QuoStar achieves Microsoft Solutions Partner for Modern Work

Microsoft Solutions Partner for Modern Work - QuoStar

QuoStar is proud to announce its achievement of the Microsoft Solutions Partner for Modern Work designation. As Microsoft retired its Gold and Silver competencies in 2022, this new designation signifies our commitment to helping clients enhance productivity and successfully navigate the shift to hybrid work using Microsoft 365. By becoming a Solutions Partner for Modern Work, we have demonstrated our expertise through training, accreditation, and the delivery of transformational solutions that drive client success.

What Does It Mean for Our Clients?

Being recognised as a Microsoft Solutions Partner for Modern Work means that our clients can trust us to provide comprehensive services and solutions that enable them to thrive in the digital workplace, delivering:

  • Boosted Productivity: We offer deployment and modern management services for Microsoft 365 services , ensuring that our clients can leverage the latest technologies to enhance productivity across their organisations. With our expertise, our clients can streamline workflows, optimise resources, and empower their workforce to achieve more.
  • Enhanced Communication and Collaboration: We specialise in implementing and driving the adoption of, Microsoft Teams, , and Microsoft Teams Rooms solutions. By leveraging these powerful tools, our clients can foster effective communication and collaboration among their teams, regardless of their physical location. We help them harness the full potential of Microsoft Teams to improve productivity and foster a connected work environment.
  • Empowered Frontline Workers: QuoStar is dedicated to digitally enabling frontline workers. We deliver tailored services and solutions that equip these essential employees with the tools they need to excel in their roles. By leveraging Microsoft technologies, we empower frontline workers to access critical information, collaborate seamlessly, whilst  enhancing their  experience, resulting in improved operational efficiency and satisfaction.
  • Enhanced Employee Experience: Leveraging Microsoft Viva’s suite of services, we help our clients deliver exceptional employee experiences. We enable organisations to create engaging digital environments that enhance employee well-being, knowledge sharing, and professional growth. Our expertise in Microsoft Viva ensures that our clients can build a positive and inclusive workplace culture that attracts and retains top talent.
  • Tailored Solutions for Unique Needs: Our team of experts collaborates closely with clients to understand their unique challenges and design tailored solutions that streamline processes and drive innovation. Our ability to tailor our solutions ensures that our clients receive a personalised service that aligns perfectly with their business goals.
  • Certified Professionals: At QuoStar, we invest and take pride in our team of certified professionals. Our engineers have achieved prestigious certifications which highlight our team’s extensive knowledge and expertise in Microsoft technologies.

“QuoStar’s achievement of the Solutions Partner for Modern Work designation underscores our expertise in leveraging Microsoft technology and empowering our clients in the modern workplace. This recognition further strengthens our position as a trusted partner, enabling us to unlock the full potential of hybrid work environments. We are excited to continue tailoring innovative solutions that enable our clients to drive their business growth and thrive in today’s digital-first world.”

Dominic Lloyd, Head of Microsoft Partner Relations at QuoStar

Conclusion:

QuoStar’s achievement as a Microsoft Solutions Partner for Modern Work marks our unwavering commitment to helping clients succeed in the evolving digital landscape. Through our expertise in deployment, management, collaboration, and custom solutions, we empower organisations to boost productivity, enhance communication and collaboration, digitally enable frontline workers, and deliver exceptional employee experiences. Our recognition as a Solutions Partner for Modern Work is a testament to our dedication to training, accreditation, and delivering impactful solutions that drive client success.

Ready to Speak to an Expert?

If you’re ready to embrace the power of Microsoft solutions and drive your organisation’s success in the modern workplace, we invite you to get in touch with our team of experts.

Contact us today to schedule a consultation with a Cloud Expert.

Beyond the buzz: The impact of AI on the Tech industry

Artificial intelligence (AI) is the buzzword of the moment. It’s hard to browse any tech-related news site without seeing the latest development, product or service related to AI. But how is AI really impacting the tech industry?

