Month: May 2018

VPLS Nayra Toledo and Winnie

Thank You for Attending the VPLS Premiere of Solo: A Star Wars Story

VPLS IT Support Services and Managed Service Provider in Orange County and Los Angeles County

‘I’m going to be a pilot. The best in the galaxy.’

Last week, the VPLS teams were proud to sponsor another fantastic movie premiere: Solo: A Star Wars Story.

We’re happy to announce the movie premiere was a great success, thanks to an awesome turnout and our many wonderful guests. We hope you had a great time and we hope to see you at the next event. …

VPLS Cloud and Backup Services for Orange County and Los Angeles County

The Importance of Properly Backing Up Your Office 365 Data

VPLS Cloud and Backup Solutions in Orange County and Los Angeles County

IS YOUR DATA PROTECTED?

 

Fact: Over 50% of data loss is due to users accidentally (or maliciously) deleting essential data.

Over the past year, we’ve seen a great number of businesses switch over to Microsoft Office 365. Afterall, the product reduces the risk of downtime while still providing daily work essentials and documents. And while some basic safety measures may be in place, consumers often forget to include additional services to protect against data loss or data recovery solutions. …

VPLS and Drone in Orange County California Event

A Millennium Falcon Story: Cybersecurity and Drones

VPLS and Drone in Orange County California Event

 

May Cybersecurity Be With You…

With the VPLS Premiere of Solo: A Star Wars Story fast approaching, there is much hype about finally knowing the origin of Han Solo’s friendship with Lando Calrissian, as well as his companionship with loyal Chewbacca. However, it is futuristic technology such as the iconic Millennium Falcon spacecraft and the intelligent androids that really make the movie; they provide both support and transportation and they look so cool!

So what parallels can be drawn between the Millennium Falcon and our drone technology and cybersecurity?

To find how these two aerial AI-powered vehicles correlate, let’s travel to a galaxy (in a form of a VPLS blog) that is not so far, far away… …

Solo Star Wars 710x659

VPLS Premiere of Solo: A Star Wars Story

[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ custom_class=” admin_preview_bg=” av_uid=’av-5c004jq’]

A NIGHT AT THE MOVIES

 Join us and many other tech professionals for the movie-watching premiere of Solo: A Star Wars Story!

Thanks to an incredible turn out at the last VPLS Premiere for Avengers: Infinity War, we happily announce yet another fantastic movie premiere. Don’t miss this opportunity to watch one of the most anticipated films of the year. …

Difference Between Elastic and Scalable Computing

Difference Between Elastic and Scalable Computing

There are key differences between elastic computing and scalable computing which include various capabilities of a data center’s IT infrastructure.

What is Elastic Computing?

As we mentioned, elastic computing is the capability of a data center’s IT infrastructure to increase or decrease processing power, storage, bandwidth or other services as needed.

This means that your data center provider can dynamically increase or decrease the resources they provide to you based on your requirements at any given time. The ability of a data center to earmark the exact resources to meet your specific needs on-demand helps the infrastructure work at peak efficiency and enables the data center to be a true pay-per-use facility. This is an important financial benefit as it means that you pay for only the services and capacity you use and nothing more. The best use case examples of elastic computing can be found in the retail and e-commerce markets.

Retail Business and Increased Demands

Let’s consider a retail business that specializes in pool and beach-related products and supplies and an e-commerce site that sells toys during the Christmas season. The retail business sells most of its pool and beach-related products in the spring and summer. To meet the increased demand from the months of April through September, but not have to pay for resources which will go unused from October through March, the business utilizes a data center with elastic infrastructure capabilities.

This ensures that they can handle the increased load during peak months but can also reduce that expense during the other months, only paying for what they use. Similarly, the peak season for an e-commerce website selling toys is between Thanksgiving and Christmas. This short window of 4-5 weeks can see significant day to day spikes in website traffic. Even a few minutes of downtime or network instability can cause millions of potential customers to go to a competitor and the company will incur a significant revenue loss. Infrastructure elasticity can support these rapid sales spikes, increasing and decreasing day to day without negatively effecting performance or availability.

What is Scalable Computing?

