Are Hackers Hiding Behind Your MSP?

Managing your own IT can be a time-intensive and unrewarding task, and when your business requires maximum focus it’s a hindrance to have to constantly check on the health of your network, your hardware, and your cyber security. Small wonder then, that the first thing that most business owners do when things start to get busier is to retain a Managed Service Provider (MSP) to take care of things for them. Handing over your IT to a support provider can be wonderfully liberating, and should you be paying for all the bells and whistles, you can rest easy that your network is solid, protected from all the cyber-nasties out there wanting to get hold of your valuable data. Right?

Well, Maybe Not.

It’s worth remembering that MSP’s are businesses themselves, and they should by rights be making sure that they are doing as good (or better) of a job protecting their own systems and networks as they do yours. After all, these are the guys to whom you’ve just handed the keys to your (and your customer’s) digital kingdom, so it’s best to make sure their vaults don’t open on both sides as it were. Sadly, many MSP’s can be guilty of trying to maximise their margins by managing your network with cheap – and sometimes wildly inappropriate – software, data storage, or remote management systems. If you have a managed network, it’s worth checking with your current or future MSP whether they are running potentially vulnerable management software, as this could leave you wide open to a cyberattack if they are not secure.

Vulnerable… What?!?

RMM (Remote Monitoring and Management) platforms are cloud-based systems that allow MSPs and IT admins to sign into an account and monitor or control entire networks of endpoints running remote agent software all from a central cloud dashboard. For just one MSP, this could be several hundred customer networks, running thousands of machines. All those businesses under your control… it’s a great deal of responsibility, so you only give your network into the care of those that are competent enough to take care of it properly. Sadly, it’s sometimes not enough to take an MSPs’ competence at face value, as however hard they try, their RMM (or another mission-critical software or hardware solution) may not be as secure as they, and by extension you, might think.

In the case of one major platform provider, SolarWinds, there have been massive breaches and zero-day attacks on their Orion IT management suite, first in 2020, and in July of this year, potentially exposing huge numbers of MSPs worldwide to cyberattack. In the July hack, likely perpetrated by a group of Chinese hackers dubbed ‘Spiral’, there was a vulnerability in the platforms file-sharing application, which resulted in the hackers being able to gain access to machines and networks connected to the platform.

Does It All Check Out?

It's vital to do your research, and there is always a very strict routine to follow when retaining the services of a platform provider, especially if you are responsible for other people’s networks in addition to your own. You should always check that the platform is certified for use on the networks and systems you will be using it on, that the provider has a strict, definitive, and above all, regular policy of applying updates, that their platform supports Multi-Factor Authentication, and if their platforms are notorious for being vulnerable or having significant outage. This should help keep the number of unauthorised access attempts to your, or your customers’, networks to zero.

Our Promise

We would just like to reassure all our customers – past, present and future – that Pearce IT uses no software or management systems provided by SolarWinds, and that we only touch your network with the most stringently tested and approved software and Remote Management and Monitoring systems.

We take the security of our clients very seriously, so if you’re looking for a strong partner to help you to protect your network, please get in touch with us today.

Disaster Prevention and Recovery

Running a business today often relies upon a huge amount of data. Whether that be data about clients, employees, contracts or financials, most, if not all, of this information will be stored and tracked digitally.

Suddenly losing access to all that information is a panic-inducing possibility that doesn’t bear thinking about for most business owners, but it’s essential to ensure your organisation has strategies in place should disaster strike. Developing these strategies can be a complex process, and the range of services available can each offer their own set of benefits and downsides.

One of the first steps to take is to get an understanding of the different threats and points of failure faced by your current IT systems. Several factors need to be considered; one clear point of failure is an IT systems vulnerability to power surges or fluctuations. Depending on the size of the business and the amount of equipment kept on site, different steps need to be taken to ensure any issues with power don’t lead to a catastrophic failure or data loss. Working via a cloud-based system that takes regular backups, like the service offered by Microsoft’s Office 365, can help solve this issue. Because data is stored remotely, it doesn’t rely on any one machine or network, and won’t result in data loss should a machine fail for any reason.

Cloud Services do vary by provider on how they protect data, and it’s worth double checking what each service guarantees as part of the deal, but it’s often part of the package for business clients that their data is stored with geographical redundancies in place. These redundancies ensure the data is protected in the event of emergencies on the client’s end, or even if servers fail in one of the providers’ data centres.