The Rise of AI-Powered Products and Services

One of the biggest impacts of AI on the tech industry is the rise of AI-powered products and services. From digital assistants like Siri and Alexa to machine learning algorithms that can predict your shopping habits, AI is everywhere. Microsoft 365 Copilot is a great example that showcases the immense potential of AI to enhance user experience and increase efficiency. By using the power of large language models (LLMs) and integrating it with source data across all Microsoft 365 apps and services, Copilot promises to transform the way individuals engage with their tasks by turning user input into a powerful productivity tool.

Other tech giants like Google, Amazon, and Facebook are also investing heavily in AI-powered products and services. Google has made significant advancements in natural language processing, while Amazon is using AI to improve its supply chain management. Facebook, as another example, is using AI to improve its content moderation capabilities.

 

 

The Future of Work and the Role of AI

AI is going to have a significant impact on the future of the workplace, not just how we work and interact but how we leverage technology to coordinate, plan and accomplish our goals.  Whilst AI isn’t going to take your job, perhaps the user that harnesses it more effectively will.

The World Economic Forum has estimated that by 2025, AI and automation could replace 85 million jobs, whilst also creating 97 million new ones. It feels inevitable jobs will be replaced by AI-powered services over time and the nature of remaining jobs will change, and in turn new jobs will be created.

We expect there will be shifts similar to the changes seen with other major technological advances such as the invention of the printing press, telephone or the internet.  Shifts which will require new ways of thinking about skills and training to ensure users are prepared for the future and that there is enough talent available for critical jobs. As AI becomes more prevalent, companies need to adapt by investing and deploying new technologies effectively, retraining their employees, and creating new roles to work alongside AI.

Responsible AI

While AI has many potential benefits, there are also ethical considerations to consider.

Implementing a responsible AI strategy is a challenge many organisations struggle with – ensuring that AI models do not perpetuate biases or discrimination based on race, gender, age, or any other protected characteristic is a key consideration.

AI relies on vast amounts of data and it’s essential that this data is kept secure and private. It’s particularly important that businesses prioritise data privacy and security, ensuring that user data is protected and used responsibly in compliance with relevant regulations and laws.

Businesses should also consider the potential implication of replacing human workers with machines. While some jobs may be lost to AI, new jobs will also be created. However, it’s important to consider the social and economic impacts of this transition.

Statistics

It’s clear that AI is already making a profound impact on the tech industry. As an example, ChatGPT gained a million users in just five days after its launch in November 2022, as reported by OpenAI. This app has now become the fastest-growing app in history, with over 100 million users estimated to be using it. The recent data from Similarweb also reveals that chat.openai.com has received approximately one billion visits in the last 30 days, highlighting a significant interest in AI-powered communication. It is worth noting that the effectiveness of AI-powered tools largely depends on the quality of the data inputted; accurate and timely business data is crucial for achieving the best results.

Conclusion

AI is rapidly changing the way we work and interact with technology, and its impact is being felt in every aspect of our lives. The proliferation of AI-powered products and services is just one example of this transformation, and as users, we are embracing these new technologies at an unprecedented pace. While AI cannot do everything for us, it can undoubtedly improve task efficiency and effectiveness. As an example, ChatGPT was responsible for proofreading and copywriting most of this article.

As AI continues to evolve, it’s important for companies to stay ahead of the curve, invest, and adapt to the changing landscape.  At QuoStar, we understand the importance of keeping up with the latest technological advancements, and we are committed to sharing insights and helping our clients leverage these technologies to achieve their business goals.

The Power of AI - Stats by MS

Source: Download a copy of the infographic.

Why Privileged Identity Management (PIM) is critical for businesses using the cloud

"Privileged accounts are a prime target for cybercriminals..."

Privileged Identity Management (PIM) is an essential security practice for businesses using the cloud. It focuses on securing and managing privileged accounts and access rights within an organisation. In this blog post, we will explore the importance of PIM for businesses, particularly those using the cloud, and why every business should consider implementing it as part of their comprehensive cybersecurity strategy.

What is PIM?

PIM refers to the processes, policies, and technologies used to manage and secure privileged accounts and access rights within an organisation. Cybercriminals often target privileged accounts as a means of gaining access to sensitive information and systems. PIM aims to reduce the risks associated with privileged accounts by providing a central solution for managing and securing these accounts. It involves identifying, managing, controlling access, and monitoring privileged account activity.

