Contact Us

Let’s focus on the solution so we can solve the problem.

Book a preliminary consultation by completing one of the form options above and a member of our business solutions team will contact you within 24 hours.

Visit Us

200-20085 96 Ave, Langley, BC V1M 3C6

Send Us A Message​​

hello@ ecmanagedit.com

Give Us A Call​​

(604) 888-7904

FAQs

The advantages of outsourcing IT include increased productivity, scalability capacity, network security measures & compliance standards, robust backups and disaster recovery solutions, direct access to accredited and experienced IT Technicians with combined experience in multiple technological environments and reduced costs allowing you to focus resources on the core of business development.
Cybersecurity best practices employ a combination of server and computer security, multifactor authentication, policies and procedures, and compliancy practices used to secure, protect and recover a network from unauthorized access. Cybersecurity is essentially everything done to employ preventative measures so that data loss, phishing, spam, ransomware and an over all network intrusion is avoided.
Managed IT Services is the practice of outsourcing systems administration and management of a business’s internal network by monitoring, securing, and maintaining the health of its systems via a range of functions and automation processes as per best business practices. In addition to, providing a range of tech support for the purpose of improving an organization’s operations and aiding in reduced budgetary expenditures via a team of accredited and experienced technicians reducing the need for internal technical staff. Managed Services are offered via a subscribed monthly fee and it widely varies depending on the size of a company’s network and individual needs. This subscription model employs a PROactive approach to managing systems rather than the REactive break/fix or on-demand outsourcing model.
There are about Seven Layers of Cybersecurity 1.Mission Critical Assets: This is the data that is absolutely critical to protect such as your accounting software’s data, customer’s financial records and electronic medical records if you are in the health industry for example. 2.Data Security: Security measures and controls are recommended to be in place to protect both the storage and transfer of data. The 3-2-1+ backup rule, as well as encryption and archiving should be in place in order to prevent data loss and have a redundant recovery process. 3.Endpoint Security: An important layered approach which has now become a standard for consumer and business based devices – your antivirus!. Stay away from marketed, out of the box solutions that may not be adapting to the technological change in today’s fast paced technological environments as this hinders an AV provider’s ability to get out in front of a lot of the more sophisticated threats and can be a little behind in tackling. Adopt an enterprise level antivirus with Artificial Intelligence algorithms and Roll back features. 4.Application Security: Applications that provide additional security features that control access to an application and that application’s access to your network asserts. Application security applies security measures via Authentication, authorization, encryption. An example of this would be Microsoft Multifactor Authentication. 5.Network Security: This is where security controls are put in place to protect a network. The goal here is to prevent unauthorized access to the network via policies and procedures such as limiting access to certain files and folders to non managerial staff. Operating Systems should also be patched regularly to minimize vulnerabilities that would provide a backdoor entry to attackers. Another component would be to decommission unused devices from the network eliminating the change of back-entry intrusions 6.Perimeter Security: The outerlayer of any network. Perimeter security controls include both the physical and digital security methodologies that protect your organization as a whole. It includes hardware appliances such as Firewall’s and Access Points fall under this category. 7.The Human Layer: Considered the weakest link when it comes to the security of a network. Staff should be educated and trained on the best cybersecurity habits and practices regularly. This includes instructions on how to spot email phishing attempts and best log-in credential habits such as user names and passwords. The human layer, can alternatively be positive if you have an accredited and experienced internal or outsources technicians that can apply all preventative cybersecurity measures and compliance as per best business practices.

Ideally any organization should have a 3-2-1+ backup strategy in place. The idea behind a 3-2-1+ backup strategy is to benefit from added data security by having three copies of your data plus an extra one. Two on-site local copies of the data stored on two different devices (a Server and a NAS Drive Enclosure) and two backup copies offsite (this could be another external NAS or portable hard drive and the cloud)

This strategy proposes that you have the following backup solution in your network as a minimum:

 

1. One on-site local copy of the data itself – the primary production data (in a Server configured to RAID 10 for example)
2. A second on-site copy also stored locally but on a different device (a NAS Drive Enclosure with 4 disk drives also configured to RAID 10 for example)
3. A third backup copy stored at a remote offsite location or cloud storage provider (another NAS or portable hard drive and the cloud for example)
Implementing the 3-2-1+ backup strategy will provide your network with a redundant, robust and recoverable solution.

