The ultimate SD-WAN checklist

When it comes to SD-WAN, it’s best to consider the needs of your business first instead of the promises of the solution itself.

As incredible as a software-defined wide area network (SD-WAN) may sound, there are a few requirements that need to be met when considering SD-WAN as a networking solution, particularly for SMEs.

Related: Do SMEs really need SD-WAN?

Is your business suffering because Internet links often go down and you need to place orders online or communicate with your customers electronically? Are you struggling with Voice-over-Internet-Protocol (VoIP) call quality? Do you need better utilisation reports to make more informed decisions regarding your WAN infrastructure? If you’ve answered yes to any of the above, SD-WAN might be the solution for you.

Don’t forget to:

  • Keep it simple: It’s easy to get overwhelmed by what is available in the market and overcomplicate the potential solution design. Try to keep the requirement as simple as possible and focus on what you need to improve your core business.
  • Stay within budget: Managing cashflow is a critical success factor for the SME sector. If budget is a factor, consider opting for the service provider offering equipment rental solutions (allowing you to save on the initial capital) instead of one with a more affordable monthly cost.
  • Seek advice: Ask a professional for help defining your core requirements. They must understand your core business needs and give advice and guidance on how to frame your requirements and potential solutions.
  • Make it scalable: Starting with a smaller, simpler solution and growing it as your business needs grow is more cost efficient than implementing a high-end solution and then trying to grow your business quickly to justify the high cost.
  • Always include security: A downside of using a more affordable Internet link for your WAN traffic is that you’ll be exposing your business network to the public Internet. It’s important to understand the impact of potential risks like hacking, ransomware attacks and viruses to your business and ensure these risks are appropriately mitigated.
  • Outsource the admin: A managed solution from your ICT provider will relieve you of maintenance and administration worries, especially if you don’t have dedicated IT staff on site. It will also give you peace of mind when it comes to security and the cost of replacing faulty hardware or upgrading the equipment when needed.

 

Do SMEs Really Need SD-WAN?

SD-WAN offers enterprises fast, reliable connectivity at reduced cost, but that doesn’t mean it’s one size fits all.

We can all agree a fast, reliable and, yes, affordable, Internet solution is key for every business, big or small. In today’s rapidly evolving WFH environment, there’s also a need for enterprises to embrace cloud-based services and technologies that allow for increased productivity, improved communication and growth. This is where traditional wide-area networks (WANs) usually fail to meet the increased demand. That is, until software-defined wide area networks (SD-WANs) came along.

The big buzz

So, you’re a small business owner and you’ve heard all about the networking miracle that is SD-WAN, but every time you hear or read anything, it seems as though everyone is talking about something completely different.

From a marketing perspective, the term SD-WAN seems to have rapidly evolved from a tech industry buzzword in the late twenty-teens to a solution concept these days. You may read about network hardware being decoupled from control mechanisms, SD-WAN saving operational costs or even slaying the incumbent Multiprotocol Label Switching (MPLS) giant. Who’s right? Chances are, everyone is, to some extent.

Related: The ultimate SD-WAN checklist 

Cost reduction is often one of the first value propositions that comes up when talking about SD-WAN.

One of the ways SD-WAN solutions might do this is by replacing expensive MPLS WAN circuits with cheaper Internet access alternatives and by replacing the functionality of some of the expensive hardware components of your WAN.

The catch

However, most SMEs are already using the more affordable Internet Access options available to them and will most likely look at more cost-effective public cloud-based solutions instead of investing in expensive hardware.

Related: Vox launches SD-WAN Lite to give SMEs more reliable connectivity

Ironically, we’ve found that SD-WAN for the SME potentially increases costs, adds unnecessary complexity and results in much of the functionality of the solution going unused.

The SME solution

There is some good news though. Vox SD-WAN Lite is specifically tailored to meet the connectivity needs of SMEs. A simplified and scaled-down version of SD-WAN, Vox SD-WAN Lite offers SMEs the opportunity to enjoy all the perks of the solution without the resource wastage.