Importance of PIM for Businesses

Privileged accounts are a prime target for cybercriminals, and a breach can result in severe consequences, including data theft, business disruption, and reputational damage. PIM is essential for businesses because it helps to mitigate the risks associated with privileged accounts. By implementing PIM, businesses can control who has access, monitor, detect and respond to suspicious behaviour, and reduce the impact of a breach if one occurs.

Why Every Business Using the Cloud Needs PIM

Cloud computing has transformed the way businesses operate, providing flexibility, scalability, and cost savings. However, the cloud also presents new security challenges, particularly when it comes to privileged accounts. Cloud environments typically have many privileged accounts that can access critical resources, making them attractive targets for cybercriminals. PIM is especially important for businesses using the cloud because it provides a central solution for managing and securing privileged accounts across all cloud services and platforms. With PIM, businesses can identify and manage privileged accounts, enforce access controls, and monitor activity. Implementing PIM in the cloud can also help businesses to meet compliance requirements.

Conclusion

PIM is a critical component of a comprehensive cybersecurity strategy, particularly for businesses using cloud computing. By implementing PIM, businesses can manage and secure privileged accounts, control access to critical resources, and monitor privileged activity. PIM can help to reduce the risk and mitigate the impact of a breach if one occurs. Every business using the cloud should consider implementing PIM as part of their cybersecurity strategy to protect against the growing threat of account breaches.

If you’d like a member of QuoStar’s consulting teams to assess your risks and advise on potential controls, without obligation, please contact us.

QuoStar and AFC Bournemouth host engaging Digital Stars Workshop for Junior Cherries

This week, QuoStar and AFC Bournemouth held an engaging and interactive Digital Stars workshop at Bournemouth University for the Junior Cherries, the club’s junior membership.

The event was aimed at promoting the importance of technology, while also highlighting career opportunities in the IT industry and encouraging gender inclusion.

Insights on Technology and Safe App Usage

During the event, Austin Brannigan, Systems Manager at QuoStar, provided valuable insights on the significance of technology and safe app usage. The participants also had an interactive session playing a game called CyGamBIT, which aimed to help young people stay safe online.

The Digital Stars workshop also sought to encourage gender inclusion and promote diversity in the IT industry. According to Tech Nation, only 26% of the tech workforce in the UK comprises women.

Q&A Session with AFC Bournemouth Players

At the start of the masterclass, participants were pleasantly surprised by a Q&A session and photo opportunity with AFC Bournemouth Defender Jack Stacey and club legend Steve Fletcher. Their presence added to the excitement of the event and provided a unique opportunity for the young attendees to engage with professional footballers.

QuoStar’s CEO, Robert Rutherford, commented:

“We are proud to have partnered with AFC Bournemouth and Bournemouth University to organise this great event for the younger generation in our hometown. Our Digital Stars interactive workshop aims to strengthen our relationship with the youth in our local community, introduce them to the world of technology, and promote responsible usage. At QuoStar, we recognise that the IT industry isn’t as attractive as a career as it once was, and is still predominantly male-dominated, which is why it’s important for us to promote the opportunities for everyone whilst highlighting the advantages of pursuing a career in IT.”

Dr Jane Henriksen-Bulmer, Principal Academic in Privacy within the Department of Computing and Informatics at Bournemouth University:

“It is really important that industry, academia and schools work together to help young people learn more about IT, so it’s great to bring all sides together at this event. Studying a degree in IT will help young people build a viable sustainable career with graduates in this type of degree typically achieving a higher starting salary than many other degrees.

“We can also use these partnerships to help young people navigate the online world safely. We created CyGamBIT to encourage conversation and understanding of some of the risks they might be exposed to in the online world and what young people can do to stay safe online.”

Steve Cuss, Head of Community at AFC Bournemouth:

“We value all our partners greatly and I would like to thank QuoStar and Bournemouth University for all their help with this event and their continued support. IT plays a really important part in everyday life and the more we can educate and inform young people how best to use it, the better they will be equipped for the world of work.

“It was great for the youngsters to hear from Jack Stacey about education, how important it is to continue your studies and to always look to improve yourself. We know he’s just finished doing a degree and when you hear it from a Premier League footballer, it’s really impactful.”