Although we often speak of the scalability of applications, scalability also includes the ability to increase workloads on hardware and software within an already existing network.

Companies who regularly onboard new customers or welcome new employees will want to anticipate their expected growth over the next 6 months or a year so that resources are acquired and allocated in advance of their use. Scalable computing is typically broken out into vertical scaling and horizontal scaling. Vertical scaling is the ability to increase the capacity of an existing piece of hardware or software by adding additional resources without any decrease in performance. You can increase the capacity up to the limit of that piece of hardware or software. Horizontal scaling is the ability to scale out to handle the load of added users. Additional servers, software, and other resources may need to be added to an existing network. To implement effectively, it is important to remember that this will require anticipation of future needs.

Scalability and Elasticity is a Powerful Combination

As you can see, elasticity and scalability are two very different things. But, when combined in a data center environment like Evocative’s which is focused on efficiency and resource optimization, they deliver one powerful solution. Our clients can quickly and easily add and remove resources as their business grows or needs change and are able to take advantage of pay-per-use pricing, so they are sure to pay for only the services they use when they use them.

Evocative's Northern Virginia Data Center Benefits

Evocative's Northern Virginia Data Center Benefits

Why choose a Northern Virginia Data Center?

The interest in Northern Virginia as a data hub was built on a long history of wide-area network testing and the use of fiber optic cable by the federal government.

The development of this robust communications infrastructure has resulted in this geographic region becoming THE center for low-latency interconnection between Washington, D.C.-area companies and the nation’s fiber network backbone.

Frequently referred to as the Dulles Technology Corridor or the Silicon Valley of the East, government agencies and businesses in technology, financial services, telecommunications, aerospace, and other industries are seeking out data centers located in Fairfax and surrounding counties to help them drive their business. Benefits of selecting a Northern Virginia data center for your colocation needs include:

  • Little chance of natural disasters like earthquakes or tornadoes
  • Readily available and cost-effective power
  • Robust infrastructure and high-reliability connectivity
  • Strategic communications center on the East Coast of the United States
  • Key communications gateway to Europe
  • Minutes from Dulles International airport and Washington, D.C.

When we chose to expand our Evocative data centers beyond California, Arizona, and Texas, Virginia was a natural choice. What does our Reston, VA data center deliver for you?

Services for Your Specific Needs

Evocative helps businesses and organizations at every stage in their development. From startups looking to conduct testing in a lab environment to mid-size companies whose goal is to scale quickly, to enterprises who have outgrown their own data center and need a colocation facility that can guarantee uptime availability, our Northern Virginia data center can provide you with the specific services you need.

We pride ourselves on being a part of the local business community, with customizable services and a dedicated team on staff. What makes us unique is that we are able to a couple of local service and support with a national reach across the United States. Our services include colocation, managed IT, public cloud interconnection, private and hybrid cloud solutions, complex hosting, storage and security services.

Interconnection Everywhere

With companies working at the speed of business, you need access to superior network infrastructure and interconnection capabilities. Our Reston, VA data center provides a connection to the main cloud platforms and direct access to 15+ network carriers.

Our national footprint gives you access to Evocative data centers in Silicon Valley and the San Francisco Bay Area, Los Angeles, Phoenix, AZ and Plano, TX as well as all of the other major interconnection hubs.

Corporate Compliance

Our Northern Virginia data center, like all Evocative data centers, meets the rigorous security and regulatory standards of HIPAA, PCI DSS, SSAE 18, SOC 2 and ISAE 3402. This makes it the perfect colocation facility for regulated companies and government agencies across the region to accelerate their compliance requirements and reduce costs.

Request a tour of our Evocative Northern Virginia data center, or any Evocative data center, by calling us at 888-365-COLO (2656)

data breach IT Professionals Guide

Recover From a Data Breach, an IT Professional's Guide

The following is an IT Professional’s guide to helping your company recover from a data breach.

Control the Attack

As soon as you discover that your network has been breached or your company has been a victim of a cyber-attack, you must dig in and uncover how the attack occurred, if the treatment is still active, or if it has ended. Was the attack initiated through the internet? Did someone gain access to a database with an inadequate password or no password at all? Did an employee open an email attachment causing malware to spread across the company? Taking a calm, methodical approach to uncovering how the threat was implemented will help to reduce fears among employees and insure that business can continue while the threat is being contained and the steps put in place to eliminate it.

