Checklist For Your Next Network Design

 

“Which model of access point is best for us?” “How do I ensure everyone will have a solid internet connection?” There are lots of important questions which need to be considered first before getting to the details of your new network design and equipment.

Here is a checklist of items that need to be addressed before the hardware question to ensure your organization gets a network that meets its long-term needs, and to help avoid unexpected costs and delays. It applies to most wireless and wired technologies, including WiFi/WLAN, cabling, point-to-point and point-to-multipoint.

1. Coverage – Where do you need coverage today and tomorrow? Provisions should also be incorporated into the design for likely coverage expansion in the future. Identify any hard-to-cover areas such as tunnels or underground, which may require special treatment.

2. Applications and Devices – What is the wireless network going to be used for? Particularly note the traffic type and bandwidth requirements. Also identify any specific features which may be required.

3. Capacity – What assumptions are you making for number of users and required bandwidth? A spec sheet that boasts “up to 200 simultaneous users” for a single access point doesn’t make any commitments about the quality of the end-user experience. Good analysis here will ensure that the wireless network delivers when you have 10 users and also when you have your anticipated peaks of 200 users.

4. Redundancy – How truly critical is this wireless network to your operations? If it is truly mission-critical then the architecture needs to sustain and self-heal through the failure of an individual switch, link or access point. Expect increased cost for this comfort.

5. Power – What are the power sources for this wireless network? Again, depending on your tolerance for downtime, you may need UPS power backup for multiple hours or days, or to bridge to generator power. Be sure to examine power loads for proper sizing, and if DC or AC UPS will better support the network.

6. Security – What security requirements does your organization or network demand? It may be PCI for financial transactions, AES for public safety and others, or something more industry specific.

7. Environmental – Where are the various network components going to be? Select appropriately hardened gear if outside or in areas inside exposed to water, dust, etc. And lastly, watch for unique mounting requirements so problems don’t surface in the installation stage.

8. Network integration – What will the network be connected to? Wireless networks almost never live in isolation. Determine how it will connect and interoperate with existing networks. Will there be new carrier requirements for Internet access, and, depending on the network type, how will users and devices be authenticated?

9. Spectrum – What is the optimal frequency choice(s)? Depending on the network type, investigate approval requirements for the wireless network for licenced spectrum like 4.9GHz or 700MHz for public safety, or 1.8GHz for utilities, or any of the narrowband frequencies in VHF/UHF/800MHz. Even licence-free spectrum like 900Mhz and 2.4GHz requires frequency planning.

10. Monitoring – How will the wireless network be monitored when it is operational? Determine your monitoring requirements to avoid network downtime, detect security breaches and have the data for capacity planning.

Zarr Tech understands that the foundation for a successful wireless network is a disciplined design approach. This should include documented requirements, definitions, site surveys, staging, acceptance testing, and installation and commissioning procedures.

The Zarr Tech Team includes professional engineers and seasoned technical service staff that is Cisco Meraki authorized and able to handle any network size and complexity. Contact us at 1-800-324-0372 to see how we can help you implement the right network for your company.

Let Zarr Tech Manage All Your Technology Vendors

With the increasing role of technology in our everyday lives and the vast amount of technology vendors that exist, it can be very challenging to choose the right vendor and maintain a relationship with them. Not all vendors or technologies are created equal and their products, services, prices and customer service levels will all vary extensively.

Doing the research to see which vendor is the best fit for your company’s needs can be extremely time consuming. Most companies deal with several vendors and to get the best out of your technology, you need to separate the champs from the chumps. That’s where Zarr Tech comes in with our vendor management service. We save your time by doing all the research to select only the best technology vendors and keep up to date with all their newest products and services. By already knowing your company’s goals, we manage the best technology vendors for your company’s specific needs.

 

We are very selective when choosing which technology vendors to work with. One of the first things we look for is if the vendor is knowledgeable and committed. What is their expertise level? Are they willing to do whatever it takes to provide you the best solution and be there when you need them most? Can they back up their claims with proven results? A lack of technological knowledge can prevent you from knowing if you are working with a knowledgeable technology company or if they’re taking you for a ride. For instance, if you need your printer fixed and the printer service company tries to upsell you, then they’re not serving you; they’re using you. If they can’t distinguish between their needs and your needs then you are working with the wrong company. When working with Zarr Tech, we’re dedicated to focusing on your needs and find technology vendors that can apply the same dedication.

 

One of the biggest benefits of using Zarr Tech to manage your vendors is the single point of contact. If you use multiple vendors for multiple solutions you already know how difficult it is to communicate with so many different account reps. By taking advantage of our vendor management, we’ve already built up the relationship with only the best vendors so we know that you’ll be getting the best customer service and pricing from them and us. This is especially important when you are having an issue and need to deal with product support. By having Zarr Tech handle all communication with the technology vendors, whenever you need assistance you will only have to deal with our friendly professional team.