At QuoStar, we are committed to promoting technology and inspiring the next generation of IT professionals. By hosting events like the ‘Digital Stars Interactive Workshop,’ we hope to encourage young people to explore the opportunities available in the IT industry and pursue careers that align with their interests and skills.

 

Six reasons for the rise, and rise, of IT outsourcing

Six reasons for the rise, and rise, of IT outsourcing

 

IT outsourcing has been rising exponentially.  

Pre-Covid, the main driver for outsourcing was cost reduction. Many small and much larger businesses used a third-party provider to keep the IT lights on under a flat cost arrangement, typically based on the number of users supported.  

Medium sized businesses often had their own internal IT teams, outsourcing small elements of their operations, from a one-off project to a specific area of security, to a third-party.  

Post pandemic, the motivations for using an external IT service provider have changed dramatically. The last year or so has seen outsourcing become essential to most organisations’ operations and wider business strategies.  

A new generation of outsourcing partners are helping deliver the enhanced service levels and top and bottom-line improvements that businesses need in a post-pandemic world. 

 

Here are six reasons why: 

 

1. Speed of change 

Most organisations are transforming at pace, to meet the needs of their clients and win market share.  The rate of change means that many IT teams cannot keep the lights on from an IT operations perspective and handle the volume of strategic and systems focused projects that are thrown their way.  

In-house IT teams are often much better focused on delivering strategic projects, while a trusted IT partner manages day to day IT operations as an extension to the team. 

 

2. Talent shortage 

The worldwide shortage of IT talent includes the UK. This has led many organisations and service providers to outsource overseas to meet demand.  

The pace and volume of change in terms of transformation projects post-pandemic, along with a lack of new IT sector talent has created a crisis. There were more than two million UK job vacancies in tech in 2021, more than any other labour area. 

 

3. Security  

Businesses face a perfect storm of rapid transformation, skills in global shortage, and a fast-growing cybersecurity risk landscape.  

IT teams within organisations are seeing pressure from all sides, which is a tough place to be. Many are leaning on their IT service providers to take responsibility for elements of cyber security, be it day to day security operations, compliance, or governance overlay.  This gives an organisation comfort that a third party is providing checks and balances and is making sure that what needs to be done from a security perspective is done. 

 

4. Too complex 

The race to the cloud and between cloud, the rise of cyber-crime and swathes of transformation projects have made IT environments complex. Arguably more complex than they were prior to the cloud boom. However, most IT departments have not had the budget, talent, or experience to keep up with the demands placed upon them.  

Partnership-focused IT service provider relationships, with the skills and experience these bring, help to augment their own.  

 

5. Enhanced value 

Many older, larger IT service providers have usually delivered flat cost savings based on labour savings. This type of flat service outsourcing, if done correctly, will realise straightforward cost-savings, especially as talent and experience wane.  However, a new generation of dynamic service providers are helping businesses to not only control costs, but also enhance their operations, deliver strategic initiatives, boost their digital transformation capabilities, introduce automation, and Lean initiatives. 

 

6. Competition 

Local, national, and international competition has amplified in most sectors. The largest value gains now are typically driven or supported by some form of digital transformation.  This had led businesses to lean on IT service providers to keep operations secure and available while the IT team focus on business and digital transformation projects. 

Whichever way this use of external and internal IT support is married, augmented teams are invaluable in the current national and international business landscape. 

 

Would you benefit from a review of your IT strategy and support?

For an assessment of your business operating maturity level contact us here

How to safeguard your cyber insurance cover – and your business

The risks of – and the potential fallout from – a cyber-attack is enough to keep any company director awake at night. 

The costs of a breach can be huge, costing UK enterprises an average of £4.09 million per breach, according to IBM’s Cost of a Data Breach study.  

These figures are not surprising when you consider lost productivity and revenue, response, forensics, recovery, communications, data breach fines, and various other costs. Even a company with 100 employees can be looking at hundreds of thousands of pounds, just to get back to where they were before an event, such as from a ransomware attack.  

Together with the significant reputational damage that can follow a data breach, the level of risk and likelihood means that most organisations have some form of cyber insurance to cover these substantial costs.  