Another vector for potential disaster is the risk of a virus, malware, or ransomware attack. Cyber security threats can enter the system through an external source, often the internet, and cause immense harm to business infrastructure and its ability to operate effectively. Like the virus’ biological namesake, digital viruses can spread quickly throughout an organisation’s network, and there have been several horror stories in recent memory of large organisations having huge amounts of essential data held to ransom. In 2017, around 60 NHS trusts were hit with a version of the infamous ‘WannaCry’ ransomware, affecting healthcare professionals' ability to access patient records and other essential data.  

To maintain an effective defence against potential intrusions, it’s important to invest in reliable cyber security measures. There is a plethora of different anti-virus programs available, that differ in the exact safety measures and services they provide. Conducting a thorough evaluation of the specific needs faced by an organisation is useful in sorting through all the options. Making sure whatever choice you make is regularly kept up to date is also essential, as viruses and malware are regularly changed in order to try and circumvent security measures, meaning an out-of-date anti-virus program is almost as bad as not having any at all.  

Both the use of cloud services and anti-virus software are examples of preventative measures a business can take to safeguard data in the event of a disaster. While they are both important parts of the toolkit, they make up just single components of a wider disaster recovery plan. Some options can both serve as a precaution against a disaster occurring, while also playing an integral part in restoring operations to normality should the unfortunate occur. Any business, but especially those that deal with high volumes of sensitive data, should have a bespoke strategy in place to make sure any downtime incurred by security failures, data breaches or otherwise unforeseen circumstances is kept to an absolute minimum.  

If you want to talk to a professional team about how you can develop one of these plans or talk through some of your options for data security, contact the Pearce IT Team today!  

 

What Is Remote Monitoring and Management, and Do I Need It?

Having a faultlessly running IT infrastructure is a dream of every organisation, and the ongoing challenge that faces every single Managed Service Provider or IT department the world over. When you’re in charge of somebody’s network, there are many objectives and goals that vie for your attention every minute of every day; security, storage, software, internet access, and performance are all important individual factors, but the overarching goal for all IT professionals is to ensure that their network is running smoothly overall. 

Tools Of The Trade 

You simply cannot do this without certain tools, and the most important tool (and the one that usually sees the most use) in the IT pro’s arsenal is the Remote Monitoring and Management system, or RMM. This is a management platform that runs software agents installed on network endpoints. An endpoint can be any device - a server, workstation, laptop, even a tablet or phone – that connects to your network and essentially performs tasks. The RMM software monitors everything that happens on the endpoint; it has access to system logs, performance metrics such as system temperature, Hard Drive speed, memory and CPU usage, and is able to perform system tasks at an administrator level. It regularly checks in with a handler system – often a server in the cloud – which runs the management platform and collates all the reports and system messages from endpoints on networks it is monitoring. This is then presented via a sophisticated Graphical User Interface (GUI) to an IT professional responsible for the health of the network. 

It’s a two-way connection, meaning that at any point the IT professional can access your endpoints remotely, either overtly, with the knowledge and assistance of the user, or covertly, when the system is locked or there is no operator. Depending on the setup, there’s also the possibility of turning on systems remotely, completing tasks, then shutting down again. Remotely accessing a customer’s endpoints makes troubleshooting and repairing difficult software and system issues far easier. It’s far more efficient than attempting a fix solely over the phone, via email, and even in person, as RMM platforms seamlessly integrate with password management and antivirus software, so there’s no scratching around for logins, passwords and product keys - they’re all available at the click of a mouse. 

If there are clear advantages to break-fix scenarios for customers’ networks by using RMM software, then these are very much secondary when compared to the bonuses gained in preventing software and hardware issues. 

Prevention Is Better Than Cure 

RMM software is an incredibly useful tool for predicting when and where a network will fail, where the security holes are, and which machines are on their last-legs or in dire need of a tune-up. It can even show you which machines are running certain software, when that software was last patched, and how often launching that software creates problems for the rest of the operating system or indeed the rest of the network. Patching this software is a doddle and can be scheduled to be done out-of-hours or across certain parts of the network only. Installing certain patches and skipping others is also a feature of many platforms, keeping bloating of endpoints to a minimum. With scripting an option on many RMM platforms, entire user profile or software suite installs can be scheduled to run when a business is closed, or when a user signs-out for the day. 

Is There A Catch? 

