The True Cost Of Migrating On-Premise Infrastructure To The Cloud

An abstract image depicting the cost of migrating on-premise infrastructure to the cloud.

With the shift in cloud-based solutions showing no signs of slowing down, we often think about the true costs of cloud migration.

Organisations are enticed by the cloud’s promises of scalability, flexibility, and cost-efficiency. However, the decision to migrate presents some advantages, but it is also valid to note the drawbacks. Especially, when the actual cost can extend beyond the budget, for this reason, we see many businesses flip-flop between the two worlds. Confused and uncertain about the level of commitment and the lack of strategy, leadership is often faced with difficult decisions that can potentially harm the business.

In my experience, there is a lack of understanding of the scope: the benefits and the costs involved in making these choices. In this article, I delve into the multifaceted aspects of migrating on-premises infrastructure to the cloud, unravelling the true costs of migration, hoping to help you make an informed decision for your business.

So What’s Positive About Cloud Migration

 

Scalability and Flexibility:

The cloud enables organisations to scale resources dynamically according to demand. Unlike on-premises infrastructure, scaling often requires substantial upfront investment and time-consuming processes.

This agility enables businesses to adapt swiftly to fluctuating workloads, enhancing operational efficiency and boosting customer satisfaction. For the first time, we have such a large degree of flexibility; it requires a shift in mindset from the sizeable single server instances to the flexible containerised (load-balanced).

Cost-Efficiency:

Cloud computing offers a pay-as-you-go model, eliminating the need for hefty upfront capital expenditure on hardware and infrastructure. Additionally, organisations can benefit from economies of scale as cloud providers leverage their vast infrastructure to offer services at competitive rates. Moreover, the cloud reduces ongoing operational costs associated with maintenance, upgrades, and energy consumption, leading to long-term savings. This has never been more important with the growing cyber threats.

Some instances of lacking upgrades for legacy and patching can leave businesses at risk, now more than ever. Let’s explore this in more detail.

Enhanced Collaboration and Accessibility:

By migrating to the cloud, businesses transcend geographical boundaries and facilitate seamless team collaboration. Cloud-based tools enable real-time access to data and applications from any location, fostering productivity and innovation. This accessibility offers a more agile and responsive work environment, empowering employees to collaborate efficiently, irrespective of their physical location.

Improved Security and Disaster Recovery:

Cloud providers invest heavily in robust security measures and compliance frameworks to safeguard data against cyber threats and breaches. Additionally, cloud platforms offer built-in redundancy and disaster recovery mechanisms, mitigating the risk of data loss and ensuring business continuity by leveraging the expertise and resources of cloud providers and organisations,

If you think, “Nothing beats my 3-2-1 backup” and/or “My disaster recovery is better than the cloud”, then you are wrong! It takes a lot more technology and resources to come anywhere near the scalability and protection of the public cloud. You may get close, but it will always be at a different level than Microsoft, Amazon, or Google can offer in comparison for a fraction of the costs.

The Negatives Of Pushing Your Business Into The Cloud.

 

Hidden Costs and Vendor Lock-In:

While the pay-as-you-go model initially appears cost-effective, organisations may encounter hidden expenses associated with data transfer, storage, and bandwidth usage. Moreover, as businesses scale their operations on the cloud, they may become susceptible to vendor lock-in, wherein switching providers or migrating back to on-premise infrastructure entails significant complexity and cost. This dependency on a single vendor can limit flexibility and hinder strategic decision-making.

Performance and Latency Issues:

Despite advancements in cloud technology, organisations may encounter performance and latency issues, especially in scenarios where real-time processing and high throughput are paramount. The physical distance between users and cloud data centres can introduce latency, impacting application responsiveness and user experience. Additionally, shared resources in multi-tenant cloud environments may lead to performance degradation during peak usage periods, necessitating careful optimisation and resource allocation.

