• Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • FAQs
  • Careers
  • Privacy Policy
  • Remote Support
The ITeam
  • Home
  • Services
    • Managed IT Services
    • On Demand IT Services
    • Cyber Security Calgary
      • Email Security
      • Security Training
    • Cloud Services
      • BCDR
      • Hosted Services
      • Microsoft Azure
      • Microsoft 365
  • Industry
    • Construction
    • Healthcare
    • Oil & Gas
    • Legal Firm
    • Accounting
    • SME
    • Clients & Achievements
  • Your ITeam
    • Careers
  • Blog
    • News
  • Business Assessment
  • Contact Us
  • Menu Menu
  • Home
  • Services
    • Managed IT Services
    • On Demand IT Services
    • Cyber Security Calgary
      • Email Security
      • Security Training
    • Cloud Services
      • BCDR
      • Hosted Services
      • Microsoft Azure
      • Microsoft 365
  • Industry
    • Construction
    • Healthcare
    • Oil & Gas
    • Legal Firm
    • Accounting
    • SME
    • Clients & Achievements
  • Your ITeam
    • Careers
  • Blog
    • News
  • Business Assessment
  • Contact Us
Blog

Offsite Backup Is a Crucial Component of IT Support

March 24, 2015/0 Comments/in BDR, Disaster Recovery /by James Wagner

Offsite Backup Is a Crucial Component of IT SupportCalgary businesses should have necessary IT Support in place to ensure continuity.

One of the most crucial elements to put in place is offsite backups.

Offsite backups are a must for every business.

They help to protect organizations from the loss of data that occurs with onsite server failures or as a result of physical catastrophes such as fire, flood, theft, or vandalism.

How Do Offsite Backups Work?

Recording data to tapes and physically transporting them to a secure storage facility have been replaced by remote, cloud-based backups.

Offsite backups are not complicated.

Once the initial setup is complete, data is backed up automatically and continuously.

Image-based backups provide near-immediate recovery for virtual machines, and online backups ensure that an organization’s valuable data is securely stored in the cloud, accessible from anywhere in case the business is displaced.

This data is fully recoverable and restorable so that an organization can continue to remain operational regardless of the issue.

What Factors Are Necessary for Offsite Backups?

No business is immune to the risk of data loss or disruption from an unexpected disaster.

Your IT Support services should include offsite backup that offers:

  • Immediate disaster recovery services
  • Safe, secure storage of data
  • Local hosting and support
  • Customizable solutions
  • 24/7 monitoring
  • Virtual machine backup and replication
  • Fully managed recovery services

What Should Be Backed Up Offsite?

One of the most important considerations in creating an organization’s offsite backup and disaster recovery plan is determining what information is crucial to keep the business operational.

From client data to secure processes, from account detail to current project notes, the offsite backup should include all of the information needed to continue operating if returning to the business location is not an option.

Such information may include emails, documents, contracts, images, tax records, applications, and other rudiments necessary to conduct the day-to-day operations of the business.

What Are the Benefits of Offsite Backup?

There are a number of benefits to offsite backup, not the least of which is peace of mind.

Knowing that business data is stored safely and securely so that it is accessible no matter what happens allows business leaders to focus on achieving business objectives rather than worrying about what-ifs.

Offsite backups are:

  • Reliable
  • Efficient
  • Cost-effective
  • Easy to use
  • Secure

Your IT Support provider should be able to offer fully managed and customized offsite backup services with secure storage in a Calgary-based secure facility with 24/7 monitoring.

Offsite backup and disaster recovery is not a one-size-fits-all solution.

The ITeam will work with your Alberta business to customize a cost-effective solution and help you develop a comprehensive disaster recovery plan that will ensure the continuity you need.

Contact us for a free consultation.

Disaster Recovery in the Modern Age Ensures Business Continuity

February 24, 2015/2 Comments/in BDR, Disaster Recovery /by James Wagner

IT Disaster Recovery To Ensure Business ContinuityWhat would an hour of downtime cost your business?

Hundreds of dollars?

Thousands?

Maybe even the loss of a client?

In today’s era of image-based backups, cloud services, and cost-effective on-demand IT services, there is no reason why any business should risk being without a comprehensive disaster recovery plan.

And that is the key: Solid disaster recovery begins with planning.

Identify Your Business

To implement an effective disaster recovery plan, you need to know your business:

  • What elements of your business are so essential that you cannot survive without instant access to them?
  • What information or data do you store that, if lost, would put your customers at risk?
  • What proprietary business data do you need to be protected in order to maintain your position in the industry?

Once the essential elements that make up the structure of your business have been identified, creating a disaster recovery plan becomes easier.

Create Your Disaster Recovery Plan

Your disaster recovery plan should integrate with your business in a way that prevents downtime from disrupting your business continuity.

Part of your disaster recovery planning requires you to consider different scenarios.

Having your location damaged as a result of fire or another natural disaster necessitates different protocols than discovering a disgruntled employee has deleted files or compromised security.