 

At Zarr Tech, we take pride in becoming the only IT vendor you will ever need to call. We provide vendor relationships to meet your technology needs and work to get you the best solution at the best price. Give us a call at 1-800-324-0372 to equip your business with the best service possible for your company’s technology.

Email Safety – Best Practices

How to avoid Malware, Phishing, Viruses and More!

Even with all the communication methods available in 2017, there’s just no replacement for email. It’s still the standard communication method for almost every company out there and will likely continue to be for years to come. This is why email safety education has become crucial for any business.

Today’s cyber criminals have become very crafty in their methods to make phishing or malware emails look as legitimate as possible. The emails they send can look just like it comes from a trusted financial institution, e-commerce site, government agency, or any other service or business. As data collected by companies become more and more valuable, scammers are looking to get their hands on it – and turn a profit.

To help your company avoid malware, viruses, and ransomware sent via email, we’ve put together a list of email safety best practices:

 

  1. NEVER Open Attachments from Unknown Senders

This one is easy, but most of us are quick to hit the open attachment button on any email, especially if it looks important and creates a sense of urgency. Take a minute to confirm who the sender is and if you’re unsure, you can contact the company directly using information on account statements or through a Google search.

  1. Don’t Click on Suspicious Links

This one goes hand in hand with not opening attachments from unknown senders. You should always be careful with any email from an unknown sender. Hyperlinks can easily lead to direct download pages for executable files, infected Word documents, or other sources of malware or viruses.

  1. Never Share Personal Information in Emails

Phishing is an attempt to obtain sensitive information such as passwords or credit card details by pretending to be a trustworthy individual over email communication. Cyber criminals may pose as IT workers, coworkers or superiors and may say you need to reset your password and request personal sensitive information. Never share personal information like passwords in emails, and be very suspicious of any email asking you to do so.

  1. Change Your Password Regularly

The easiest way to prevent cybercriminals from attacking your data and systems is to change passwords. Passwords should be changed at least once every month or two. If your IT team has no standard for doing so, consider implementing them.

 

Need to Secure your Email Systems? Contact Zarr Tech at 1-800-324-0372.

 

We are located in Oakville, Ontario and offer comprehensive managed IT services. If you’re in need of some IT consultants to increase the cyber security of your systems, don’t hesitate to give us a call. Cybercriminals are not going away, so let Zarr Tech help you protect your company’s invaluable data.

“WannaCry” Ransomware 101

May 12, 2017 saw the largest global cyber attack in Internet history. The “WannaCry” ransomware attack wreaked havoc on over 300,000 computer systems around the world in over 150 countries. Typically, ransomware spreads via email as spam or phishing attacks and relies on human intervention to infect more computers. WannaCry is different because it combines ransomware with a recently stolen vulnerability that allows it to infect and spread to thousands of unpatched computers via the internet.

As a small or medium sized business owner, you may think you have nothing to worry about because most media coverage has been highlighting large companies such as FedEx, Telefonica and the NHS in Britain. However, this type of threat does not discriminate based on company size so any organization with an internet connection is at risk.

The consequences for an infected business can be devastating. This includes temporary or permanent loss of sensitive information, disruption to business operations, and/or potential costs to restore systems. Businesses should adapt a business continuity plan if they have not already. While this can’t prevent an attack altogether, it can ensure a fast and complete business recovery.

What else can your business do to protect against and prevent such an attack?

One of the most important steps to take is to backup your data. As a general rule, you should always be backing up your data anyways with a strategy such as the 3-2-1 rule:

  1. Have at least 3 copies of your data
  2. Keep these backups on 2 different media
  3. Store 1 backup offsite

Not only will this protect against a ransomware attack, but you also just never know when your system will crash, a building will burn down, or an angry employee tries to intentionally destroy data to harm your business.

Beyond backing up data, businesses should:

  • Ensure all anti-virus, anti-malware and firewall solutions are updated and set to regularly conduct scans
  • Apply the Microsoft patch for the MS17-010 SMB vulnerability dated March 14, 2017
  • Scan all incoming and outgoing emails to detect threats and filter executable files from reaching end users
  • Educate all employees on how to identify scams, malicious links, and any attempted social engineering ploys

WannaCry has slowed down drastically over the last couple days, but new versions have been detected and these types of attacks are constantly evolving.

If you have been hit with ransomware or have any questions or concerns on how to get protected, please do not hesitate to contact your IT advisors at Zarr Tech.

We are available by phone at 1-800-324-0372.