Evaluate the Danger and Data Affected

As soon as the threat has been identified and controlled, evaluate the amount and scope of the damage. This will help you gauge the next steps which should be put in place and the key personnel you will need to assemble to mitigate additional risks to your business. Here is a sampling of some of the answers you should uncover:
  • Who or what was behind this breach?
  • What types of data have been affected?
  • Where was the data stored?
  • What groups of people have been affected – employees, customers, others?
  • How many people have been affected (what was the scope of the attack)?
  • What kind of information was included – health information, financial records, etc.?
  • When did the attack occur and for how long did it go on?
  • Was the data backed up?
  • Was the data encrypted

3. Assemble Key Personnel

Before any breach takes place, you should have already selected a diverse group of staff members who will be your go-to team in the event of a data breach. They should be able to take control of the incident from every angle and be responsible for all aspects of the remediation plan. When an attack has been discovered, the team should be informed and assembled immediately in a conference room or via a video conferencing tool to learn the details of the threat and execute on their individual components of the plan. This group might include the CIO, VP of Sales, Director of Customer Care, the CMO and anyone else you feel is appropriate. They will work with each of their teams and across departments to reduce the impact on the company and customers. They will also be responsible for communicating updates internally and externally on how the remediation process is going and providing information on how a similar breach will be prevented in the future.

4. Communicate

Your communication plan should include three key components – communication to employees, communication to customers, and communication to the media.

Communication to Employees Following a Data Attack or Breach

You will have a number of technical and non-technical personnel working on the aftermath of this attack, assessing the situation and uncovering what has happened. Assumptions, rumors and inaccurate information can spread like wildfire across the company. Your internal employee communications plan may be directed by your company’s CEO or CMO and should strive to put employees at ease by keeping them updated on exactly what has happened, what you are doing to correct the situation, if any of their information has been affected and what policies and procedures are being put in place to prevent the attack from happening again. It is also important to inform your employees that they may receive calls or emails from customers asking about the situation. Educate your employees on what they can say and what they should not say. You may want to provide your team with a brief statement that they can use but suggest that any additional questions should be forwarded to a more senior member of the staff such as the CEO, CMO, Vice President of Sales, etc. In addition, reporters, bloggers, and journalists often bypass the media wall which companies put up as soon as an attack has taken place and reach out to inexperienced salespeople or technical support representatives who unwittingly answer reporters’ questions. They then find their comments spread across the internet. Be sure to inform all employees that if they receive a phone call or email from any member of the media, they should immediately turn that request for information over to the CMO, PR agency or other assigned spokesperson. This key contact will provide a company approved answer which is appropriate for public distribution.

Communication to Customers Following a Data Attack or Breach

It is critical to implement an incident response strategy that will address how you will communicate with your customers. You will absolutely need to reach out to them if you discover that their personal information has been compromised. But, what is your responsibility to keep them informed if their data has not been affected? As soon as word gets out that your company has been impacted by an attack, customers will call, asking for the details and wondering if their information is included. Will your company get out ahead of those calls, pro-actively letting them know what has occurred and that no customer data has been threatened? Other questions to consider are:
  • How quickly will you send the first communication to customers and how will it be done – via email, an online landing page, a secure customer portal?
  • In addition to the standard communication, will you call your largest or most important customers to personally discuss what has happened?
  • Will you communicate to all customers or only those you believe to be affected?
  • How frequently will additional updates be made available?
  • What procedures have you put in place to mitigate any future the risk to your customers?

Communication to the Media Following a Data Attack or Breach

As we mentioned above, any hint that your company has suffered an attack will prompt members of the press to inquire about what has happened. You should be prepared for this and be ready with a vetted and approved answer which can be provided to them by your company’s spokesperson. Reporters know that they will most likely receive a “canned” statement so they may attempt to receive additional information by reaching out to other departments who are not experienced at speaking to the media. As previously stated, be sure to inform your employees that they should turn all press questions over to your spokesperson who has been approved to speak on your company’s behalf.