 But as the number of cyber insurance pay outs grows, insurers are looking at ways to not pay out, or at least not for the full amount of damage. This is understandable in cases where a board has been negligent and not managed the risks, just as a motor insurer would not pay out where a driver had failed to get an MOT or put road legal tyres on their car.  

Your responsibility to control risk

All cyber insurance providers expect policy holders to take responsibility for evaluating and mitigating risks.  

Insurers expect best-practice cyber security controls to be in place, which typically includes the ‘absolute basics’ such as Cyber Essentials. This also means keeping on top of security operations year-round, not just a tidy up and certification every year or so. 

If the basics are not in place at the time of a breach, then many insurers will not pay out. On top of this, the ICO and other regulators are likely to hand out significant fines. These amounts aren’t insignificant, as the ICO alone can hand out a data breach fine of £17.5 million, or 4% of an organisation’s total annual worldwide turnover, whichever is higher. 

Cyber security basics should be viewed as seriously as other risk controls in your business, such as a fire alarm that is regularly serviced and tested. 

Common cyber security measures

For a cyber liability policy to pay out in a breach scenario you need to check the small print.  However, here are common areas that are going to have an impact on any claim: 

Patches and Updates

  • Firewall Protection – IT equipment must be protected from unauthorised access by a suitable firewall. The firewall needs security updates and other updates at least once a month, if not automatically. An insurer will almost certainly not pay out if the firewall is not up to date at the time of a loss.
  • Software updates –It’s best practice to patch and update software and it is a standard cyber insurance term to mitigate known vulnerabilities. Important updates to firmware, operating systems, and other software must usually be installed within 14 days of being released by the vendor or provider. Some insurers will insist on seven days, which can be a tough clause to manage in some environments, so keep an eye out for this.
  • Tablets, phones, and other devices – It’s important that tablets, phones, and any other devices with access to your network are updated or kept off the corporate network. Your organisation is responsible for who and what connects to its network. If your network is breached from an insecure work or personal device, then your insurance could be void. 
  • Outdated operating systems – Outdated operating systems and software that is no longer supported by the vendor in terms of security updates is going to invalidate insurance if they are breached. 

Users and Passwords

  • Change default passwords – If you have default passwords or use the password that came with an IT device when it was purchased, then your policy will be invalid. There are large databases on the internet that list all these default passwords, and these are always a go-to for hackers and automated attacks.
  • Individual ID and password –It can be common for some users to share logins and passwords to certain systems, and for conference room PCs to have shared logins. These shared credentials are unacceptable as they are a common cause of a breach. It also makes the source of a breach difficult to trace.
  • Limiting access – System users should only have access to what they need, particularly logon credentials with enhanced security rights, such as administrator rights. It’s particularly important that users don’t have administrator rights on the device they log in to as that’s an easy way for an attacker, who may be an employee, to gain control of a machine and then the wider network and systems. Organisations will need to prove that administrator accounts are controlled and that passwords are changed regularly.
  • Work laptops should be controlled – Only authorised users should be able to use work devices. This will need to be controlled via policy and login restrictions. An employee’s child downloading and installing a game with ransomware on to a work device could lead to the insurance being invalidated.

Data Backup

Cyber insurance policies will always cover the backup and protection of data. They will typically include: 

  • Two copies of backup data at different locations – It’s standard to expect two separate copies of backup data to be stored. One can be local to the IT environment, but another should be taken or backed up off-site, such as on a cloud backup platform. It’s increasingly common for insurers to ensure that backup data is air-gapped, so if someone gains access to your systems, they cannot get access to the backups. It’s common for ransomware attacks to seek and encrypt backups quickly.
  • Frequency of data backup –It’s usual to backup data daily, if not continually, in most modern IT environments. If your data is critical, then an insurer would want to know why you have not backed-up regularly. 
  • Backup checks – It’s critical that you regularly evaluate your backups to make sure everything that needs to be is backed up. It’s even more critical to ensure that your backups are working as expected. Many systems will send automatic alerts, but it’s still worth doing a manual check and restore every now and again.
  • Virus Protection –Cyber insurance terms typically state that anti-virus software should be in full and effective operation at the time of a loss. It should also be noted that many insurers are now asking that businesses have at least EDR (Endpoint Detection and Response), which is a typically more advanced antivirus solution, supported by a specialist organisation. In fact, it’s generally considered a security basic now, as antivirus was 20+ years ago.