Vox SD-WAN Lite integrates any combination of ADSL, LTE, Wireless and Fibre connectivity to create the best network possible. It can accommodate up to three separate Internet connections and will prioritise the best one for fast, reliable Internet resiliency.

 

Conquering the Cloud with Azure KickStart

Thanks to Azure KickStart, Braintree is perfectly positioned to provide a cloud-adoption journey unique to your business needs.

As incredible and increasingly necessary as migrating your business assets to the cloud may be, there is no one-size-fits-all adoption solution for businesses to follow. Your cloud migration journey will always be unique to your business. It will be defined by your motivations for the move as well as your business goals for the future. And that’s where Braintree, and Azure KickStart, comes in.

Downscale your office, grow your business

Braintree, a Microsoft technology and software partner, artfully combines technology, people and processes.

As Chris Badenhorst, Strategic Head of Azure at Braintree, explains, “We know the cloud looks like a scary place but Azure KickStart was designed with you, the customer, in mind. Azure KickStart will guide you in a gradual adoption of cloud services to take your business to the next level.”

Getting started

Your motivations for the move may include everything from needing remote access to data anywhere, at any time, to saving costs and increasing productivity. While these aspects are important for every business, Braintree’s Azure KickStart will identify the ones most important to your business, both now and in the future.

Related: Moving to the Cloud with Azure

After an initial assessment, Braintree will be able to gauge your readiness to move to the cloud. Azure KickStart offers the possibility of moving everything, from your servers and databases to virtual desktops and web apps, to the cloud at a pace that suits you.

The Azure KickStart migration programme makes this process as easy as possible with best practice guidance and the right mix of expertise.

You’ll also be able to track the progress of your migration journey with personalised assessment tools and recommendations.

Making the move

Azure KickStart will allow you to migrate your essential business information from costly onsite servers, prone to hardware failures, to a secure and scalable virtual data centre. In addition to offering a sustainable, energy-efficient means of operating your business, Azure KickStart also provides further cost-saving opportunities with its Windows and SQL Servers.

Related: Now is the best time to consider a cloud strategy

Azure KickStart also offers various tools for managing your cloud budget and usage, allowing you to forecast costing while optimising your workloads for maximum productivity. Braintree will be able to identify underused resources as well as allocate and de-allocate resources to match your productivity needs and cost management.

Staying secure

Security is assured at every stage of your journey to the cloud thanks to Microsoft’s multi-layered security across data centres, infrastructure, and operations. Azure has spent over a billion dollars on security research and development to date, and there are over 3500 security experts constantly monitoring the safety of your data.

While it may have moved into the cloud, with Azure KickStart, you can be sure your data will always remain your own. Your business information will also be protected by Azure KickStart’s core privacy principle, ensuring your data will never be used for marketing or advertising purposes.

With Azure KickStart, Braintree offers your business the ability to adapt to the current work environment with ease while also making sure your business is perfectly positioned to handle whatever the future may throw at it.

To find out more about kickstarting your business into the cloud, visit vox.co.za

Email Security Critical to Ensure Organisational Survival

The lockdown has highlighted the importance of cybersecurity as an integrated business process especially given the normalisation of remote working. But while the focus has been on safeguarding employee devices, email security has fallen by the wayside. And yet, 95% of cyberattacks leverage email as an entry point into organisational back-end systems.

Perhaps even more concerning is that last year 94% of malware was delivered by email. Fast forward to the present and the dynamic challenges of the COVID-19 pandemic mean organisations can ill afford to neglect one of the most fundamental elements of their business. But email defence entails more than just installing an anti-virus or firewall. It centres on increasing the business resilience against all forms of malware while still delivering business continuity and disaster recovery should the worst happen.

Complex issue

Of course, this is as much a technology problem as it is a human one. In the case of the former, organisations must be aware of not only endpoint protection, but backup storage best practice, the importance of encryption, and even recovery testing of backup data when it comes to employee emails. For the latter, it is about continual education campaigns that keep staff informed of the threats to watch out for and how to identify potential social engineering attacks.