5. Prepare for a Breach Before It Occurs

In the case of a fire or natural disaster, we often wonder how first responders remain so calm and focused and can take control of the situation. Their answer is always, “We prepare for it. We train over and over again so that when an incident does happen, our training takes over and we immediately spring into action.” Although a data breach does not have the same life or death implications, your company should train regularly to spot a potential threat, react appropriately to it and execute your plan to eliminate it. This could include ensuring that all equipment is secure, regularly implementing software updates and patches, educating employees on new cyber threats, and confirming that key members of your management team understand their roles and can immediately come together to execute on their responsibilities.

Conclusion

All companies, whether small businesses or large enterprises are at risk for a data breach or cyber-attack. In this electronic age, there is no longer a question of if a threat will occur but when it will occur. It is critical to remember that is it not just the responsibility of your IT department to implement preventative measures and remediation procedures. It is a company-wide responsibility with everyone doing their part
8 Ways Artificial Intelligence is Driving Growth for Law Firms

8 Ways Artificial Intelligence is Driving Growth for Law Firms

Discover 8 ways artificial intelligence is driving growth for law firms.

1. Document Assembly/ Document Automation

To maintain efficiencies and increase the speed with which law firms can draft and provide legal documents to their clients, they are using AI-driven software applications to create complete documents based on client-provided data.

Document automation tools take the information provided directly by clients and insert it in the appropriate sections of legal documents, contracts, Non-Disclosure Agreements, M&A reports, employee handbooks and more. What could have taken days for an attorney or clerk to complete in the past, can now be produced in a few minutes?

2. Legal Analytics

Mining legal records with the use of AI provides the modern law firm with quick access to key insights and data that gives them a competitive edge. Legal arguments from previous cases, a judge’s history and insights on their rulings, as well as legal expertise and cases from other attorneys and litigants, can be analyzed to uncover patterns and determine trends in potential outcomes.

3. Legal Research

Law firms conduct days, weeks and even months’ worth of research for every individual case. Rather than doing tedious Google keyword searches, AI tools enable firms to enhance their keyword searches with cognitive computing to shorten the research period and increase the relevance of the information found.

Cognitive computing includes machine learning, reasoning, natural language processing, speech recognition, object recognition, and other technologies. These AI-based applications can quickly, efficiently, and effectively sort through mountains of electronic records and extensive databases to answer specific legal questions, conduct research, investigate issues and uncover links that might have gone undiscovered with simple keyword searches. This sophisticated legal research can save both the law firm and client a great deal of time and money on their specific case.

4. Predictive Technology

Law firms are continually evaluating ways to decrease litigation risk, improve decision-making processes, better manage individual cases and have a more accurate understanding of the legal outcome. AI-based technology uses predictive modeling to predict the outcomes of cases, their length, specific issues that will arise, and much more.

5. Due Diligence

Attorneys don’t simply take the word of their clients when it comes to preparing a case or legal document. They do their due diligence – performing the legal research, electronic discovery, and in-depth investigation needed to produce the actual data and background information necessary to deliver an informed and fact-based assessment to their clients on what decisions should be made or options which are available to them. Due diligence is often cited during contract negotiations, during the M&A process, in financial transactions, and contracts that require regulatory compliance. Proper due diligence can have positive financial implications for the client whose attorney has used these AI tools most effectively.

6. Contract Review

Lengthy contract reviews can limit how quickly business gets done and can cost clients a large amount of money. They know that hiring a law firm to review their business contracts is necessary but want it to be cost-effective, fast and as painless as possible. AI-based software is making long drawn out contract reviews, including the sorting of documents, summarizing the content and identifying important requirements or conditions a thing of the past by cutting the time to review contracts in half.

7. Intellectual Property

Mountains of intellectual property are created every day and attorneys have historically been required to wade through this data when conducting patent, trademark and copyright searches. Manual searches extend the application process, costing the client time and money. AI tools enable attorneys to complete the search process more quickly and comprehensively.

8. Electronic Billing

Billable hours are the lifeblood of any law firm, so its accuracy is critical to eliminate client questions, ensure ancillary services are not overlooked and time is reported and tracked down to the minute.

AI automates the billing process and reduces cost, the time to process the invoice and increases accuracy.