Pre-existing problems

Cyber insurance will not pay out if you are aware of, or ought to have reasonably known about, a pre-existing issue, prior to the cyber insurance being taken out. This is particularly important if you’ve had security audits undertaken in the past but not dealt with any issues highlighted. Too often organisations know they have issues but still take out insurance as a way of mitigating spend on security controls. This is a bad idea. 

Previous breaches

If you’ve been breached before it will impact your insurance, as there could always be something waiting to deploy at a particular time, or a hole left in the environment. You must declare if you have had a breach, usually over the last three years. 

What can reduce premiums?

There are key areas that can make a real difference to your cyber insurance premiums and your security posture, such as: 

  • Multifactor authentication, particularly for remote access and administration accounts 
  • Privileged Access Management (PAM) 
  • Endpoint Detection and Response (EDR)
  • Secured, tested and encrypted backups 
  • Email filtering and web security 
  • Patch and vulnerability management 
  • Cyber incident response planning and testing 
  • Cyber security awareness testing and phishing testing 
  • Security Information and event management solutions 
  • Vendor and supply-chain risk management 

All the above are sensible security controls that should already be in place in organisations of all sizes. 

How do I know if I have the right controls in place?

If you would like a no-obligation audit, please contact us to sign up for a Cyber Maturity Assessment or Cyber Risk Assessment.

QuoStar celebrates record growth in 2022

We’re delighted to be celebrating another record year of growth at QuoStar, which includes developing the business across the UK and more than doubling our revenue.

With milestones including an impressive 40 new clients brought on board in 2022, revenue growth of 109% and 32 new people welcomed to the business, we are very pleased that the hard work and commitment of the whole QuoStar team has paid off.

In the last 12 months, we have taken more strides to expand the company across the country. In addition to our established Bournemouth and London offices, we have opened new premises in Leeds and will be announcing another location soon.

Our continued commitment to helping clients boost their business efficiencies and gain a competitive advantage was also reflected in our latest feedback survey, which showed an industry leading 99% client satisfaction for the fourth year in a row.

Other highlights of the past year included the announcement of our new partnership with AFC Bournemouth for the 2022/23 season. With many of our staff being big supporters of the Cherries, it has been a pleasure to work with the IT team at AFC Bournemouth to ensure cyber security is embedded in the club’s day-to-day operations.

Giving back to our communities is important to all of us at QuoStar, and we were happy to help raise £50,000 for regional charities close to our hearts, including Wessex Cancer Trust, AFC Bournemouth Cherries Community Fund, Dorset Mind, Lewis Manning Hospice Care, and MYTIME Young Carers.

QuoStar CEO Robert Rutherford said: “The last year is a clear example of what a committed, and talented team living genuine values and working in real partnership with colleagues and clients can deliver – for everyone. I’m genuinely excited knowing we’ve got bigger and better things coming in 2023, all revolving around delivering business outcomes to our clients, whilst also providing real opportunities for our teams to showcase their world-class capabilities. Onwards and upwards.”

2022 Record Year

Why preparing for a blackout is critical

Preparing for blackouts blog

 

Planning for power blackouts has been low priority for many businesses over the last couple of decades, because power supply has been good.

But we now know there is a good chance of at least one outage this winter, despite government and energy suppliers doing what they can to keep supplies in place.

If your business has not already prepared and communicated a blackout continuity plan, then time is of the essence. Failure to have a plan could be negligent in the event of an issue and regulatory bodies are unlikely to be impressed.

Assessing risk

You need to review your risk register and continuity planning to raise the likelihood of power outages. Part of this should include evaluating all key assets and making sure these are all logged.

This will affect your risk score and the focus needed in these areas but will help you contain the prospect of an even bigger problem in the future.