Despite the risk to operations, many companies still believe their existing cybersecurity solutions and approaches will provide adequate defence against sophisticated threat agents. Sadly, the reality is that it is only a matter of time before they get compromised. Surviving a random virus might be relatively easy but overcoming a concerted ransomware attack is levels of magnitude more difficult.

Imagine the consequences if a business cannot recover its email data.

From customer contracts to client files, sensitive documents to contact information built up over years of engagement, none of this will be safe if a hacker locks down company data with ransomware.

Anecdotal evidence suggests that companies who do end up paying ransomware will likely need to close their doors within six months of doing so. The repercussions are far-reaching both from a financial and reputational perspectives. And then you have the likelihood that hackers would simply target the business again especially if it is known to the underground community that it pays ransomware.

More seriously

Local organisations must take their email security and business resilience more seriously. Yes, there are many ‘fear, uncertainty, and doubt’ campaigns muddying the waters especially when it comes to the seriousness of the threat. But it is about taking a more proactive stance and implementing the right kind of cybersecurity solutions, updated policies to reflect business continuity requirements, and educating staff on email and other threats such as social engineering.

The business landscape will be radically different come 2021. If cybersecurity does not form part of the new environment for a company, then its chances of remaining relevant will all but disappear.

Introducing Vox ICE Home Care Monitoring

Life begins at 60 – ask your parents! They need their independence, and you need peace of mind – get the best of both, with Vox ICE.

It’s estimated that 9 % (5.2 million people) of South Africa’s current population is over the age of 60. By 2050, 16 % (12 million people) of an estimated total population of 75.5 million people in South Africa will be older than 60. Globally, this phenomenon is known as the silver tsunami.

Thanks to advancements in medical care, the average life expectancy of people is increasing while their income decreases due to retirement. It’s fair to assume that a substantial number of seniors won’t consider moving to a retirement facility for a variety of reasons, including cost and loss of independence, and will choose to age at home instead.

The golden years

Relatively healthy seniors crave their independence and retirement villages aren’t a part of the lifestyle they envisioned for their golden years. People are used to certain routines and there’s also a growing trend for elderly persons to live alone amongst all population groups. A more mobile senior may choose to live in their current home without the need for live-in help or a caregiver at all.

Sadly, advanced aging will always be accompanied by changes in mobility, mental capacity and health, and with that comes a need for help.

One fall can change it all

While most seniors can be self-supportive to a large degree, certain risks include:

  • Accidental fall.
  • Forgetting to perform routine tasks (i.e. closing doors).
  • Unexpected illness and an inability to get out of bed.
  • Leaving home without any form of communication, and the caregiver is unaware of their whereabouts.

According to the World Health Organization (WHO)’s Global Report on Falls, most falls occur during the day with only 20 % of falls occurring at night. Of those at night, most occur between 9pm and 7am, perhaps during trips to the bathroom.

An accidental fall – from age-related illnesses such as Alzheimer’s, muscle weakness or visual impairment – can change the independence and the amount of care for an older person in an instant. In some cases, it may be fatal. The WHO reports adults over the age of 65 suffer the greatest number of fatal falls globally, while 20 to 30 % of seniors in the United States of America who fall typically suffer debilitating injuries such as hip fractures or head trauma.

The next generation of independent care

While technology will never replace the need for physical interaction between seniors and caregivers, it does provide an alternative solution for caregivers to monitor a senior’s behaviour and use that information proactively within the caregiving process or act immediately during emergencies.

Vox ICE home care monitoring devices are easy to install, scalable according to your needs and connect seamlessly to any network with limited human interference.

Vox ICE home care monitoring consists of:

  • Motion sensors installed at strategic points in the home. These devices detect motion to create a pattern of the person’s normal day-to-day movements.
  • An open/closed sensor placed at a regularly used door, like the front or back door.
  • A wearable geolocation device.

“At the heart of this monitoring system is a unique algorithm that analyses a person’s normal behaviour over a certain period. This gives it the ability to detect anything unusual that may be of concern, such as a fall, an open door or too much time in bed,” explains Poena van Heerden, Senior Product Manager of IoT at Vox. “In addition, this system also offers a reporting platform for users to record or detect any changes in behaviour. This type of analysis allows caregivers to be more proactive and take action against potential underlying illnesses.”

