FlexGen PC Data Backups

pc backup icon

FlexGen Power Systems provides energy storage solutions with their revolutionary FlexGen HybridOS platform. Oak City IT worked with FlexGen to create an agile PC Data Backup solution.

“One size fits all” is the biggest lie. It should read as “one size someone, somewhere, probably.” And just like a comfy sweater, your organization’s IT needs may fit a bit differently than others.

pc backup icon

Unique Background, Unique Needs

Oak City IT consulted FlexGen during rapid growth as a startup pivoting into leading as a provider of green energy storage solutions. As an agile engineering company FlexGen needed agile solutions for their IT systems. Keep in mind you may need something different. We partnered to develop a system that allowed rapid deployment of new PC’s to employees in only 5-15 minutes!

Don’t Re-Invent the Wheel

We used existing systems that FlexGen already owned, were trained, and trusted. FlexGen’s leadership aimed to stay agile by streamlining any on-premises infrastructure and relying on cloud technology for flexibility.

Employee Data

Understanding our goals, we developed a robust while lean and agile system. Data on individual employee PC’s were treated as ephemeral working copies. We safely did this by having all employees sync important data to their company Dropbox, securely stored in the cloud. For the computer engineers we worked with the DevOps team to establish github repositories migrating from the dated subversion repositories.

Software and Configurations

After taking care of the data, what about the PC’s software? Did we really want to manually re-install every app every time? In fact we couldn’t do that. We worked with another IT service provider that had an Acronis backup solution in place. Acronis provides wonderful tools for backups, but they weren’t flexible enough for FlexGen’s needs. FlexGen employees echoed: “It works for everything else but there’s that one program we all install manually because it’s easier.”

Compare the manually setup PC’s that took around 4-8 work hours and occasionally longer. FlexGen would often require agility to hire a new employee and have them start work in a couple weeks. It’s hard to carve out a day of our work time for each PC setup. Cloud systems tend to bottleneck when deploying large amounts of data. Thus we became convinced that there would need to be an on-premises solution for our software and configuration deployment.

New Life to a Trusty Old Server

FlexGen had an existing server that ran an aging version of Windows Server. We could have upgraded, but we decided to save that cost and headache. Instead, we found robust FOSS solutions for no additional license fees. FOSS stands for Free Open Source Software which is free as in freedom and free as no cost.

We found a great system that was capable of deploying images and prepared several template images ready to go. Images are a snapshot of all the software on a PC including installed apps and configuration. We built images for each their different job roles. FlexGen uses mostly Windows PC’s. Microsoft’s Volume offered a fraction of the cost and we could deploy images to all PC’s. This system aided updates for Windows 10 when Windows 7 was approaching EOL (End Of Life).

Unique Needs Meet Unique Solutions

We refurbished FlexGen’s Windows Server and installed linux and FOG Project for the imaging. The FOG server can deploy images with the latest version of Windows 10 and everything already installed. And it runs fast! For example on FlexGen’s network the server can deploy an image at speeds over 4 GB/min. Many images we created ranged in size from 20 GB to 35 GB. In summary we could deploy a fully installed and configured system in about 5 minutes!

FlexGen PC Data Backup Solution Results

Let me repeat that: we got new PC setup from 4-8 work hours down to 5 minutes! That’s a 99% reduction in real-world time to complete a new PC setup!

Added Benefits

Employees regularly synced or pushed any business critical work data to Dropbox and GithHub. Whenever there was an issue on their PC that couldn’t be fixed quickly, we could deploy a fresh image. Their PC was ready before they could finish a coffee break.

FOG server image multicast

If anyone been compromised by ransomware, then we could have used the multicast option on the FOG server and deployed all the PC’s then syncing up with cloud data. The whole process for the organization could have easily completed within one hour or less. Though it never happened, we were ready in advance to recover from such disasters which are increasingly common. Thanks in no small part to our cybersecurity plan implemented for FlexGen, but that’s a story for another post. Check out more posts about our security consulting work.

Need help with PC and Data Backups? Contact us today for your free initial consultation!

Vintage Church Firewall

firewall icon

New network, new challenges

Vintage church prepared for growth by upgrading their Internet connection. However a faster network alone isn’t enough for an expanding organization. They needed a more robust protection against the growing list of cyber threats that increasingly face everyone. The church has been live-streaming church gathering since the global pandemic began in early 2020. Additionally, Vintage hosts Wake County Public Schools students and Triangle area YMCA counselors for coronavirus safe classroom learning. They needed a robust solution for a Vintage church firewall.

Defending the kingdom

Growing organizations require growing networks which require a stronger dependable line of defense against cyber threats. Firewalls act as a gate in between you and the Internet. They allow authorized users and actions while preventing others from doing anything with your data.