Compliance and Regulatory Concerns:

Migrating sensitive data and applications to the cloud raises compliance and regulatory challenges, particularly concerning data sovereignty, privacy, and industry-specific regulations. Cloud providers operate globally, which may conflict with jurisdictional requirements governing data residency and protection. Compliance with diverse regulatory frameworks demands meticulous planning, robust encryption, and contractual agreements to safeguard sensitive information and maintain regulatory compliance.

Dependency on Internet Connectivity:

The reliance on internet connectivity represents a fundamental vulnerability of cloud-based infrastructure. Organisations may encounter service availability and productivity disruptions due to internet outages or network latency issues. Moreover, data privacy and security concerns may deter businesses from fully embracing cloud solutions, for instance, regions with inadequate internet infrastructure or heightened cybersecurity risks.

Summary

Migrating on-premise infrastructure to the cloud entails a complex interplay of benefits and challenges, each significantly impacting operations’ overall cost and efficiency. While the cloud offers unparalleled scalability, flexibility and cost-efficiency, organisations must navigate potential downfalls, including performance issues, compliance concerns and dependency on internet connectivity. By conducting thorough analyses of regulatory requirements and implementing robust security measures, businesses can unlock the full potential of cloud computing while mitigating risks effectively. Ultimately, the actual cost of moving to the cloud transcends financial considerations, encompassing strategic, operational, and technological implications that shape the future trajectory of organisations in the digital age. The first step is the cloud migration assessment of a business. This is something that Planet IT can help with as a subject expert.

 

If you want to talk to one of our experts about how we can help your business review its environment and plan to move to the cloud, please call 01235 433900 or email [email protected]. If you want to speak to me directly, you can contact me via DM or at [email protected].

Read more about Cloud Implementation Strategy.

How to Create and Implement a Cloud Strategy

 

The Onion Approach to Cyber Security – Data Security Defence in Depth

Shrek image on the abstract onion background.

In Shrek’s words (Well, sort of), “Onions have layers. “Cyber Security” has layers… You get it? They both have layers.” He has a point!   

You may have heard of the term Defence-In-Depth. The principle is that the more “layers” of security, the better protected it will be from the threat actors who seek to affect your business, damage your workflow and disrupt your profitability. In the cyber security space, we often liken this approach to an onion, and I cannot liken anything to an Onion without seeing Donkey’s face as Shrek explains the principle of having layers! 

In this article, we’ll peel back the layers (pun intended) to understand why having multiple security measures is crucial for safeguarding our valuable data. Most importantly, how and why your business, regardless of size, needs to be taking the onion seriously and ensuring you’re not leaving yourself woefully underprepared.  

Having worked in the IT and Cyber Security space for over 15 years, I have seen first-hand the devastation, disruption and loss of business caused by a failure to take a layered approach to protection, so much so that I have even had the unfortunate pleasure of seeing well-established companies fold due to their lack of investment in cyber security.  

The “defence in depth” strategy emphasises creating multiple layers of security around various components in your IT environment. Let’s explore these layers and understand their significance. 

The Onion Approach To Cyber Security

Imagine an onion: it has concentric layers that wrap around its heart. Similarly, our data needs layers of protection. In this scenario, our data, our intellectual property, and our customers are the heart of our onion! However, we should consider the outside layers first, as they are the most vulnerable to the first attack. 

Planet IT and Sophos AI Cybersecurity event

People, The Human Layer (AKA The Human Firewall)  

In any business, the most significant risk to your data security is always your people. We are all human, we all make mistakes, and therefore, we all need the training to understand how to reduce the risk you pose to the business and how best to protect the system you use every day. I call this the Human Firewall, the largest surface and the easiest to harden and develop. However, this is usually the most underdeveloped across all the businesses you see that have suffered a cyber attack. To build this layer, you should; 

Implement strong Security Policies: Educate users about best practices, how the business expects them to interact with the systems and data and what could go wrong if they don’t. 

Have strong Business Conduct Guidelines: Promote security awareness by giving the staff all the training to correctly use the system and strong guidelines on what happens when you fail to adhere to the expectations. 

End User Training and Test: Test your users every month, train them every six months and don’t always use the same training and testing. You should have strong Phishing training, cyber security and data protection training in place that should involve regular assessments, training and re-evaluation. Don’t allow complacency. 