Vox ICE to the rescue IRL:

  • Beryl forgets to close her front door – an alarm is sent to her son to remind her to close it.
  • If she’s not feeling well and decides to stay in bed all day, the algorithm of the Vox ICE system will detect this unusual behaviour and send an alarm to her son to check up on her.
  • Beryl accidentally falls and can’t get up – the motion sensors will detect the abnormality and send an alert out for assistance.
  • With the geolocation device on her keyring, she can be tracked and easily located by her caregivers if she needs any help while out shopping.

Vox ICE is an accessible, affordable care giving support system that can be easily upgraded as your care requirements change.

Take Your Home Wi-Fi Network to the Next Level

Careful planning forms the core of an intricate, yet reliable, home Wi-Fi network.

Almost anyone who has used the Internet will recognise the phrase “best effort service”. It sounds almost dirty, doesn’t it?

Internet Service Providers (ISPs) are forced to adopt this model and a few others, including the use of contention ratios (shared Internet access) and Acceptable Use Policies (AUPs), to make Internet access affordable for the home user.

Sadly, “best effort” means that we don’t always get optimum performance or the highest support priority when we need it.

This brings us to the importance of home Wi-Fi planning.

When planning, ask yourself:

  • How big is my home and what is it made of?
    • In South Africa, the structures between floors mostly consist of solid concrete, which is not easily penetrated using the current Wi-Fi spectrum. A high-quality wired LAN extension is often recommended as a solution here.
  • How are all my devices powered?
    • Access to power outlets is often neglected when designing your home Wi-Fi network and can result in having to run multiple extension cords or new power cables. Some devices may even be powered over Ethernet cables connected to your access point. It’s important to accommodate these devices in your design, including potential power over Ethernet (POE) switches or power injectors.
  • What devices am I connecting?
    • The type of device requiring access and intended usage will also impact the design of your optimum solution. Smart TVs or streaming HD video content will require more throughput than a door sensor.
  • Which devices are most important?
    • It’s possible to prioritise certain devices on your Wi-Fi network. This is especially relevant when working from home and you want to ensure a video conference with your boss takes preference over your children’s screen time.
  • Should I rent or buy?
    • Old or damaged equipment usually ends up in a cupboard somewhere, requiring more money to repair or upgrade. A rented solution can be a lot easier on the budget and requires a much smaller cash outlay upfront.

The light at the end of the tunnel is this: If we use technology with a plan to meet our specific needs it can improve our quality of life in an effective and cost-efficient manner.

The Wonders of Vox Wi-Fi Home Executive

It’s possible to work smarter, not harder, at home thanks to Vox Wi-Fi Home Executive.

There was a time when the only requirement we had for a Wi-Fi router was its affordability. If it arrived already bundled with our Internet Service Provider (ISP) connectivity solution, no questions were asked. That’s because, back then, the only things we had to worry about Internet access for were two laptops and a personal computer.

As our home Wi-Fi networks become more complex, so too does our need to manage them properly to ensure the signal remains as strong and reliable as we’ve come to expect – especially as more of us migrate to work from home.

There are some devices or structures in almost every home that might potentially cause interference with your Wi-Fi signal, degrading the performance of your network – including your neighbour’s devices.

Related: Remote work is a driver for productivity

You may wish to prioritise certain devices or applications on your Wi-Fi network to maximise your optimum user experience. This is especially relevant in a work environment where, for example, you would want to ensure that a video conference with your boss takes preference over your children watching TV in the other room.

Here’s the good news: the Vox Wi-Fi Home Executive offering will allow you enjoy the benefits of your home Wi-Fi without the stress of having to manage your network or having to track down problems and resolve them when something goes wrong.

Related: Is your Managed Services partner geared to support your users at home?

Vox Wi-Fi Home Executive will take care of your Wi-Fi and Internet needs while you focus on what’s more important to you, like having the free time to watch Netflix with your kids because you just got news of that promotion you were hoping for via a flawless video conference with your boss…

The Life-Changing Magic of Wi-Fi Planning

The secret to a fast, reliable and future-proof home Wi-Fi network really comes down to planning.