We wish we were making up the risk of cyber threats, but alas, it’s very real and increasing constantly. Organizations are increasingly targeted by ransomware. This virus locks out users from their computers while asking for a ransom to be paid to regain access. We strongly warn you not to negotiate with anyone attempting a ransom. Anyone that starts off with a bad faith argument is clearly not trustworthy. We model patience and resolve to earn your trust instead of demanding it.

Threats come in different forms as viruses or surveillance, or denial of service attacks that hinder your network from working. Malicious actors don’t give you a free pass if you’re a non-profit organization. Vintage needed a reliable solution without the large enterprise price.

Security without compromise and without breaking the budget

You may have heard of the industry leader Cisco systems that’s down the street in Cary, NC. They lead the industry because they make great products. But there’s also many other great options on the market now. Vintage Church decided on a firewall by Juniper Networks who make top-notch network equipment and charge more reasonable prices.

Vintage Church Firewall

We found a Juniper SRX device that does routing in addition to the firewall at a fraction of the cost. The equipment and licenses were roughly half of what some other systems cost.

The Vintage church firewall is configured specifically for their needs confidently securing their network.

Rest assured

Firewalls prevent all traffic incoming from the Internet unless specifically allowed in by configuration or a user’s unwitting actions. Hackers, overbearing government agencies, overbearing corporate agencies, and other malicious actors simply have no access into a firewall. Additionally Vintage has decided to use Juniper’s Unified Threat Management (UTM). UTM allows intrusion detection and prevention, URL filtering, and network-wide anti-virus. This proactive approach stops many cyber threats before they ever start.

Your business is your business. Let’s keep it that way.

Vintage Church’s staff and congregation actively help the community. They are obviously not intentionally doing anything harmful. When you provide Internet access or you take care of others you also need to take care of them digitally. Oak City IT provides peace of mind. You have a trust-worthy partner helping you manage confident control of your data.

Oak City IT Blog

Oak City IT Logo Icon

IT work that actually works

IT work that actually works! We share all the best tips and tricks to tech in your organization. Also, posts show off our clients’ success stories which are ideas for how we can help you.

Modern computing technology requires a wide breadth and depth of knowledge. Thus we’re not only comfortable sharing our tips and tricks we insist on empowering you.

Your goals are our goals

Many IT service providers stick to old processes to do their job. This might have worked at one point, but you have new needs today to adapt to an ever changing world. Consider asking a professional that’s more in tune to your needs than trying to reach a quota on their ticketing system. To give you IT work that actually works for you we listen to your needs and goals first then apply our vast knowledge to the best solution for you.

Need something faster? Got a tight budget to work with? Need the best in class solutions? Our loyalty is solely to our clients. Trust us to not railroad you into a solution that fits our needs and forgets yours. Instead we will take your goals and consult with you on the best way to reach them.

Think global; act local

We have experience working with clients all over the world, but we like to focus on organizations in the greater Raleigh North Carolina area. We live here and we like figuratively and literally seeing eye to eye in person. If your Internet connection goes down, you don’t want to have to wait on service from someone in another time zone to try to fix it. You need help now. We look forward to earning your trust with the services you need and there’s no better way than to provide knowledgeable timely help in person!


Privacy Focused Search Alternatives

Everyday InfoSec Search

Looking for privacy focused search alternatives? Here, let me google that for you. Or…perhaps not. If you stop to think about how Google’s marketing were able to replace the word search with their service, it’s impressive. But are there any everyday InfoSec search alternatives? The company that once lived by the motto: “Do no evil” may now be too big to effectively enforce their defining principle. 

The Problem

You may have also noticed that in focusing on making money serving you ads, the search results aren’t as good as they once were. Google is better than some tech companies, but any information shared with a tech company that you cede ownership gives them that data forever. What if you’re a privacy focused person searching for alternatives? We currently lack the legal infrastructure to do anything about shared personal data, thus companies will likely collect all they can and keep it as long as they can in order to maximize their own profits.

Privacy Focused Search Alternatives

So what do we do if we want our data private? Not share it with proprietary companies that only have their own financial interests at heart of course! While that may seem obvious and easier said than done, it’s not. Let’s get your Internet search data private in a just one click. What if I told you that you can get quality search results without being tracked and profiled? Well you can. Try duckduckgo.com If you like it, consider using it as your default search engine in all your browsers. We’ll cover how to do that on the next post in Everyday InfoSec.

DuckDuckGo

Read More InfoSec Tips on our Blog

  • Security Checkpoint Google Authenticator

    Security Checkpoint Google Authenticator App: Join us as we bolster security in our Google Account using MFA and an Authenticator App. We prefer and demonstrate Authy, but you’re welcomed to u…

  • Security Checkpoint Google Passkeys

    Security Checkpoint Google Passkeys get us all one step closer to our goal from earlier this year to have secure simple sign ins.