So what are the downsides to having an RMM deployed on your network? Surely there are issues with having an all-powerful monitoring and management suite deployed on every machine in your network, silently collecting data and keeping a hidden eye on every task, click, and keystroke? Well, not really. If you’re worried about the security of your data, the depth of functionality of RMM software is completely adjustable when it comes to each network, and only you and the administrator, be they in-house or working for your MSP, can control the level of access and see the data that these systems collect.  

The More You Know… 

There’s always a place for refined data in keeping your network healthy, and in terms of system usage analytics, working out when you need to make changes to IT processes, or make purchases to replace ailing infrastructure or software, then RMM deployments are invaluable. If you’re interested in introducing an RMM system to your network, or elevating your service plan to include some of the more useful functionality of your existing RMM deployment, then get in touch with Pearce IT, and we can help you to make your network more secure and more efficient for a very low cost per-endpoint.  

After all, the more you know about your network, the more you can do with it. 

Review Your IT Strategy

Pearce Blog Banners (1).png

September’s finally here, and hopefully with it comes a little peace and quiet as all the kids go back to school. With a bit more serenity and time to focus, now’s the perfect time to look at your IT strategy and check it's doing its best for your business.

The pandemic shifted many of us to working from home, only visiting the office when necessary. Many businesses had some degree of infrastructure in place to facilitate this shift but might not have had the time to look at how it affects their overall IT strategy.

An important part of modern business management is ensuring your IT strategy takes full advantage of any available resources. If every employee is aware of and understands your IT strategy, it can go a long way towards achieving your business goals and getting the most value out of your business’ IT infrastructure.

So, what is an IT Strategy, and why do we need one?

As part of your overall IT Capability, your IT strategy document lays out your business’ ability to utilise its technological assets and skills effectively, to add value. One thing to keep in mind is that your IT strategy is a business document that should be able to be understood by any employee, not just those with a technological background.

Beyond meeting business needs and improving organisational processes, the purpose of an overarching IT strategy is to clarify your long-term goals and create a framework that can be referred to when making short or mid-term decisions. Almost all companies have been forced to make changes over the last 18 months, so your existing IT strategy might need adjusting slightly to maximise the technological capability of your business.

Now that children are back in school, focus on your IT strategy and evaluate how your needs might have changed since it was first implemented, or even whether you need to start from scratch!

To get started, there are a few key elements and principles to bear in mind when thinking through a new strategy or amending an old one. Firstly, the core principle of any strategy is to enable your organisation to meet its goals. It is important to directly reference these business goals and reorientate, where necessary, to support your overall vision. While it's easy to get dragged into the minutiae of software, tools, and pipelines, it’s essential to keep the end goal in sight.

One of the most straightforward ways of getting started is to perform an audit. By speaking to employees, customers, or anyone else involved in the process, you can find out which areas are hindering processes and can even gain some valuable insight on how to address those issues. It’s important to make sure all aspects of your current IT strategy and infrastructure are included in any audits; any progress made could become redundant if anything slips through the cracks.

If you want some help getting started with your IT strategy, or want a hand performing a comprehensive audit, contact Pearce IT Today!

Windows 11 Update

Pearce Blog Banners.png

Back in June, Microsoft revealed the latest version of its globally adopted operating system series, Windows 11. This came as a bit of a surprise, as Microsoft had previously touted Windows 10 as the final version of the software to be supported endlessly via regular updates.  

Supposedly, the new version was born out of a scrapped lite version of Windows destined for touch and multi-screen portable devices. Instead of going ahead with this mini or lite version, Microsoft has decided to roll the features designed for it into a major release.  

A few features were revealed in June, with several more being revealed in the following weeks. Microsoft is promising updates will be 40% smaller, hopefully a relief for those of us that put them off until the last possible minute!  

The user interface is one of the most obvious places getting a shake-up. The start menu has been moved to the centre of the screen, light and dark themes are available as default modes, and a rounded corner design has been adopted system wide. The taskbar is optimised for touch and other peripherals, as well as being centralised and renamed the ‘Dock’ in an ‘Apple-esque’ fashion. 

Microsoft is also promoting ‘Artificial Intelligence powered dynamic features’, enabling widgets to display different information according to the time of day, and which apps are currently being used.  

A much-needed improvement to multitasking features is coming too. Snap groups and layouts allow you to arrange multiple windows across the display, not limited to the side-by-side layout currently enforced by Windows 10, but in rows and columns too.  