From the intricacy of our basic Internet needs to the number of devices connected, no one can deny the complexity of our home networks has increased exponentially over the last few years.

Our phones now automatically connect to our home Wi-Fi network when we walk through the front door; our children have their own laptops or tablets for schoolwork and entertainment; we have wireless printers, entertainment centres and televisions that require connectivity. The trend for more people working from home, accelerated by the COVID-19 pandemic, has also had a significant impact on our personal Internet use.

Looking ahead

As home automation becomes a reality, this trend will continue at an enhanced rate. We’ll start connecting everything from home security systems, such as access controls, cameras and lights, to fridges and coffee machines to our Wi-Fi.

It’s not unrealistic to imagine that in the very near future we could have more than 50 devices, on average, connected to our home network at any one time.

Related: Hating your Wi-Fi network at home? Let’s fix it

As the perimeter of our home network increases, so does our potential exposure to security threats. Opportunistic neighbours might try to access your network and chew up precious bandwidth, which seems to be more valuable than petrol these days.

Taking control

The proper configuration and management of our home networks has become increasingly important to ensure the system continues to perform as we expect. The number of connections to specific wireless access points (APs), possible signal interference and an inefficient network configuration are only a few factors that could potentially degrade your home network performance.

Home Wi-Fi network planning enables you to choose the best type or model of Wi-Fi APs you may need now and in the future. The number of devices connected to a single AP at any one time will impact the network performance you may experience.

Taking Console Gaming to the Masses

The global video game market is expected to top more than $200 billion by 2023. And when it comes to prize money for professional esports, the total pot increased by 42% last year to reach more than $234 million across almost 4,600 tournaments. Clearly, gaming is big business. But when it comes to the casual gamer, the latest consoles are financially beyond the reach of many. This is where the introduction of rental options in the local market is ground-breaking.

It really comes down to the numbers. At close to R12 000 for an Xbox Series X and R7,000 for an Xbox Series S, these next-generation gaming machines are not cheap. Make no mistake, these consoles provide an exceptional gaming experience, but the price of the console clearly does not  include the required high-speed Internet connectivity, digital content (for example, the Xbox Game Pass), and a decent screen to play on.

Most hardcore players spend upwards of R30 000 on a high-end PC gaming rig. Many have sponsors and approach esports as a serious commitment, training for countless hours. However, the lockdown has highlighted the importance of being able to access entertainment options for people from all walks of life. Gaming today is a social experience.

Far removed from the stereotypes of a reclusive teenager hiding away in their room, playing on a console is something that the entire family can enjoy while they make new online friends in the process.

Everybody plays

Accessibility, therefore, becomes critically important. At the turn of the century, the focus was on bridging the digital divide between those able to benefit from the Internet and those without access. Thanks to the growth of mobile and the proliferation of Fibre, this has all but been addressed. Instead, the digital divide of today centres on the gaming experience.

Today, more than ever, people want to game. It is something that appeals to both the younger generation and the young at heart.

By making the likes of the next-generation Xbox consoles available for rental with a fully managed service and bundling it with Fibre connectivity and digital content access, it suddenly becomes something everyone can enjoy.

Vox’s low latency network design with transit routes throughout South Africa, North America, South America, Europe and the rest of the world provide smoother play when the gaming server you have to use is not in South Africa.

With this access to equipment, connectivity, and the content, comes a fantastic social experience that also introduces problem-solving skills to children. In fact, many international companies access online game servers and ‘scout’ for talent. Those online gamers who excel in a competitive environment bring much value to any organisation looking for individuals capable of delivering in high-pressure scenarios.

So, why not contact Vox this holiday season and check out its Xbox and Fibre to the Home bundle options? Choose from the Xbox Series S, the smallest, sleekest Xbox console launched to date, and Fibre to the Home Bundle starting from just R1 293, including VAT, per month for a 24-month contract. Or what about the Xbox Series X, the fastest, most advanced gaming console yet to be launched? It is also bundled with Fibre to the Home and the managed service starts from R1 645 per month for a 24-month contract.