Conclusion Artificial intelligence is becoming the cornerstone of how the modern, successful law firm conducts business – benefiting both you and your clients. Not only will it enable your firm to improve operational efficiencies, reduce cost and increase competitiveness, but the time and cost savings you realize, as well as the additional insights you gain, will have an immediate and positive impact on your clients as well.

Evocative is a leading provider of secure internet infrastructure solutions, partnering with you to protect the interests of your clients. Law firms, as well as businesses in other regulated industries such as healthcare, financial services, and banking, seek us out because of our commitment to providing a secure and highly available environment in which to store and utilize mission-critical applications, personal client information, legal archives, and colocation equipment.

Our data centers have undergone rigorous scrutiny by independent auditors and have been awarded compliance certifications associated with the management and secure storage of client data. These certifications include SOC 2, SSAE-18, PCI DSS, ISAE 3402, and HIPAA.

protect corporate data employee leaves

Preventing a Crisis: 9 Ways to Protect Corporate Data When an Employee Leaves

Preventing a crisis should be top priority of any corporate business. Here are 9 ways to protect corporate data when an employee leaves.

1. Eliminate Access to the Employee’s Mailbox

You would think that this would be completed even before the employee has left the HR manager’s office, but many companies do not block access to email until hours or days after an employee has gone. Especially if the employee has chosen to leave the company on their own.

If an employee is leaving voluntarily, they have most likely given their 2-week notice. As a member of the IT team, make sure that you are aware of this. Although the employee will still need access to their email and other files during that time, you can monitor their actions for any activities that are out of the ordinary. This might include forwarding large quantities of emails from their work mailbox to a personal email account or printing a large number of attached files.

If an employee is being asked to leave due to poor performance or corporate downsizing, be sure that your human resources department coordinates with you to confirm when the employee will be told that they no longer have their job.

Eliminating access to their email (and other accounts) while they are meeting with their department head or the HR manager, will ensure that they are unable to access any last-minute files or data on their way out the door. Whether an employee chooses to leave on their own or is asked to leave, a best practice is to make their email account available to their manager and forward all new incoming emails to that person as well. This will ensure that business continues uninterrupted and the manager can determine if the employee was using their work email for other activities.

2. Use Single Sign-On to Disable Access to Multiple Applications at Once

The other component of IT management that is as critical as removing access to an employee’s mailbox is the use of a single sign-on system administered through Active Directory or a similar tool. This single sign-on is beneficial for an employee because they can access all of the applications and resources they need to do their job by only signing in once. On the other hand, it is also beneficial for you because you can deactivate a former employee in one single action and the access to all of their applications and other resources are immediately cut off.

3. Backup and Archive All Data

While many companies already have company-wide data backup and archiving solutions in place – especially for email, they do not take into consideration the possibility that individuals or teams of employees might have storage solutions that are not approved by or unknown to the IT department. A marketing department, for example, creates, stores and shares extremely large files to develop trade show graphics, high resolution printed collateral and other marketing materials.

To enable the easy storage and transfer of these files between employees and outside vendors, marketing teams often use cloud storage tools like Dropbox which may be unknown to you and is never backed up on the corporate network. An archiving solution takes data protection one step further with the ability to capture company data, store it indefinitely and protect it from employees attempting to change, steal, or delete content.

However, remember that an employee who has been planning to gain access to company data for some time and has set up a separate, personal file syncing solution will be able to modify and delete data outside of the archive.

4. Determine If Data Access Can Be Limited to Individual Departments or Positions

Strategies to protect a company’s electronic data should also be proactive and implemented company-wide with the development of information governance policies and procedures. Work with your executive management team to implement a set of IT policies that are given to every new employee. Consider the possibility of limiting access to on-premise and cloud applications, files, and networks to the individuals or departments who are required to work with them on a regular basis. For example, the accounting team does not need access to the company’s future go-to-market plans.

No one outside of human resources should have unlimited access to all employee salaries and benefits data. The engineering team does not need access to detailed customer data which can be found in the company’s CRM system or marketing automation tools.