Windows will also remember the arrangement of these snap layouts the next time you come back. This useful timesaver will hopefully yield a convenient boon for productivity. Multi-monitor support will also be improved and integrated to remember what apps were opened on a monitor when it is reconnected. 

Some more exciting changes are coming to the Microsoft store. Windows’ in-built media and app store is seeing a full redesign with some tighter content curation, to eliminate the high amount of low-quality, third-party applications that currently dominate the platform. Microsoft made a point of showing that popular apps like the Adobe Suite and Disney+ will be ready to go in the store on day one.  

One slightly more interesting development is the support of android apps like Tik Tok or Instagram, which will also be downloadable from the store. In line with the support of android apps are the improvements to the touch features, likely carried through from the earlier version of a touchscreen specific OS mentioned previously. 

Gaming fans will be pleased to note a welcome revision of the previously cumbersome Windows 10 Xbox app. The app will be replaced by a new Game Pass app, to integrate Windows more directly with Microsoft’s gaming subscription service. Players will be able to directly buy, manage and access games available on the service or through its affiliates like Bethesda and EA. Auto HDR and better full and widescreen support will also be welcome quality-of-life changes for gamers everywhere.  

It can’t all be good news though, and Microsoft has been under a little fire for making the required specifications too high for even some fairly recent machines. The earliest compatible CPUs listed on Microsoft’s website are only from a couple of years ago, but this doesn’t mean older processors won’t work at all, Microsoft has only officially validated more recent hardware.  

There are also, for the technically minded, requirements for UEFI, Secure boot and TPM. UEFI and Secure boot might eliminate some older machines from being able to run the new operating system, but the TPM issue is more complicated. In short however, most prebuilt systems from around 2016 should have a Trusted Platform Module already installed, whereas motherboards used for DIY systems are less consistent but have been increasingly included as standard since around the same time.  

Users of older machines without some of these features might be able to exploit some workarounds to access Windows 11, but many will stick to the familiar territory of Windows 10. The more adventurous users might be finally tempted to switch to a lightweight Linux distribution, well known for keeping elderly PCs on life support for a few more years.  

Should your current machine fall short of Windows 11 however, Microsoft has already stated that it will continue to support and provide security updates for Windows 10 through until 2025. Most of the advertised changes at the moment appear to be welcome benefits to productivity and quality of life. Windows 11 is expected to arrive on your screens this October. 

If you want a hand checking that all your gear will be ready to go when it rolls around, or you want to find out what the best option for your organisation is, get in contact with Pearce IT today! 

 

Green IT = Cheaper IT

Pearce Blog Banner (6).png

With a heatwave roasting the UK at the moment, people may have felt a stark reminder of the broader climate change affecting the planet. In an increasingly online and computer dependent world, a significant part of the changes needed to reduce our waste and power consumption must be felt by the IT sector. Tech companies are inarguably responsible for some contributing issues, from the energy expended extracting the raw materials, to the power we use to run machines on a daily basis.  


Many organisations in the IT space have begun to adopt ‘Green IT’ policies, with the aim of minimizing or eliminating the negative impact of IT operations on the environment. This could be attempting to switch to renewable power sources, offsetting carbon use through tree planting, or trying to increase the lifecycle of equipment.  


One of the most significant points of waste and pollution for the IT sector is the relatively short lifespan of the equipment used. An adage within the IT industry entitled ‘Moore’s Law’, named for the former Fairchild Semiconductor founder and later Intel CEO who thought it up, predicted that the number of semiconductors in an integrated circuit would double around every two years. In layman’s terms, the relative power of a computer would double in the same period, rendering machines produced just two years earlier obsolete. While Moore’s law is no longer realistically thought to apply at anywhere near the same rate to commercially available products, the industry has emphasised the importance of regular upgrades to consumers. Although, most daily computer users are unlikely to feel the benefit of regular, incremental upgrades outside of 3D graphics or other industry specific intensive tasks. Focusing consumer attention on upgrades rather than maintenance means a lot of machines have a lifespan of just a few short years and there are a phenomenal number of resources and energy spent on producing replacements.  


Companies like Apple have historically fought the ‘Right to Repair’ movement at every turn, only faltering slightly in the past couple of years. Recently the tech monolith started supplying repair outlets with parts, though some suspect this may only be an attempt to cut out the lucrative third-party parts industry they were growing increasingly jealous of. The EU have recently introduced legislation requiring manufacturers to facilitate the repair of their electrical goods for at least 10 years after coming to market. This will directly benefit consumers who wish to extend the lifespan of their equipment and hopefully reduce the colossal sum of resources used to produce new machines, as well as supporting a fast-growing circular economy of professional repair shops and second-hand markets.  