Hardware Firewalls act as a filtration system for any external data coming into and flowing through your businesses network. Firewalls provide an initial layer of protection against outside cyber threats by shielding your network scanning packets for malicious and unnecessary codes or vectors already established as known threats.. This strategy proposes that you have the following backup solution in your network as a minimum: 1. One on-site local copy of the data itself – the primary production data (in a Server configured to RAID 10 for example) 2. A second on-site copy also stored locally but on a different device (a NAS Drive Enclosure with 4 disk drives also configured to RAID 10 for example) 3. A third backup copy stored at a remote offsite location or cloud storage provider (another NAS or portable hard drive and the cloud for example) Implementing the 3-2-1+ backup strategy will provide your network with a redundant, robust and recoverable solution.
There are a variety of options out there that offer secure remote access capabilities. Some are aimed for the average consumer and have limitations in it’s security features and there is a selection aimed for SMB’s and enterprise level organizations. One of these solutions can be activated via a Dell SonicWall’s secure sockets layer virtual private network perpetual licensing. (SSL VPN). SSL VPNs enable users within an organization access restricted and private network resources remotely via a secure and authenticated path. This is done by encrypting network traffic making it appear as if the user is on the companies local network, regardless of the geographic location the user may be in. A SonicWALL Firewall SSL VPN perpetual license supports many common enterprise authentication methods, including two-factor authentication and one-time passwords. It also supports single-sign on capabilities. The SonicWALL SSL VPN comes with network access control features via it’s NetExtender software providing easy and secure access to Windows and Linux users. NetExtender enables remote users to securely and safely connect and run any application on the company network.

Switches are networking devices. They connect devices such as servers, computers, and firewalls in a network using packet switching to send, receive or forward data packets over a network.

A managed network switch provides flexibility to a network administrator to control, manage, and prioritize the Local Area Network (LAN) traffic. However, an unmanaged switch works like a plug-and-play switch which allows devices on the LAN to communicate with each other, without user intervention.

When it comes to security, unmanaged switches have limited, basic security features such as lockable port covers that provide basic security and help avoid any type of direct tampering on the device. However, Managed Network Switches are equipped with advanced features and components that aid in identifying active threats and shutting them off in order to protect data and control. A managed Switch is superior to an unmanaged switch in terms of providing scalability, performance, speed, and security.

A managed switch can improve the flow of data by separating Virtual Local Area Networks (VLAN) that could be competing for the same bandwidth slowing down data flow. A Managed Switch would allow separate VLAN’s so that VOIP Data (for example) can operate independently from your Network Data

VLANs can allow IT administrators to automatically limit access to a specified group of users by dividing workstations into different isolated LAN segments as well.

With the ever-evolving technological landscape, new solutions are always emerging. Cloud Servers have been on the rise since the mid to late 2000’s slowly taking prominence to the traditional physical server solutions. There are many things to consider when deciding whether to go for a cloud-based or in-house server infrastructure. First is how important is up-time for your business? Although Cloud solutions may seem to be costly due to consumption based monthly subscriptions, the benefits far outweigh the upfront hardware and maintenance costs of a physical server. Buying your own physical server is considered a capital expenditure as you would need to invest a substantial amount of upfront costs.. A cloud service subscription is referred to as an operating expenditure as you pay a monthly subscription for the service maintained by the cloud provider. The pros of having a physical server is that it can give you physical control over your backups keeping critical data in house and having access to it without an internet connection. The cons consist of the fact that you would require a capital investment in hardware and infrastructure to acquire it, in addition to maintenance costs. Alternatively, the Pros of a cloud server is that there would be no need for onsite hardware or capital expenses. Cloud servers can be configured to be consumption based, therefore specifications can be configured as needed and no new hardware would need to be purchased should your needs or business scale. Data can be configured to be backed up in the cloud as regular as 15-minute intervals, minimizing data loss in disaster recovery situations. Restoration of backups can be initiated from anywhere. If Internet goes down from your Internet Service Providers side, access to the information will not be accessible by your in-house team, but it can be accessible should you have an outsourced Managed Services Provider (MSP) that manages your network.