Comply with Local Regulations: Ensure that your staff know the regulations and expectations of your operational locations, be that EU, UK, US or any other regional regulation; now, knowing is not a justification! 

Physical Access: Locked Rooms and Restricted Areas  

It goes without saying that the physical protection afforded to any office, data centre, server room, or workspace is critical to the implementation of reasonable security standards. It is also critical when we think about how we stop the bad actors from gaining entry to well-digitally protected systems. This is often an area where IT teams pass off the reasonability to facilitate or disregard interest in site management, but this should never be the case. 

Secure physical spaces prevent unauthorised entry. You need to ensure that every server room door is locked, that all data centres have restricted access, and that access control mechanisms are deployed around your business with the correct level of entry and authority for all users, roles and responsibilities. This should be paired with CCTV and a valid security system. 

Pharma IT Support

Network Security: Fortifying the Digital Perimeter  

This usually is where most IT professionals and business owners think cyber security starts and ends. This is simply not true. This is a big part of the puzzle, but at this point, we have already broken through two layers of the onion, and we are dangerously close to risking it all.  

You need to consider the breadth of the solutions you choose when it comes to this layer, as we need to cover all points of ingress or lateral movement and not just consider the edge of the network. We will often see people think about the edge too much, forgetting the dissolving edge following the pandemic and moving to remote and hybrid work. 

Local Area Networks (LANs): Secure switches, routers, and firewalls; this is the physical network. I would expect to see a robust firewall or SASE solution tied into a single well-respected vendor for switching with your internet provider in most cases offering you a robust router which is secure and outside of your DMZ and the direct risk profile of your business. 

Wireless Networks: WIFI, it is all about Implementing strong encryption and access controls. You need to ensure that your WIFI does not allow access to business systems or devices that are not trusted. In this regard, you should use a well-known vendor, have at least user-based authentication, separate SSIDs for staff and guests, and have appropriate ACLs in place backed by your LAN. 

Intrusion Prevention Systems (IPS): In most cases, this will sit on your firewall and detect and block suspicious network activity. However, when you move into the medical, pharma or bio-medical space then, you need to consider that you may require IPS internally in your network also to prevent insider lateral spread. 

Remote Access Servers: There is always a case where someone needs to gain access to the system for legitimate reasons from outside your business. Implementing a tool like Azure Virtual Desktop or Windows 365 to provide secure and controlled access is critical. 

Network Operating Systems (OS): If you want to be protected, you need to keep them updated and hardened. It goes without saying that if you are an ISO 27001, Cyber Essentials or CE Plus certified business, then this should be second nature to you. Once a device loses support from a vendor, this is a risk and must be removed from the system. There is no excuse for running a legacy operation system in 2024; you can use tools to virtualise legacy platforms, isolate them from the network and remove the underlying OS risk. 

Voice Security: Protecting Communication Channels 

This is often forgotten about. IT professionals on legacy will have passed the phone system to a 3rd party or another team. However, with the integration into tools like Teams, this becomes a thing of the past. 

Private Branch Exchange (PBX), Voice Gateways and Voice Mail Services: Secure legacy phone systems by removing them from your core network and placing them on ACL-controlled VLANs with restricted access and locked-down ports. Using a solid network that uses Voice VLANS can go a long way to removing this risk. If your phone provider doesn’t know about this or how to do this, then they are stuck in the past. Security is key. All of this still applies if your phone system is hosted or running on someone else’s physical kit. 

Unified Communication: Secure real-time communication with relevant user controls, physical restrictions and tools like conditional access and multi-factor authentication (MFA/2FA). You do not want a bad actor making calls from your platform and tricking your customers into thinking it’s you. 

Endpoint Device Security: Covering All Devices  

One of the most significant devices you own will be lower risk. Most, if not all, will have a strong Anti-virus and Anti-malware product in place that contains a Zero Trust approach and offers real-time protection. But this goes beyond simply slapping anti-virus products onto your laptops. 

