Dog collars to toasters are connected as part of the Internet of Things (IoT), with experts predicting that by 2020 more than 50% of new businesses will run on the IoT. However, cyber security and privacy are the biggest challenges for IoT, collecting large amounts of personal identifiable information. As soon as some financial benefit from hacking smart devices appears, cyber criminals will find a way to take advantage of it.

The rate of cloud adoption has increased rapidly, with more and more computing being pushed into the cloud, a trend identified in Serviceteam IT’s Cloud Snapshot Survey 2017. This growth in cloud computing has led to the development of networks of large data centres. However, this is already starting to slow, with an ever-increasing amount of computing moving back to the ‘edge’ of local networks. Processing will always occur wherever it is best placed for a given application at a given time and cloud has given us flexibility of computing resources; but we can’t help but think that reliable, elastic and on-demand networking is imperative to deliver the future.

Cloud may be the heart of many companies’ infrastructure but it would be nothing without the veins of connectivity that keep the data flowing. The UK Cloud Snapshot Survey 2017 asked what cloud connection companies use to access their cloud solutions. This was split out from their normal office connectivity unless they relied on an open public cloud connection.

Cloud Security has been a serious issue since the concept of the cloud began. The classic example was initially the discomfort of a shift from physically seeing the IT security infrastructure to simply trusting someone else with it virtually. One way to ensure a full understanding of cloud security, and security in general, is to understand the levels of your infrastructure that require protection.

Cloud Connect uses the latest in fibre hardware technology to create a physical link between your network, and the cloud. While most data will travel across the public Internet, Cloud Connect is a dedicated connection between your network and your cloud services. Learn what it is, how it works, why you need it.

Even though we work with all of the Tier 1 network and leased line providers, we don’t often talk about it. This is due in part to our customers’ network and ethernet fibre leased line services being both commercially sensitive and a security risk should we divulge their details. It is also a relatively complex area of IT infrastructure, where one size rarely fits all. So here goes . . .

If your organisation needs connectivity to support business critical data and applications, it’s important to find a solution that works for you, and a leased line connection is often part of that. Leased lines provide connections between networks that require data to ease communication. This could mean they connect offices to the Internet, or to other geographically distant offices and sites, or they might even carry telephony data such as a call centre.

Thanks to an existing customer, BanaBay Limited, giving a whole-hearted recommendation of how we at Serviceteam IT support them, we’ve added another fantastic new customer, Substrakt Limited. We provide BanaBay with IP Telephony, Continuity, Office 365, IT Support and of course Fibre Internet. BanaBay were very gracious, in allowing their potential next door neighbours to assess the quality of the leased line services provided by Serviceteam IT, by enabling secured access for Substrakt to evaluate. Substrakt had a resilient fibre ethernet leased line connection installed in an impressive 26 working days. The contract follows another successful year for us, which has seen our client base treble.

Connectivity can be confusing. Are you sure your organisation has the right network connection? Do you suffer from frustration by slow or unreliable broadband? Do you want a more productive experience? Would you like the ability to benefit from cloud services, online backups, or IP telephony?

Those who work or study network or communications infrastructure will know how difficult it is to remember all the details of all the versions of all the technologies. Fortunately, over at community site Packet Life, they have produced cheat-sheets covering everything from point to point protocols, VOIP, MPLS, to physical terminations. Whether you need to […]