Blackout preparation

  • Check your communication plan is in good shape and agreed with your IT team.
  • Test an outage if you have not done this in the last 12 months.
  • Power down a whole office, if possible, to check on any gaps.
  • Make sure that every IT device has a warranty and support contract in place.
  • Get broader business buy-in to the business continuity plan.
  • Establish senior management responsibility for:
    • Communications
    • Any lack of spend against key security controls against defined risks
    • Understanding how the business operates in each scenario

Remote workers

The increase in remote working since the pandemic could make the loss of power at employee homes a disruptive and costly problem.

If energy supplies are diverted to major business districts and away from residential areas at set times, remote working could become difficult. This is a likelihood in a supply-issue scenario.

Ensuring that employees keep their laptops on charge may seem like an answer but is useless if their broadband router has no power. Trying to connect from mobile hot spots could also prove unworkable if everyone in that area is doing the same.

An agreed process for blackouts at employees’ homes should be in place. It’s important to have agreement on what people do in the event of an outage, such as how long to wait before finding an alternative work location.

Workplace capacity

If you have a dispersed workforce, check whether you have office space to accommodate everyone during a power outage scenario.

If space is not sufficient, options include partnering with other organisations on other grids to allocate space. It’s unlikely that your people will be able to go to a coffee shop or hotel to work as the chances are that these will be already full.

Many larger businesses have diverse power feeds from different grids. If you do not have this, you may want to look at the options and consider the cost vs impact.

For office-based IT equipment, consider having two firewalls, two routers and redundant switches. One of the biggest fears of power outages and turn-ons is losing a key element of a network, which can take a whole office down.

Protect against spikes

The big worry of power switching on and off is that this can blow electronic devices, such as switches, routers, servers, storage, and firewalls.

Devices like these should be on UPS devices, to protect against spikes and to shut down any remaining on-premises server environments that may still be in place.

It’s important to ensure that all UPS devices have current warranties and have been load tested to ensure they have enough run time to shut down equipment gracefully.

Home workers also face the possibility of power outages and turn-on spiking equipment. To mitigate against this, you should keep spare wireless routers and laptops to push out to employees at home. Although the loss of a home router is not the employer’s fault, it is still a problem if employees are unable to work.

Supply chain

Evaluate your supply chain. You need to understand how power outages may affect your partners and suppliers and in turn, your business. Check that suppliers have clear plans for dealing with power outages and ask for this in writing if possible.

You should also speak to your energy suppliers and ask for written confirmation of what could, will and will not happen if supply difficulties occur.

 

For a free review of your Business Continuity and Disaster Recovery plan, contact us.

An airtight DRaaS and VMware Cloud solution

With 39% of UK businesses identifying a cyber-attack in the last 12 months and around one in five (21%) of these reporting a sophisticated attack such as a denial of service, malware, or ransomware¹, most of us know just how essential Disaster Recovery (DR) is.

Being proactive in protecting digital data and customer assets is no luxury when you also consider these cybercrime risks in the context of increased remote working and assets that are dispersed across locations.

Cloud-based DRaaS (Disaster Recovery as a Service) is a cost-effective, fast and airtight route to this protection.

We are now VMware Cloud and DRaaS verified

QuoStar has VMware Cloud and DRaaS verification across our next generation private cloud platforms. This can help you to safeguard valuable assets quickly and effectively against the disasters that carry a real risk to your applications and infrastructure.

Tailored to your VMware environment

By designing a DRaaS solution specifically for your VMware environment, we can give you peace of mind that your data is protected, without the need for capital investment or upskilling within your IT team.

This fast, efficient and secure disaster recovery solution, which can be from on-premises to cloud as well as cloud to cloud, gives you the benefit of:

  • Automated recovery and fallback
  • An RPO (recovery point objective) as low as five minutes
  • Reduced operating costs
  • In-house IT team freed up to focus on high-value projects

Fast, non-disruptive DR testing

Backups and disaster recovery need regular validation to ensure they will work when needed. Our cloud-based DRaaS solution reduces this risk with fast, clean simulated DR testing in minutes. This regularly scheduled testing, which is required for proper DR planning and validation, does not impact on your ongoing DR activity or IT team.

Protect collection of VMs (vApps)

The enhanced grouping and protection workflows within our service help to preserve recovery priorities and network configurations for virtual apps (vApps), eliminating the need for manual scripting and shortening RTOs.