Printers, Scanners, Desktops, Laptops, Tablets, and Smartphones – each device needs protection; this should be two-fold. It should be enrolled into an MDM, restricted on the network in terms of its access and then protected by your AV tools and, if you can, protected by a 24/7 Managed Detection and Response service.  

Planet IT Cybersecurity Team

Server Security: Safeguarding the Heart of IT 

Then we get to the core of it, where your data sits and where the risk is highest. This applies if you are on-premise, in a data centre or in the cloud. You need to manage the risk and ensure that the core functions and protection and that you maintain good heart health! 

Operating Systems (OS): Regular patches and security configurations. As I said above, this goes without saying. You need to have the protection in place, and this starts with regular patching. Even a 24/7 business needs to have downtime windows to ensure systems and patches are up to date. If you can’t do this then the architecture of your environment is wrong, and you need to look at role load balancing and expanding your operational system to allow for proper updates and patching. 

Applications: You need to know not only what you are running but also who it is from, and when developing internally, use secure coding practices. Applications tend to be the weak link on a server and often are the gateways that threat actors use to enter a system. Having a regular patching cadence and reviewing who you are buying applications from is critical. 

Databases: If you are storing data, it should have encryption, access controls, and auditing as a minimum, with the protection that is afforded to the data being as high as it can be without implementing tooling that prevents data access. 

Why the Onion Approach Matters 

Hardening the Target: By forcing intruders to navigate multiple security controls, we make it harder for them to reach our data. This will prevent them from getting the easy win. The more we can build breadth and depth in our defence, the less risk you have. 

Risk Management: Balancing both security and performance is crucial. Too restrictive security affects flexibility, while leniency invites risks. However, no one has stood following a breach and said, “We had enough protection”, so look at the risk profile and really understand if you think you can accept a risk and how likely it is that a threat actor will see that risk as an open door. 

Acceptable Risk Level: Evaluate the impact of vulnerabilities and the probability of events. The onion approach helps find the right balance but is not the complete answer. You will need to review, access, develop and grow your business. 

In the complex realm of IT security, thinking of cyber security like an onion can guide you. Look to build layer by layer to develop a robust defence strategy and ensure your data remains safe. 

So, embrace the onion approach—because cybersecurity is complex, just like Ogres, and at the end of the day, it’s for protecting what matters most. 

Remember, security is a journey, not a destination, so keep building those layers! 

If you want to talk to one of our experts about how we can help your business secure itself and the benefits the Onion approach could have for you, please call 01235 433900 or email [email protected]. If you want to speak to me directly, you can contact me via DM or at [email protected]. 

The Cyber Observe Orient Decide OODA and Act Framework

Microsoft Copilot for Security: Empowering IT Teams with AI-Driven Insights

copilot for security

Organisations all face an uphill battle against sophisticated and ever-changing threats. As adversaries become more cunning and leverage AI and ML to deliver more complex attacks, defenders need innovative tools to stay ahead. This is where Microsoft Copilot for Security, a ground-breaking solution that combines the power of artificial intelligence (AI) with security expertise to enhance threat detection, response, and overall cybersecurity security posture, comes in. On the 1st of April Microsoft releases, to all Microsoft 365 customers, the ability to gain the intelligence of a threat analyst at the press of a button.

Understanding Microsoft Copilot for Security

What makes up Microsoft Copilot for Security? The product is built from Microsoft’s Copilot platform, leveraging their bespoke blend of the Open AI engine and the threat data they have from the world’s largest endpoint dataset, but it is so much more than that; here are some of the key components that makes Microsoft Copilot for Security different.

The Fusion of Language Models

At its core, Microsoft Copilot for Security is a fusion of two critical components: an advanced large language model (LLM) and a security-specific model. This unique blend allows it to understand and address security challenges effectively but without losing the human and natural level compute understanding gained via an LLM. By leveraging the vast amount of data generated daily (approximately 65 trillion signals) that Microsoft has access to because of its Defender, 365 and Windows platforms, Microsoft Copilot for Security distils relevant insights for you as a defender.