Here at Pearce IT, we’ve been dedicated to implementing Green IT policies for a long time. The telecoms section of our business managed to achieve carbon neutral status all the way back in 2012!  


One of the significant changes we’ve made to offset carbon is switching to electric vehicles. Though our traveling around might have been limited since the onset of the COVID-19 pandemic, electric vehicles still save a huge amount of carbon emissions through our day-to-day activities.  


If you’re interested in finding out more and want to know how you could offset your carbon footprint through more environmentally friendly IT practices, contact Pearce IT, call 01452 222000.

The fall in cost for telecoms

Pearce Blog Banner (1).png

The price of telecommunications for businesses is falling.

Many people who have standalone landline systems have seen their prices drop in recent years. In 2017, data usage over fixed connections grew by 44%, while data use over mobile connections increased by 46%. However, despite the widespread adoption of superfast internet, 4G, and the launch of 5G telecommunications networks in more recent years, average monthly spending on phone and cable services has decreased over the last decade.

Why have telecoms become cheaper?

The mobile phone industry is an excellent example of how to describe certain fundamental supply and demand principles. It demonstrates, for example, how advanced technologies and increased production will lower prices - even as demand increases.

Back in the early 2010s, few people had smart phones - even fewer relied on mobile devices to conduct day-to-day online business. Since mobile usage and the need for 4G access wherever you are has become a necessity rather than a luxury, prices have dropped to reach demand.

We understand that you want to protect your business, and one way to do so is to keep your expenses as low as possible. We will help you reduce the cost of your messages without sacrificing accuracy or functionality.

To give a comparison example, back in 2015 when 4G first made its big debut in the UK, a large plan-only sim deal with 10GB would typically start at around £32. Compare that to current deals and you can now easily get 10x the data at a fraction of the cost.

Even the physical side of telecoms has become cheaper. While the latest flagship models of phones still cost a lot, large phone companies now offer budget versions of their phones and significantly decrease the price of last year’s flagship; allowing more people to keep up to date with technology and making buying or leasing work phones more viable than in earlier years.

Why your business should take advantage of cheaper telecoms.

Telecoms keep people together; whether it is allowing workers to connect to each other while working remotely or needing a system in place to allow clients to have a secure point of contact that upholds the professionalism of your company.

Without a good telecom system in place, you end up losing out on productivity and waste time through tracking down missed messages from clients and colleagues. The past year has shown us how important proper communication channels are within the workplace. With more companies opting for permanent at home working or flexible working – so not all employees in a traditional ‘one office’ setting - having a telecoms system upholds productivity and is the backbone of remote working.

If you are a long-standing business, it is possible that your telecoms agreement has not been updated in some time. Unfortunately, many people stuck on old plans will not be offered the latest deals and are missing out on these cheaper options. That is why it might be time for you to evaluate your current telecommunication systems and see if you could be saving money by upgrading to a new plan.

What Pearce IT can do for your telecoms.

Pearce Telecoms understands that you need more than just a decent internet connectivity, telephony connection, and network convergence. You must still be able to communicate with your clients and friends no matter where you are or what you need.

The modern business is never still. The business world is a fast-changing and fast-moving environment, and you will often need dependable connectivity on-the-go or in remote locations. Because of this we understand how important your telecoms are and that you want to ensure you have the best plan for your business at the best price. To keep your expenses as low as possible whilst retaining a high quality of product.

We will assist you in reducing the cost of your telecoms with our amazing sim plans and phone leasing contracts. Providing you with a variety of mobile packages to fit your needs and keep the teams chatting and open, no matter where they are.

Pearce Telecoms offers consultation and cost review services to ensure that you are having the right product and price with your money and company needs. We have dual sim and phone offers to accommodate any company size or need, offering limitless calls, emails, and data, ensuring that your employees are still linked. Whether you are after Apple of Android, we can provide you with leasing opportunities to outfit your workers with the hardware needed on a variety of contracts.

Get in touch with Pearce Telecoms today for a telecoms audit and to see what deals would suit you best, call us on 01452 222000.

Why should you care about your cyber security? 