In each case, you need to have an action plan in place and be able to respond swiftly.

An oil and gas company may need to prioritize security.

A dental office may need to prioritize access to patient records.

Legal and financial firms will need to address regulatory compliance in their planning.

Most organizations will need to consider the impact of BYOD technology and how that impacts security and disaster recovery both positively and negatively.

Planning for disaster is essential for every business that wants to remain functional, whether a minor disaster occurs (a server fails, an employee deletes essential information) or a dire situation threatens to disrupt your business continuity.

Ideally, you will be able to create a disaster recovery plan that is comprehensive enough to keep you operational in any situation and flexible enough to meet your specific needs.

The benefits of disaster recovery include:

  • Round-the-Clock Monitoring and Protection
  • Rapid Recovery
  • VM Backup
  • Cloud BDR
  • Offsite Backup

Disaster recovery is not a one-size-fits-all solution.

The ITeam will work with your Alberta business to customize a cost-effective solution and help you develop a comprehensive disaster recovery plan that will ensure the continuity you need.

Contact us for a free consultation.

2015 Business IT Predictions from The ITeam

January 27, 2015/0 Comments/in Cybersecurity /by James Wagner

2015 Business IT PredictionsThe ITeam believes that over the next few years, the adoption of technology in every aspect of life, both personally and professionally, will rapidly accelerate.

Businesses will embrace the way technology serves to improve interactions with customers, the experience customers have with businesses, and the ability businesses will have to be more productive.

Along the way, every business leader will be forced to consider how to balance the cost of technology with the need to remain risk averse.

All of this will have to complement the need to be flexible enough to remain competitive on an increasingly shrinking global scale. We predict the following factors will become critical for every business leader in 2015:

Risk-Based Security

The road to the digital future must be paved with security. And businesses will have to balance how they approach security so that their customers and data are protected, while at the same time their ability to be flexible is not impeded. Businesses will rely on IT partners to use mitigation tools and risk assessments. IT security will move beyond firewalls and virus detectors, employing a multi-faceted approach to better detection and prevention.

Cloud Ubiquity

In 2015 the adoption of IT security cloud services will become the norm. Indeed, hosted services for email, IP telephony, and backup and disaster recovery make more than economic sense. They make sense for business continuity, becoming essential to organizations of every size. The union of mobile and cloud computing will continue to promote the growth of centrally synchronized applications that can be delivered to any kind of device. Management and coordination of these applications will depend on the cloud.

Comprehensive Infrastructure Solutions

In today’s world, technology changes fast, and consumers expect you to not only keep up with these changes but to always be available as well. Effective planning – not only for this year but for ongoing success – requires a comprehensive approach to infrastructure. In the coming months we’ll explore the different ways in which businesses must prepare for this fast-paced future. Visit regularly to learn about:

– Disaster recovery

– Offsite backup

– Hosted services

– Cloud services

– Managed services

– Server replication

– Server virtualization

Why Do We Have More Than One DNS Entry?

January 5, 2015/0 Comments/in Managed IT /by James Wagner

Why Do We Have More Than One DNS Entry

Every once in a while, an ISP will have a problem with their DNS server and someone can’t access a website. 

While troubleshooting the problem, we usually get asked: “If the first server doesn’t give the answer I wanted why didn’t it move to the next one in the list?”  

What is DNS?

In the simplest of terms, Domain Name Service (DNS)is the mechanism that translates human-readable names (www.google.ca) into numbers that devices on the internet understand (173.194.33.56). 

If we didn’t have DNS you would have to enter that ugly number in each time you wanted to access the website. 

It’s a lot easier to remember the name.

Why do you have more than one entry? 

Backup. 

The second and possibly third servers on the list are there in case the first can’t be connected to. 

It means that the first server is either dead, not there or missing. 

“Can’t be connected to” is different from “didn’t provide an answer” or “provided the wrong answer”. 

Here’s why.

DNS isn’t a “general consensus” protocol where you ask each server on the list for the same information and then take the “best answer”. 

That would really slow things down and who’s to say the “best answer” was the one you wanted anyway? 

It tries to connect to the first server on the list and, if the connection is successful, it assumes that the answer it gets back is the correct one – even if that information is wrong or empty or nothing returns at all. 

It stops there and doesn’t try the next one on the list. 

It has an answer – whether you like it or not – why would it continue to look? 

However, if that server doesn’t respond (aka dead, not there, missing) your system will try the next DNS server on the list. 

It will keep doing this until it makes a connection or reaches the end of the list. 

End result. 

If the first server is dead and it successfully connects to the second server will it always try the first server for every new request? No. 

Your system will remember which of the servers worked last time and try that one first the next time – right up until you restart – then the process starts over again.

Why would a DNS server allow connections but not give an answer? 

Usually, this is because that server is too busy to respond to your request. 

Bummer for you because you “connected” so the “blank” answer counts.    