Guided Insights and Actionable Recommendations

Microsoft Copilot for Security acts as a trusted advisor, providing actionable guidance to security teams. Here’s how it works:

  • Signal Interpretation: The solution processes an array of signals, including threat intelligence feeds, network logs, and endpoint data. It identifies patterns, anomalies, and potential threats.
  • Contextual Summaries: Instead of drowning defenders in raw data, Microsoft Copilot for Security generates concise summaries. These summaries highlight critical events, vulnerabilities, and emerging risks.
  • Threat Prioritisation: Not all threats are equal. Microsoft Copilot for Security prioritises incidents based on severity, impact, and relevance. It ensures that defenders focus on what matters most.
  • Step-by-Step Playbooks: To empower junior staff, Microsoft Copilot for Security offers step-by-step playbooks. These guides simplify incident response, ensuring consistent and effective actions.
  • Reduced Response Time: With Microsoft Copilot for Security, response times shrink from hours to minutes. Defenders can swiftly investigate, contain, and remediate threats.

IT can save you money

Integration with Microsoft Security Solutions

Microsoft Copilot for Security seamlessly integrates with the vast array of Microsoft security products, which many of you will be using or will have access to:

  • Microsoft Defender XDR: Prevents and detects cross-domain cyberattacks using AI-driven insights.
  • Microsoft Defender for 365: Pulling threat data from Microsoft Graph and your 365 environments to provide AI-driven insights.
  • Microsoft Sentinel: Collects security data from diverse sources (cloud, on-premises, and hybrid environments) and correlates alerts.
  • Microsoft Intune: Protects devices, enforces compliance, and mitigates threats across endpoints.
  • Microsoft Defender Threat Intelligence: Exposes suspicious infrastructure and provides dynamic threat feeds.
  • Microsoft Entra: Safeguards identities and secures access to resources.
  • Microsoft Purview: Ensures governance, protection, and compliance for data.

Empowering Defenders at Scale

Microsoft Copilot for Security democratises security expertise and puts it in the hands of all, regardless of your experience of exposure to the threats your business is seeing:

  • Natural Language Interaction: Defenders can converse with Microsoft Copilot for Security using natural language. It feels like having an AI-powered security expert by your side. This gives you the quickest route to the information you need while using the language you know rather than throwing logs at you.
  • Efficiency and Consistency: Junior security analysts benefit from guided playbooks, while senior experts offload repetitive tasks. The result is a more efficient and consistent security team.
  • Cloud-Based AI: Microsoft Copilot for Security operates in the cloud, enabling real-time updates and scalability. There is no agent to install, and no extra tools to host. This is all delivered as SaaS.

Microsoft Copilot for Security isn’t just a tool; it’s a force multiplier for IT Teams. By harnessing AI, contextual insights, and expert guidance, organisations can proactively defend against threats. As the threat landscape evolves, Microsoft Copilot for Security remains a steadfast ally, empowering defenders to protect their digital assets and maintain cyber resilience.

Remember: In the battle against cyber adversaries, having a Copilot can make all the difference.

If you want to talk to one of our experts about how we can help your business secure itself and make the most of AI and Microsoft Copilot, please call 01235 433900 or email [email protected]. If you want to speak to me directly, you can contact me via DM or at [email protected].

 

Microsoft 365 Copilot What's New

 

Cloud Security Posture Management, Why you need it!

Cloud Security Posture Management

It’s time to discuss the importance of moving to an Opex model, the drive towards consumption-based usage and the impact on technologies like Microsoft Azure, as well as the importance of protecting Cloud resources and security when you move resources to the cloud. This article looks at how we put these principles into practice in Cloud Security Posture Management.

What is CSPM And Why Is It Important

Cloud security posture management (CSPM) is critical for any business moving its infrastructure to Microsoft Azure. CSPM helps organisations identify and remediate security risks in their cloud environments, to ensure their data and applications are protected. This rather preventative approach helps avoid any disasters!