5. Develop a List of Any External Cloud Applications or Websites an Employee Might Be Able to Access

It is easy to develop a list of websites, applications, or other resources that are managed internally or endorsed by your company for employee use. These may include your company’s official corporate website and social media channels including LinkedIn, Facebook and Twitter. But, you may be unaware of all of the other tools used by a specific individual as part of their daily job requirements. A marketing specialist may have access to a separate Google Analytics account to report on the company’s website statistics. They may use a cloud-based graphic design tool or have set up online accounts for upcoming trade shows for which the company will participate. Speak with the employee’s manager who will be much more familiar with the external tools used by their team. Create a master list of those tools for future reference. When the employee leaves, immediately transfer access to other team members and change all passwords.

6. Disable Company-Owned Mobile Devices and Wipe Personal Employee Devices

The use of company-owned mobile devices as well as the BYOD (Bring Your Own Device) trend have caused considerable headaches for IT professionals. Whether a laptop or tablet is provided to an employee by your company or they use their own personal smartphone or laptop for work related activities, the use of Mobile Device Management (MDM) technology to access, manage and wipe those devices is essential.

  • MDM for Company-Owned Devices: Any mobile device, whether it is a laptop, tablet or smartphone, which is provided to an employee when they start their job, is owned by the company. You have the right to wipe the device clean as soon as you are informed by HR that the employee will be leaving. The ability to do this remotely is critical since the device could be at a different office or the employee’s home. Since data back up and archiving solutions should already be in place, there should be no problem deleting the data on the device because it should be easily accessible elsewhere.
  • MDM for Employee-Owned Devices: The use of employee-owned devices for work-related activities raises some legal and ethical concerns. On the one hand, you want employees to be productive and use the tools with which they feel most comfortable, but it is critical for you to control how business data is used, stored and shared on any personal device without interfering with private information or applications. And, do you even know how many employee-owned devices are being used company-wide? Employees are hesitant to let anyone within your organization search and gain access to their personal devices which may include things like private financial records, personal photos, health information or contact information for family and friends. Implementing an MDM solution that enables you to access and wipe only company data, but not personal data, is key. Employee education on how personal mobile devices will be managed by you and that you are looking out for their best interest is also a critical component.

7. Monitor All Applications, Data and Network Access by The Employee for a Given Period After They Are Gone

An employee who is asked to leave due to poor performance or corporate downsizing and has decided to access or retrieve data will usually do it within hours or a few days of departing the company. Put a formal plan in place to monitor attempts by them to access your network, files, emails or other data after they have gone. You may choose to do this for a week, two weeks, one month or longer. Employees who have chosen to exit on their own know that they are on their way out long before their supervisor or the HR manager is aware. This enables the employee to easily take the information they want without raising suspicions. So, it is also important to proactively monitor employee activities, the information they have access to and what they are doing with it.

8. Proactively Monitoring Employee Activities

You can employ monitoring solutions that monitor the individual actions of employees and find inconsistencies in behavior over time. For example, activities might include following the websites that employees visit, storing social media posts and instant message conversations, developing a list of files they downloaded or the forwarding of large numbers of emails to personal accounts. If you decide to proactively monitor all employees, this activity should be included in your corporate employee handbook and you should educate them on why and how it will be used. Employees do not want to feel that they are not trusted and that someone is watching their every move, so it is important to discuss how this activity will also protect them, the company and clients from cyber-attacks, malware, or unsafe actions by unwitting employees.

9. Do Not Give Employees Administrator Access

It is probably not uncommon for you or a member of your IT team to give administrator access to employees so that they can customize applications and operating systems or even fix problems on their computer when you cannot get to the employee’s office in person. Have you ever spoken with an employee over the phone and walked them through how to gain administrator access to their desktop or laptop to fix a problem they are having or complete a required upgrade? Once the upgrade is made or the problem is fixed, administrator access may not be removed, enabling the employee to install applications or save files to cloud storage devices that have not been approved.

Whether an employee is asked to leave or leaves on their own, data can be lost in a number of different ways. It is critical that you put proactive policies in place to protect your company’s electronic assets throughout the life of your employees’ tenure at the company. Mitigating data loss from the beginning will minimize risk and help ensure that you are not scrambling at the end as your employee walks out the door.

Scroll to Top