    Security Checkpoin…

  • Security Checkpoint Google 2SV

    Enable Google 2SV for Multifactor Authentication

    Security Checkpoint Google 2SV can be enable for proactive protection on your Google account.

    <...

Everyday InfoSec Cyber Security Tips

InfoSec Cyber Security tips are here to keep you protected from cyber threats online. Information Security, or InfoSec, is a growing concern for everyone. We live increasingly on our computers, smartphones, online, and in the cloud. And why not? We can work with people around the world, telecommute, turn in school assignments, research with access to more information in split seconds than most people in all history had. Get quick tips for improving your Cyber Security and protect all your bits here.

firewall icon

But I don’t have to tell you that your information isn’t secure nor is it private by default. You’ve already heard the news reports: this social media site got hacked, your credit was hacked so you’ve got a new card in the in the mail, scam calls swindled people out of their money. It’s enough to make your head spin.

Don’t Panic. This new series of bite-sized blog posts will give you practical tips to understand and mitigate data privacy and cyber security threats in your life. Each post will take less time than it takes to get a cup of coffee!

There’s even quite a few quick, easy, and free ways to start like searching with duckduckgo.com.

While you’re here see how we’ve helped other clients achieve success. You might get some good InfoSec Cyber Security Tips for your own organization!

Mac Mini's are new! Get a memory upgrade cheaper!

Save on Mac Mini  Memory Upgrade

If you’re like me like I know I am, you’re excited about Apple releasing the new Mac Mini 2018 model. After waiting 4 years for a new one, Apple’s taken customer feedback and made a better machine for everyone.

2018 Mac Mini
2018 Mac Mini

But you don’t have to take my word for it, just cruise on over to Apple’s Website and see the new Mac Mini’s for yourself.

While you are there, if you are thinking about getting a new one, consider if you want to pay their premium to get a good amount of RAM Memory. You will likely want more than the baseline 8 GB. I’d consider that acceptable today but only in laptops purchased for those who do not intend to do much multitasking or running memory intense apps (like those used for graphic design, video editing, etc.). My recommendation is no less than 16 GB RAM for a laptop and a desktop PC like the Mac Mini should really have at least 16 GB and I’d recommend 32 GB.

TL;DR: If you want to have a faster, more responsive Mac Mini but you don’t want to pay what Apple charges, send me an email and we’ll get you fixed up for less of your hard-earned cash.

Mac Mini 2018 RAM Memory options:

Base Models: $799 | $1099 (Both come with 8 GB RAM in baseline configuration)

Upgrade RAM to:

16 GB … Apple Price +$200 … Oak City IT Price +$180 … You Save $20

32 GB … Apple Price +$600 … Oak City IT Price +$400 … You Save $200

64 GB … Apple Price +$1,400 … Oak City IT Price +$1200 … You Save $200

Please note that this offer is only good for people and companies in the Raleigh, Durham, Chapel Hill, NC Triangle Metro Area as we will need to meet in person for the labor to install the upgrades. This also will require some amount of lead time for the parts to ship in. Quoted prices for Oak City IT upgrades all include parts and labor, you will not pay more than what is listed. Payment is due upon acceptance of request by customer.

If you’d like to request this service or chat with us about your other IT needs send us an email!

Have an older Mac that needs a repair or upgrades? Check out our Workstation Hardware Services Page.

 

Windows 10 Free Updates Last Chance

Get Windows 10 Upgrade for free until December 31st, 2017.

Microsoft quietly announced they will discontinue giving away free upgrades of Windows 10 to genuine licensed users of Win 7, 8, and 8.1 at the end of this month.

If you’ve been holding out and still use earlier versions of Microsoft’s system software, consider using that link and going through the process to upgrade your PC. Allegedly Win 7, 8, and 8.1 (in addition to Win 10) all got patches for such vulnerabilities as the recent KRACK WiFi security risk. Microsoft may not support any version other than 10 in the future.

On the fence on whether or not to upgrade? We can’t make the decision for you, but we would love to help. Windows 10 is worth it for the security and continuous support alone. While functionally Win 7 was much better, Microsoft are moving all their support and updates to Win10.

What you save by upgrading for free this year:

Retail pricing information:

Edition Pricing
Windows 10 Home US $119
Windows 10 Pro US $199
Windows 10 Pro Pack US $99

To keep it 100, there are reasons you may not want to switch to the newer version. They boil down to two main ones:

  1. You don’t want to participate in the testing of new, experimental features. This only happens if you have the Home version, Pro users should not have this problem.
  2. You are worried about the data collected and distributed by Microsoft through Windows 10. This again should be better for Pro/Enterprise users, but if you are worried about surveillance, stick with the Windows you know and already use.