Pearce Email Banners (4).png

Cybercriminals are getting more advanced. From choosing their targets, to the tactics they use to attack various security systems, it’s easier than ever to fall victim to a cybercriminal’s activity.  

Social engineering is still by far the most successful form of cyber threat, with ransomware, phishing, and spyware being the most common entry points. Third-party and fourth-party suppliers that handle data and have weak cybersecurity policies are another prominent attack route, emphasising the importance of vendor risk management and third-party risk management. 

Cybersecurity is critical because it includes everything related to securing our confidential data, personal identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and business information systems from misuse and destruction by criminals and adversaries. 

 

How could cyber-attacks affect you? 

 

A lack of emphasis on cybersecurity will harm your company in a variety of ways, including: 

  • Economic costs – intellectual property theft, business identity theft, trading chaos, and the cost of replacing broken systems. 

  • Costs of reputation – consumer dissatisfaction, loss of existing and prospective buyers to rivals, and inadequate media attention. 

  • Regulatory costs – because of GDPR and other data breach rules, the company can face regulatory penalties or punishments as a result of cybercrime. 

GDPR and other regulations have made cybersecurity unavoidable for companies across all sizes. Security issues threaten enterprises of all types on a daily basis and often make the front page, causing permanent reputational harm to the firms involved. 

 

How to protect against cyber threats: 

 

Two factor authentication: 

 Two-factor authentication (2FA) is an additional step added to the log-in phase, such as a code sent to your phone or a fingerprint scan, that helps verify your identity and prevents cybercriminals from accessing your private details. 

2FA is a subset of multi-factor authentication, which is an automated authentication mechanism that allows a person to verify their identity in several forms before being granted account access. Two-factor authentication gets its name from the fact that it needs a combination of two factors, whereas multi-factor authentication requires more. 

An ATM card is a clear example of two-factor authentication in the real world. To enter your account, you must not only physically display the card, but also type in your PIN. 

 2FA gives that extra sense of security – it’s just that much harder for someone to access your accounts illegitimately. 

 

Why do I need 2FA? 

 Passwords have traditionally been a poor form of protection on their own due to the sophisticated nature of hacking as well as the general frustration of password formation and usage. According to a Harris Poll, 78 percent of Generation Z uses the same password for different accounts, raising their potential risk if a thief figures out their passwords. Furthermore, almost 23 million accounts still use the password "123456." 

Adding an extra step to account entry makes it more difficult for hackers to access your personal information. If you apply a knowledge attribute to your bank account, a cybercriminal who knows your secret would be unable to enter the account until he or she has your phone when the authentication code is sent. 

In addition to this, it is easy to accidentally type your password into an illegitimate site, so even if your password is hard to guess there is still a chance someone could get their hands on it. Also, many large companies experience data leaks and breaches during which time your password information is vulnerable. So 2FA helps to protect your accounts between the time of the breach and you being notified to change your passwords. 

 

Antivirus protection: 

 Antivirus software is intended to track, deter, and react to malicious software in your device, such as viruses – it is an integral component of a successful protection policy. 

Antivirus programmes run in the background and scan any files you access, comparing it to suspected viruses and other forms of malware, helping you prevent them from infecting your computer. Device scans are also performed by the programme to ensure that no viruses are inactive on the server. If your antivirus programme detects a virus or other malware signature, it can interrupt the file from running and place it in quarantine, where it can either uninstall it automatically or you may opt to run it if you are sure it is a false warning. 

Antivirus security is critical for any company who wants to keep its data and operating infrastructure from being compromised. Antivirus software acts as a security guard at the entrance, blocking intruders from entering. Since prevention is much more successful than treatment, it is preferable to have a mechanism in place built to track and deter virus attacks rather than spending time and resources fixing them. 

 

If you need some more guidance on upping your cyber security and ways to protect yourself from cyber-attacks and cyber-crime, get in touch with Pearce IT today! 

Can IT be green?

Pearce Larger banners.png

Large companies are, indisputably, at the heart of many environmental issues and need to make big changes to their sustainability as soon as possible to help combat climate change. And many have already done so.  

But with so many large tech companies going green, shouldn’t smaller IT companies, like ours, follow suit? 

Pearce IT has, for a long time, been committed to being a sustainable and environmentally positive company: 

Our telecoms gained carbon neutral certified status back in 2012 

Our hosted services provide energy efficient IT options for our clients 

Tech is a large contributor to environmental issues, from energy usage to polluting waste and manufacturing techniques.  

