Benefits of adding additional Memory to your Servers

Memory is what feeds processing cores, it’s one of the most effective and affordable ways to improve CPU utilisation and efficiency.
There are huge benefits of adding additional Memory(RAM) to your Servers that include:

  • It’s the fastest, easiest, most dependable way to increase Server performance
  • When CPUs are fully utilised, you will be able to use fewer Servers to accomplish more
  • Fewer Servers keeps power, cooling, and software licensing costs lower
  • It’s one of the best ways to cut costs and overcome workload constraints.

Additional Memory helps overcome 5 top server workload constraints:

  1. Limited budget: More memory helps increase CPU efficiency and utilisation, which in turn decreases a server’s cost of ownership because users are getting more performance out of it and are able to use fewer servers to accomplish more.
  2. Unexpected or unpredictable workload demands: More RAM helps eliminate quality of service variance because it provides extra resources for virtualised applications to store and use active data, which lives in memory.
  3. Limited floor space: Scaling up and using less servers optimises limited floor space and cuts power, cooling and software license costs.
  4. Rapid growth in user base: Hosting more users requires more RAM to maintain quality of service levels and gain system flexibility.
  5. High power and cooling costs: More RAM helps servers use power in the most efficient manner plus using fewer servers lowers total energy costs.

The bottom line:
Improve workload performance with more Memory, not necessarily more Servers

For more information, please contact us to discuss how we can help.

11 Tips on Internet Security

In recent times, the GDK Helpdesk has experienced a significant rise in Internet threats and in particular with Ransomeware such as Cryptolocker and Xepto. In most cases the solution to this problem was to restore from the last known good backup. GDK are taking this opportunity to remind our clients and our contacts of some of the best practices in relation to Internet and eMail usage. We are also making some suggestions below in relation to the Multi layered security approach that is now required to ensure a successful IT business continuity Plan.

  1. Use a Managed Antivirus product & and ensure it is active and up to date on your Servers, workstations, PC's and Tablets.
  2. Be careful of opening  emails from both known and unknown sources that look suspicious.
  3. Think twice and remain critical when opening attachments in e-mails or files downloaded from the Internet.
    Ask yourself if you trust the source and if they would send you this type of Email in the first place. Email addresses from the sender may be fabricated to look like yours.
    Never click links in emails or texts that seem to come from your bank, the Revenue or any other institution. If you think the message might be valid, log into your account directly, without using the supplied link.
  4. Be cautious with your passwords; don't use personal names, don't share them, make them difficult to break, use complex passwords. Implement a password change policy.
  5. Avoid using the internet to access your sensitive data in cafes or public places.
  6. Never leave your devices unattended.
  7.  Keep all software applications up-to-date with the latest patches including Microsoft Operating Systems
  8. Disable Java on your browser.
  9. Nothing is free. Be particularly careful of the source for free apps or software.  
  10. Don’t trust anything on the internet (even legitimate Web sites could end up delivering malware).  
  11. Back up your Data on all devices– not just your computer, but also your phone and your tablet ideally in both a local and cloud destination. Test the restore capabilities on a regular basis

What should Business Clients do?

  • Implement a robust data recovery procedure
  • Implement a multi layered security approach that would include:
    • Mail Protection (Includes anti-spam)
    • Server & Work Station Antivirus with up to date bit patterns
    • Implement a Workstation Management Policy which manages the Patch updating from all software applications.
    • Implement Web Protection on all workstations to avoid access to known malware internet sites
    • Insist on Firewall protection with additional security at the gateway for Antivirus, Anti Spyware and Intrusion prevention.
    • Configure your firewall to ensure remote users are who they say they are.

Call GDK for further information and how we have successfully implemented our Business IT Care plan for many clients.