Bandwidth monitoring

Our DRaaS solution gives you visibility into what DR is adding to bandwidth, which helps to troubleshoot latency issues. It also offers capacity reporting, identifying what DR is consuming in storage on the target environment.

Remove complexity and overhead

Working in partnership with QuoStar on a DRaaS and VMware Cloud solution gives you peace of mind that core DR operational work is managed and continually updated in line with regulatory and compliance mandates. It removes complexity and overhead from your organisation.

Neil Clark, Director of Cloud Services at QuoStar: “QuoStar obtaining both VMware Certifications (Cloud and DRaaS Verified) rubber stamps our commitment to building the best-in-class Private Cloud Platforms.

“QuoStar understands that cutting corners at this level can be catastrophic and, a lot of the time, holds businesses back from moving to the right cloud solution. By using an industry leading solution like VMware, we can provide the most reliable, highly performance and cost-effective solution to our customers.

“QuoStar’s private cloud is just one part of QuoStar’s multi-cloud solution, allowing our customers to benefit from the advantages of each cloud platform.”

Contact one of our Cloud specialists to find out more about QuoStar’s DRaaS and VMware solution.

_
Statistics: ¹ Cyber Security Breaches Survey 2022

How our Fortinet SD-WAN solution delivers security at scale

If your organisation is considering SD-WAN (Software-defined Wide Area Network), then effective networking and built-in security should be integral to your decision.

In partnership with Fortinet, QuoStar is one of 15 SD-WAN specialised partners in the UK. We offer a solution that achieves safer, more cost-effective and efficient SD-WAN implementation. Here’s how:

SD-WAN explained

With dispersed workforces, new digital tools and cloud adoption at an all-time high, many organisations are turning to SD-WAN. This virtual WAN architecture brings together existing internet connectivity options, such as MPLS, Broadband, DIA and LTE, to securely connect users to applications, while simplifying the control and management of this connectivity.

SD-WAN solutions help to remove complex and expensive routing, cut down on hardware costs and remove expensive MPLS networks. They can also greatly enhance access to Software as a Service (SaaS) and other cloud-based services and help to minimise downtime.

The issue

However, many available SD-WAN networking solutions have little or no built-in security, which can lead to organisations adding a range of disparate tools to address these risks. This increases capital expenditure, raises complexity and creates potential gaps for cyberattacks.

A fully integrated, secure SD-WAN solution is the best way to ensure effective protection, operational efficiencies, and on-going readiness for evolving network demands.

QuoStar’s SD-WAN solution

Working in partnership with Fortinet, who have been recognised by Gartner as a Leader in the 2022 Gartner Magic Quadrant for SD-WAN for a third year in a row, QuoStar’s SD-WAN solution brings extra security protection and enhanced performance to the existing benefits of SD-WAN. These improvements include:

  1. Protection at all edges

Native security for both on-premises and cloud-delivered services, to provide flexible, secure access for a distributed workforce working on and off the network. Unified orchestration capabilities further provide end-to-end visibility and control of the network environment.

  1. A world-class user experience

Our solution overcomes WAN impairments at all edges using our comprehensive self-healing SD-WAN as well as AIOps and Digital Experience Monitoring (DEM). There are no network slowdowns thanks to our purpose-built security processing units, and application performance is maximised with artificial intelligence and machine learning.

  1. Reduced costs and complexity

Significantly lower operational complexity and low total cost of ownership is achieved with converged networking and security. Our unified SD-WAN solution secures remote workers and on-premises users with consistent policies.

You should investigate SD-WAN if:

  • You’re a largely distributed company experiencing network problems.
  • You’re particularly vulnerable to internet outages.
  • Your internet connectivity costs need to be revaluated.
  • You want to simplify the branch architecture.
  • You’re in the market to affordably expand your company’s network.
  • Your company needs to scale quickly and easily.
  • You would like to enable reliable user experience on any transport with rich routing and advanced WAN remediation for self-healing networks
  • SD-WAN control and management across multiple locations is providing a challenge for businesses with IT resources facing skill gaps

Obtaining a Secure SD-WAN Assessment Report will give you unmatched insight into your current security posture and network activity. Learn more about your network by registering for a free assessment here.

Free SD-WAN Assessment