Skype for Business Now Available on Your Mac & Smartphone!

Does your business run on Mac? Have you ever wanted to video chat with a colleague or friend? Now you can with the help of Skype and Microsoft!

Enjoy the ability to share content, video chat and conference with 3 or more participants from the comfort of your office or home. With the updated version of Skype for Business there have been many enhancements made to the mobile and desktop app. Including the ability to now present PowerPoint files or video chat on the go or at a local coffee shop.

The tech behind this feature is called, (VBSS) which stands for Video Based Screen Sharing. Users will now be able to setup their devices faster and enjoy a clearer picture and audio transmission. During our tests we found the connection to making a call was very fast and held HD quality for the entire call benefiting everyone included!

Make sure to keep your eyes and ears on Microsoft and their mobile app development as they look to adding more enhancements to their Skype for Business Mobile and desktop platforms such as, call-kit integration. Not a user already? Visit Skype for Business Apps and Downloads for the apps and experience a mobile professional day!

Your trusted IT advisors at Zarr Tech are mobility experts and with the help of technology we can turn your business into a stronger and more mobile workforce.

Contact us today for more information or to get started with our free 60-minute IT consultation.

As always we are available by phone, 1 800 324 0372.

Choosing a Hard Drive Data Recovery Service

Recover your dataBusinesses of any size have come to depend on its data. In many ways, it is the basis for how a company operates. Threats to this data are imminent, and protecting data becomes a top priority for any business if they hope to prevent any serious setbacks to its operations. However, when security measures are breached, having dependable data recovery services becomes your next line of defence in preserving your data.

There are ways to get basic data recovery services from some computer stores. And that may be fine for individuals who are looking to retrieve family pictures or documents saved to their laptop. But for businesses who rely on its data as an essential part of running their company, basic data recovery is not enough. You require a high level of data recovery service to ensure that your business is protected and you can carry on operations as usual.

Dell Hard Drive Data Recovery Service

Hard drive failures are something businesses shouldn’t necessarily expect, but should certainly prepare for. Zarr Tech is able to implement Dell recovery services for all clients who want to be prepared should a hard drive failure occur. This can happen as a result of many different circumstances, including some kind of flooding or office fire, as well as technical issues. Read more

Why Are Companies Hiring Managed IT Service Providers?

managed IT servicesTechnology has infiltrated the workplace and forever altered the way business is conducted. This has pushed IT to the forefront of any business operation, forcing companies to find ways to keep up with the rapidly evolving nature of technology. But for many small businesses, attempting to keep up with the changing technology can prove costly, and not keeping up even more so. The solution for many of these businesses has been to utilize managed IT service providers.

What Does “Managed IT Service” Mean?

Businesses want to always be on top of or ahead of the game when it comes to the implementation and usage of technology. However, they also must consider cost, particularly if they are a small- or mid-sized business. Managed IT services allows for businesses to take advantage of all of the services they would receive should they employ a full time IT professional, but they get those services at a monthly rate. Read more

Should You Upgrade to Windows 10 Now? – Pros and Cons

Windows 10It was just last year that Microsoft introduced Windows 10, its latest operating system (OS). For those operating on Windows 8.1, this meant the option to upgrade to the most recent version and all the frills that come with that. But upgrading to Windows 10 isn’t necessarily mandatory; at least it hasn’t been traditionally. And everyone has his or her own preference when it comes to which system he or she like best or is most comfortable with.

With this version of Windows, Microsoft has been a bit more insistent about users upgrading. They have made the OS “recommended,” meaning the files are automatically downloaded to user’s hard drive, although permission must still be given to accept the end user license agreement (EULA) which starts the installation. With that said, there are reasons for and against immediately upgrading to Windows 10. Read more

Advantage of On-Demand IT Tech Services for Small Businesses

tech support servicesBusinesses nowadays fully appreciate the need and importance of IT. Even for small businesses, the role of IT is vital to the success of their company. And even though they may not have the resources to hire full-time IT staff, the importance of being able to manage IT doesn’t diminish.

For small businesses looking to still efficiently manage its IT, on-demand tech support is an effective option. In addition to saving on costs, on-demand tech support also has many different benefits. Read more

Understanding Managed IT Services for Local Businesses

 Managed IT Services for Local Businesses There’s a lot of talk around what seem to be the new buzzwords in IT: managed IT services. But much like any other word or phrase that becomes popularized, it takes on varying meanings. To be clear, managed IT services is defined as offloading certain IT operations to a service provider.

The scope of these operations may include security, data backup and recovery, and other infrastructure needs. Regardless of the operations being offloaded, the service provider becomes responsible to supply ongoing monitoring of the systems as well as to resolve any issues that may arise. Read more