You should upgrade if neither of those two considerations concern you.

Windows 10 Upgrade
Windows 10 Upgrade

You can read more about the built-in surveillance from Forbes written by Gordon Kelly with words from Microsoft VP Joe Bellfiore.

For more on security updates, performance tweaks, and time-and-money-saving tips check out our blog, follow us on twitter @oakcityit, and follow our facebook Oak City IT page.

Security Alert: macOS High Sierra vulnerability and patch

Important security update for macOS High Sierra

If you use a Mac, chances are good that you enjoy the usually high level of security on the system. This week, however, a software craftsman discovered a vulnerability and reported it to Apple. The latest version of macOS “High Sierra” or 10.13.x can allow people to gain full system access (root access) via the internet with VNC or using your Mac in person.

What should you do? First, as always, don’t panic. Vulnerabilities are always potential for hackers to subvert your computer for their own intentions, but don’t mean anyone has done so to your computer yet. Check your version of macOS/OSX by clicking the Apple logo  in the taskbar at the far upper left on your screen. Select About this Mac, the first option. See if you have High Sierra or 10.13.x like so:

About this Mac
System Information in “About this Mac”

If you don’t have High Sierra Version 10.13.x, don’t worry this issue doesn’t effect you.

If you do, take a few minutes to grab this easy patch to the vulnerability with Apple’s official update.

Click on the Apple system logo in the upper left again  > App Store… # Updates.

The App Store updates page loads where you can select the system update and install it. That’s it, you’re done! You don’t even have to reboot.

Security Update on macOS App Store
Security Update on macOS App Store

However if you are curious about this issue how it was discovered and resolved; read more from Apple engineers via 9to5 Mac

Or check out a Software Craftsman Lemi Orhan Ergin who first discovered and reported this flaw to Apple at Medium.

For more on security updates, performance tweaks, and time-saving tips check out our blog, follow us on twitter @oakcityit, and follow our facebook Oak City IT page.

Quick Tips: Why you need HTTPS,SSL now

Why you need HTTPS and SSL now: October’s Google Chrome update

HTTPS and SSL are ready for you, but are you ready for them? Visit your website. Do you see the green padlock informing you that you have a secure SSL certified connection. If not you will lose up to 60% of your web traffic after this October. Why is that? In October’s update 62 for Google Chrome users will get warnings if they attempt to visit an insecure HTTP only site. Chrome is a browser that is used by 60% of all people on the web. Warnings of security problems will scare away anyone visiting your site for business or personal reasons.

Don’t take our word for it, view Net Market Share’s report on how the majority of Internet users prefer Google Chrome

View our Web Services Offered and Security Consulting Services

View a quick video Explanation of HTTPS for Web Security

An example of a securely configured site:

HTTPS in Google Chrome
HTTPS and SSL installed and securing website

 

IT Glossary: SEO

IT Glossary: SEO (Search Engine Optimization)

Glossary definition: Search Engine Optimization or SEO is the process of improving your website’s performance and content to reach more people. In addition to other IT services we enjoy helping you with your website development needs.

When setting up an SEO strategy, you want to consider keywords and setup tools to measure it.

First, let’s setup a way to measure your progress. Assuming you own your organization’s website, we will focus on using the tools Google Analytics and Search Console. In this example, we use WordPress for our website so we will use a WordPress Plugin. Yoast SEO provides a great tool for managing your site’s SEO. They offer a free or lite version which will serve our needs just well for now. They also offer a premium version of their plugin which is certainly worth purchasing when you need more features to market your website.

Since Yoast SEO will manage the connection, we will start by installing it on WordPress. Login to your WordPress admin panel, usually at www.yourdomain.com/wp-admin/ and go to the dashboard. Please note that you’ll need to replace www.yourdomain.com with your website’s actual URL.

Next, select Plugins and Add New on the left side bar.

Add WordPress Plugin

Type “Yoast” in the Search field and use the Install Now button.

Install Yoast SEO

To get started using Yoast SEO we need to connect it to your Google Analytics account. Find the new Yoast SEO icon which looks like ‘Y SEO’ and click on it. From there navigate to the Webmaster Tools Tab section and you’ll see a blank area beside Google verification code (marked 3 in the screen below). Leave this here for now, we will come back to it later. Open a new browser tab for the next setup in Google.

We will cover Google Analytics and Google Search Console in our next post, but it you’re an overachiever and want to do it yourself you can click the link in the Yoast SEO plugin configuration called “Get your Google verification code in Google Search Console.”