Don’t confuse a “blank” answer with the “wrong answer” though. 

There are a number of reasons why a server might provide you with what it thinks is the right information but it’s not what you were looking for. 

The address is in the middle of changing and the server hasn’t updated its copy (cache) with new information being the most common.

Can’t Access a New Subnet Through The VPN?

December 16, 2014/0 Comments/in Managed IT /by James Wagner

Can’t Access a New Subnet Through The VPN

A VPN (Virtual Private Network) is a way to securely connect two locations together across the internet.

In this case, we’ll be discussing a Lan-to-Lan connection between two offices.

Lan-to-Lan Connection

Your office is expanding and you’ve run out of IP’s.

You consult your network architect and decide to create a separate subnet, Virtual LAN (VLAN) or zone for a group of machines (e.g. a new floor or a development group).

You and the network architect get the new zone up and running and test the connectivity to the servers and internet successfully.

All is good.

A while later one of the staff on the new subnet tries to access a device at a remote office (say a printer) but it fails.

You check from the server and everything works fine.

When you try and ping the device from the machine it doesn’t respond.

You traceroute it and see that it goes out to the internet instead of through the tunnel.

Why?

The routes are all correct.

You can ping the firewall so you know it’s getting to the right location.

Why won’t it go to the remote branch?

Answer: You forgot to change the VPN tunnel to allow the new subnet to pass to the remote location!

Did you remember to add the new network to the tunnel?

Why do you need to do that?

The VPN tunnel works by matching both the source IP and destination IP to see if it needs to encrypt the traffic.

This match is done against an access control list (ACL).

If the VPN can’t match both sides it ignores the connection and lets the firewall handle it on its own.

Just having a route from the new subnet to the firewall is not enough.

How do I fix it?

In this case, you have “old subnet” connecting to “remote subnet” and you’ll need to add “new subnet” connecting to “remote subnet” to the existing tunnel ACL.

Remember to do this on both sides or it won’t work (you have to allow the traffic on the remote side to come back!).

The resultant ACL will contain instructions for “old subnet” connecting to “remote subnet” and “new subnet” connecting to “remote subnet” (reverse on the remote end).

The user can now happily access the remote device because their IP matches the local end and the destination matches the remote side – the traffic is encrypted and the device is reachable.

How do I modify my VPN tunnel to add the new subnet?

There are so many versions of firewalls that I couldn’t possibly go through them all here.

We would recommend contacting your support vendor for assistance.

Page 22 of 22«‹202122

Categories

  • Asset Management
  • Azure
  • BDR
  • Business Continuity
  • Cloud Hosting
  • Cloud Security
  • Compliance
  • Cybersecurity
  • Dental IT
  • Disaster Recovery
  • Email Security
  • Energy IT
  • IoT Security
  • Legal IT
  • Managed IT
  • Mobile Device Management
  • Multifactor Authentication
  • Network Assessment
  • News
  • Office 365
  • Security Alert
  • Small Business IT
  • VCIO

Pages

  • Accounting Firms & Accountants
  • Blog
  • Business Assessment
  • Careers
  • Clients & Achievements
    • Kemp Orthodontics
    • The Power of Partnership – Wood Group
  • Cloud Services
    • Business Continuity & Disaster Recovery (BCDR)
  • Construction
  • Contact
  • Cyber Security Calgary
  • Email Security
  • Healthcare Clients
  • Hosted Services
  • IT Services Calgary
  • IT Services FAQ
  • Legal Firm
  • Managed IT Services
  • Managed IT Services in Calgary
  • Microsoft 365
  • Microsoft Azure
  • News
  • Oil & Gas
  • On Demand IT Services
  • Privacy Policy
  • Security Awareness Training
  • Small and Medium-Sized Enterprises (SMEs)
  • support
  • Terms Of Service
  • Thank You
  • When is Your Business Ready for Managed IT Services
  • Why setting up a business in Calgary Is a Good Idea
  • Your ITeam

CONTACT US

Sales:
Phone: (403) 750-2540
Email: sales@theiteam.ca

General Inquiry:
Phone: (403) 237-7750
Email: info@theiteam.ca

Service & Support:
Phone: (403) 750-2525
support@theiteam.ca

FIND US

The ITeam IT Support Calgary
Suite 200, 1210 8 Street SW
Calgary, AB T2R 1L3
(403) 750-2540

Office Hours:
Monday to Friday: 8AM to 5PM
(Mountain Standard Time)
IT Support Calgary The ITeam $$ (403) 750-2540 Calgary, AB
5

stars

"The ITeam provides peace of mind with high level security and superb customer service." - Jeff B.

OUR SERVICES

  • Managed IT Services
  • On Demand IT Services
  • Hosted Services
  • Clients & Achievements
LinkedIn | FB | Twitter | Instagram
Privacy Policy
Copyright © 2020 The iTeam.ca | All Rights Reserved
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OK

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Accept settingsHide notification only