So how can tech companies improve and go green? 

One major way that large companies can reduce their carbon footprint is to offset it with positive actions, such as planting trees or making the big switch to green energy.  Renewable energy is, of course, the ideal way to reduce the carbon footprint of any company and the goal that we should all be striving towards. 

Here at Pearce IT, one of the ways we reduce our carbon footprint is by using electric vehicles for all of our customer visits. Before lockdown, we were on the road a lot, visiting clients, going to meetings etc.. Even now that we are limiting our in-person interactions to help prevent the spread of COVID-19, the amount of carbon emissions that we save by using electric cars over diesel or petrol is significant and helps to balance out our company’s carbon footprint.  

Whether you have already made steps to reduce your carbon footprint or not, there is always more we can be doing.  

If you’re interested in finding out how you could cut down on your emissions through effective and more environmentally friendly IT solutions, get in touch with Pearce IT today! 

Hosted Desktops - Keeping your Team Connected

Pearce IT keeping you connected.png

With restrictions and guidelines in a state of constant fluctuation, figuring out the most appropriate IT solution to use for your business can be difficult. Trying to accommodate staff working from home, along with essential work that must be carried out in-house, can cause issues in a business’ workflow as people manually transfer data between various laptops, PCs and tablets.  

An all-inclusive cloud system to keep your employees connected wherever they are and allowing for a quick and easy transition to home working in the event of future lockdowns is an ideal solution. 

What are the benefits of a hosted desktop, cloud solution? 

The facilitation of agile working solutions is a large benefit of the deployment of a hosted desktop solution. It not only allows employees to be versatile when they work, but it also makes it easier for situations where location flexibility is required, for example – working with a phone, tablet or laptop whilst out of the home or office. 

An increase in productivity can often be seen with the implementation of a good, hosted desktop service. Users spend less time sharing files between devices and machines, as well as having automated back-up processes for their files, which frees up more time for important work. 

With more and more companies opting to make the switch to working from home permanent, rather than in-office work, they are not necessarily providing a dedicated desk for individual employees anymore. A hosted desktop solution would allow your organisation to utilise hot-desking, enabling staff to remain linked to their own desktop wherever they log in, with everything they need and are familiar with at their disposal. 

The benefit of a desktop hosted solution is that it is optimised to work with any computer. This makes the investment in a desktop hosted solution less of a risk, as it will remain in place regardless of any future changes in IT hardware and will continue to work efficiently and can easily be developed in-line with your business’ growth. 

You can be assured of the best data security precautions. 

Some people are worried about not having their data on a physical machine that they have access to. The idea of entrusting all of their data to the cloud is daunting and they have concerns over data breaches and cyber security. 

A hosted desktop provides you with a user-specific desktop that is freely available anywhere you need it. Only UK data centres are used to host the hosted desktops. 

You can rest assured that your data is in safe hands as security is the number one priority for the data centres that are used and, with disaster recovery and business continuity built into our solution, you can be sure that your desktop will remain fully accessible wherever you are. 

Also, as those of us in the IT industry know full well, a vast amount of security or data issues are not malicious and can be put down to simple user error. So, on top of other security measures put in place, our hosted desktop comes with 365 days of backups that you can restore your data back to, should you accidentally delete those important files. 

Is a hosted desktop solution worth investing in? 

Many people are concerned about the cost of using hosted desktop services, particularly those with small businesses. It is often assumed that hosted desktops worth it only when you are purchasing the system for tens to hundreds of users. 

On the contrary, not only is getting a Pearce IT Secure Desktop flexible in price and can be installed from as little as 3 users, but it is also easy to manage and upgrade, keeping your hosted desktop running fast, no matter it’s age. 

For both hardware and software, hosted desktop solutions provide extra security. You are protected from data breaches when work phones, tablets or laptops are lost during commutes or onsite working, as physical data is not being stored directly on the device. Backed up and stored data on hosted desktop solutions are protected by more advanced security measures than most in-house systems might have. A Pearce IT Secure Desktop is a cost-effective solution to provide your staff with flexible working, whether they are working from home, the office, on site or from any other location. For users, a Pearce IT Secure Desktop is almost indistinguishable from a local desktop on their computer. In fact, the only real difference to a local desktop is that any data accessed or stored by the user is done so via the hosting platform rather than the device itself. 

If you’re interested in learning more about the Pearce IT Secure Desktop and how it could benefit you and your business, get in touch!