Enjoy high-definition gaming in the comfort of your living room and give the children that perfect treat. Or spoil yourself with access to one of the most powerful gaming consoles ever designed and see what the gaming fuss is all about.

 

Countering the Surge in MSP Cyber Attacks

In June, the US Secret Service issued a security alert warning about an increase in hacks of managed service providers (MSPs). Almost a year earlier, media reports highlighted what was then a growing trend of targeting MSPs with ransomware. Today, MSPs are waging a war on multiple fronts – not only on keeping their customers’ data safe but their own systems as well.

The premise behind this spate of MSP attacks has its roots in supply chain hacking. After all, why should hackers focus on a Fortune 500 company with extensive cybersecurity resources in place when they can get access through a partner who does not have such defences? It is all about taking the path of least resistance by using a smaller company as a back door instead of taking on a Fortune 500 enterprise head-on.

Hacking an MSP does provide one significant advantage. These service providers are likely to manage many customers, some up to the thousands. By compromising the MSP, hackers get the veritable keys to the kingdom and can easily infect any of their clients with malware.

Growth trajectory

Typically, there are three motives for an attack. The first is to gain access to data. This requires the threat actor to remain hidden to extract as much data as possible. Secondly, some hackers are intent on causing as much damage as possible. The ‘advantage’ of this is that the MSP or client organisation will immediately know they have been infected as services will start going down. And if the cause of the attack is proven to be through the MSP, then the service provider will face significant reputational damage as well as financial fines.

The third, and one of the most prevalent motives in recent months, is that of ransomware. By compromising an MSP, the hacker gets a much better return than going after each organisation individually. One hack can therefore translate to hundreds of ransomware opportunities yielding a greater financial reward.

And even though companies are advised against paying ransomware, they may have little choice especially if they are unable to restore their data.

Defence through deception

These risks mean it is no longer good enough just to try and protect the technology environment.

Instead, organisations should consider implementing honeypot technology that simulates enticing databases and services. In this way, when the hackers are lured to the honeypot, the company will know someone is snooping around on the network and can take proactive steps to isolate the damage and trace how they got into the system.

But whether you are an MSP or an end customer, security in a digital-centric environment depends on your budget. Keeping up with hackers can be an exceedingly expensive undertaking. To this end, honeypots are cost-effective to identify any potential nefarious actions.

Being clever

Beyond this, organisations must consider two-factor authentication. This extra step means the hacker must have physical access to a secondary device, such as a mobile phone, to perpetrate the attack. And then, other basic security best practice must always apply. Things like not using easy passwords and having users change them every 30 days are fundamental.

The best defence centres on what you have, what you know, and who you are. Those authentication methods that incorporate all three of these elements present the MSP with the best possible security. One of the best ways this can be implemented is through the concept of just-in-time accounts. This sees the business creating a login for a user that disables once a specified time has elapsed. It also means security personnel do not have to remember to disable accounts as the process is completely automated.

Best practice

For our part, Vox uses the same systems as many of the best MSPs in the world. All the right security technology is in place including multi-factor authentication. Furthermore, our sessions with customers are encrypted end-to-end, and we believe in session recordings. Not only does this help from a quality assurance perspective, but we can see that all the required steps were taken to maintain the integrity of the environment.

All our cybersecurity solutions are fit-for-purpose and follow the relevant ISO standards. But this is only part of the defensive equation. Companies cannot rest on their laurels when it comes to defence. Employees must be continually trained especially when it comes to the risk of social engineering attempts. A basic principle of this is to never give out passwords over the phone.

All businesses should get to the stage where they implement automated password rotations. This also ensures the company can change access privileges at the click of a button if there is a risk of a disgruntled employee.

Even though MSP hacks are not a new thing, the continually evolving cyberthreat landscape means that no organisation can ignore the trends at any point in time. A considered approach to cybersecurity reflective of the immediate business requirements must be critical to help defend the network against potential compromise.