other factors involved but I believe above all this is the biggest issue. When you compare things that have like features and marketability you’ll likely find items that have similar exploitability and interest of those mysterious would be exploiters.
Virtualization – Technology Primer
We all know that operating a business can pose many challenges. As your business grows Information Technology tends to get more complicated. You might find that you need a new server to run software that your current server is unable to run. Or perhaps you need to add some redundancy, a second or third server even. Things are starting to get a little cluttered in your server room and your IT costs, cooling and electrical bill are climbing. In most cases a business would consider implementing a larger single or dual servers to consolidate some of the load, but what if there was a more effective way to turn back the tide of rising maintenance and operational costs? The simplest and most effective path is utilizing virtualization technology.
What is Virtualization Technology?
Quite simply, virtualization technology involves software that allows you to run multiple (even different) operating systems on one hardware platform. These “virtual” operating systems are actually stored in files on the hosts file system. Each one acts just like a normal system would, with one exception – there is no physical console (monitor, keyboard and mouse). You access these virtual machines through traditional remote access methods or through special software that gives you console level access to the machine.
What are the benefits of Virtualization Technology?
One of the benefits is fewer points of failure. Quite simply there is less hardware to break and worry about maintaining. Another significant benefit is the better utilization of the resources you have. In most cases servers are over-powered for the roles they perform. We usually add more servers not because we need more memory or processor power but rather because we need to run unique applications that work better when they are isolated. Sometimes security conflicts force us to add more servers, say in the case of a existing file server and a needed external web or Email server. It is unwise to have both of those roles on one physical or virtual server. Ease of access and management is also another characteristic of virtualized systems. You basically have one console where you can monitor a number of servers’ vital signs and operational status. Backing up and restoring a virtual server takes a fraction of the time and resources that it takes to do a physical server. This is because the hardware platform never changes and the hard drives are actually files that can be copied from one machine to another with minimal and in some cases no configuration necessary. Were you to do the same thing with a physical server you would typically spend quite a bit of time and it would generally involve costly disaster recovery solutions be in place. In our practice resurrecting a physical server that has failed takes the better part of an eight hour day and a virtual takes the time it takes to copy the files, generally less than one hour. Now consider what seven hours of extra downtime would cost your business.
Is Virtualization Technology expensive?
Thanks to the competitive nature of this rapidly growing market, no. There are even free products on the market today; one example is Microsoft® Virtual Server 2005 R2. Microsoft is a relatively new player to the virtual server marketplace but they have shaken up the industry and created an atmosphere that is beneficial to smaller businesses that in the past could not afford the technology. When you add up all the factors, virtualization technology is a huge cost savings in startup, maintenance and upgrades. In our assessment, the technology is priceless.
How do I implement Virtualization Technology?
Proceed with caution. There are a lot of things that can go wrong, especially when you are learning something new. If you don’t have the capacity in house, consider hiring an outside firm with Server Virtualization experience. Using the correct resources will lead to a solution that will readily start paying for itself. Try not to put anything mission critical on your first virtual server. Give yourself time to get comfortable with the management and configuration of the product you have chosen. Slowly migrate your roles to the virtualized servers starting with those that are lower priority and moving up from there. Once you are comfortable with the configuration and maintenance you will find yourself eager to consolidate all possible roles to this solution and start reaping the rewards of the improved efficiency.
Axis IP Cameras and Surveilance Systems
In 2004 Managed Solutions became a partner of Axis Communications to provide IP security camera solutions to our customers. As a security centric provider we realized the need to infuse the traditional physical security model with additional technological solutions. One of the best ways to add more physical security to a enterprise is through the use of security cameras. Security cameras allow you to record your facilities 24/7/365. The mere presence of security cameras is likely to have a dramatic affect on the security of your facility.
In the unlikely and unfortunate event that something should happen in spite of the presence of the cameras if properly configured you will have hard evidence of the event to turn over to the authorities. Security cameras can also reduce the work load and increase the efficiency of your organization. By being able to monitor an infinite number of locations management can have a better feel for what is taking place in their facility, regardless of how large or small it might be. Remote sites can also be monitored and limit the need for a physical presence. All of this is made possible while utilizing pre-existing TCP/IP networks. This limits the need for new cabling infrastructure to be installed. Regardless of why you need surveilance, Axis Communications is the leader in the IP surveillance arena. They are an innovator in the field of IP Surveillance hardware and software and a valuable partner for any organization.
A typical Axis Camera Network utilizes your existing network infrastructure. By offering indoor and outdoor cameras that support Power Over Ethernet (POE) or add on POE midspan products in addition to wired and wireless networking they give us maximum installation flexibility. Their cameras also range from very basic static cameras up to sophisticated Pan Tilt Zoom (PTZ) units. Axis is also renowned for the image quality their cameras produce, this is an important criteria when you evaluate IP Surveilance products. The heart of their system is the Camera Station software. This software provides you with monitoring, recording, playback and event management. Because the system is TCP/IP network based, remote reviewing and playback are also supported. The package is rounded out with stand alone recording products for situations where the end user wants the data stored off their traditional file servers.
Secure Enterprise, The Managed Solution
Any company, government, or group of individuals utilizing computers to complete tasks is a form of enterprise. This is not the typical view in the IT world. If you ask most people what “enterprise computing” is, they will tell you a large systems and network infrastructure belonging to a large government agency or company. We believe that any group of computers used by an organization of any size represents an “enterprise”. The needs don’t change on the basis of size alone. Any infrastructure should be designed and managed for ease of use, maximum return on investment, high availability, and secure from hackers, viruses and other threats.
Many enterprises take steps to secure their physical presence through locks on doors, security guards, perhaps even video cameras. However, the modern marketplace has become increasingly reliant upon their networks as a means of doing business, storing their intellectual property, client contacts, human resource data, and other critical information. The security measures taken to protect an enterprise’s digital assets often pale in comparison to the ‘brick and mortar’ approach.
The biggest difference between the security approaches of a smaller business and a large company or entity is commonly the amount of risk taken and the perceived impact of the risk. Many small to mid sized business have a greater tolerance for risks because they perceive that the cost of protection outweighs the impact or likelihood of the risk occurring. Larger entities tend to be risk-averse, as they view the likelihood and impact of a security risk to be higher, based on their assets, professional reputation, and other factors.
The Managed Solutions “Secure Enterprise” model is a comprehensive set of products, services, and practices that assist you in protecting your business from existing and emerging security threats, hardware failures, system abuse, data loss and most importantly downtime. By utilizing our experience with the small to mid sized IT customers we can better assist you in finding the best balance of stability, performance, reliability and security while minimizing your total costs over the long term. Any solution this comprehensive is always changing and adapting to the changes in the computing environment and to take advantage of new products and practices. Without this commitment to improvement a system of this nature would become obsolete very quickly leaving your business and your reputation vulnerable.
Donate Old Cellular Phones to a Good Cause
Over the years many of us have acquired a variety of cell phones and we sometimes wonder what the heck to do with them. The batteries can be hazardous to dispose of and it just seems so wasteful to throw them out!
There is an organization named Call to Protect (www.calltoprotect.org). It is organized by a wireless foundation, Motorola and the National Coalition Against Domestic Violence, that collects used phones for battered women’s shelters nationwide. The phones are repaired and programmed to call emergency numbers in the area they are distributed. Your old phones can now mean comfort and safety for a victim of domestic violence. I just boxed up three phones to ship to Call to Protect, and I feel great about it. They are, after all, for a truly worthy cause.