When moving to the cloud, businesses must ensure that their security posture is robust and able to withstand the unique challenges of the cloud environment. Once you move to the cloud, you are placing only some, but not all, of the responsibility for the service provided.

In this shared responsibility model, the level of understanding of your risks is critical. This is why CSPM tools are so essential. They provide a comprehensive view of the security posture of an organisation’s cloud environment. It allows them to identify and address vulnerabilities and misconfigurations that could expose their data and applications.

Automation and Benefits Of CSPM

One of the greatest benefits of CSPM is the ability to automate the process of identifying and remediating security risks. Taking the human out of the equation often results in a better, faster, and more secure platform in the long term.

This is particularly important where the scale and complexity of the environment make it difficult for businesses to keep up with the constantly evolving threat landscape. CSPM tools can automatically scan the cloud environment for vulnerabilities and misconfigurations. This alerts security teams to potential risks and provides the information needed to take action.

CSPM also gives businesses greater visibility into their cloud environment, allowing them to monitor activity and detect unusual or suspicious behaviour. With the correct visibility, you can trust that the systems you have in place are configured and protected to the required standard.

The dynamic nature of the environment can make it difficult for businesses to keep track of changes and activities. CSPM tools provide real-time visibility into the cloud environment, allowing security teams to identify and respond to potential threats quickly. Being able to see who has made changes, what risks you have, and the overall nature of your cloud posture is invaluable.

Complying with Standards and Regulations

Many businesses are subject to strict regulatory requirements, and failure to comply can result in significant fines and reputational damage. CSPM tools can help businesses ensure that their cloud environment complies with relevant standards and regulations, reducing the risk of non-compliance. If your business needs to hit Cyber Essentials, ISO 27001 or PCI-DSS, then CSPM is the way to go

In summary, CSPM is essential for businesses moving their infrastructure to Microsoft Azure. It gives businesses the visibility, automation, and control they need to ensure their cloud environment is secure and compliant. By implementing a robust CSPM solution, businesses can protect their data and applications from threats, reduce the risk of non-compliance, and maintain the trust of their customers and stakeholders.

If you want to talk to one of our experts about how we can help your business secure its cloud environment and the benefits a CPSM could have for you, please call 01235 433900 or email [email protected]. If you want to speak to me directly, you can contact me via DM or at [email protected].

 

Microsoft 365 Copilot What’s New For 2024

Microsoft 365 Copilot What's Newhttps://www.planet-it.net/wp-content/uploads/2024/01/Copilot-post.jpeg

In today’s fast-paced business environment, staying on top of your workload can be challenging. That’s where Microsoft 365 comes in. This AI-powered productivity tool is designed to help businesses of all sizes work smarter, not harder.

With the removal of the 300-user gap in January, this tool is now available to businesses of all sizes and will allow SMEs/SMBs to engage in the world of generative AI.

What is Microsoft Copilot? 

At its core, Copilot 365 is a sophisticated processing and orchestration engine providing AI assistance. The software combines the power of large language models with data from your Microsoft Graph and the knowledge of the internet to help you work more efficiently. Something that no other tool can currently do. For instance, ChatGPT needs access to business data or the internet hence why the results are limited.

What is new in Copilot? 

Since there has been so much change in January alone for Microsoft 365 Copilot, we list the top 10 list of features which transform the way, you work.

1. Intelligent search

Copilot 365 can help quickly find the information you need, whether it’s in your emails, chats, or documents. With its advanced search capabilities, you can quickly locate the information you need, even if it’s buried deep within your files. You no longer need to be a search wizard to break down the barriers of document locations.

2. Summarisation

Copilot 365 can summarise long documents or emails, so you can quickly get the gist of the content without reading through everything. It saves so much time getting to the core of the text and avoiding all the white noise.

3. Email drafting

Copilot 365 can help you draft emails, saving time and effort. Its advanced natural language processing capabilities can generate well-written emails that convey your message effectively.

4. Document generation

Copilot 365 can help you create documents, such as reports or presentations, using data from your Microsoft Graph. This can save you time and effort, allowing you to focus on more critical tasks. This is so powerful if you are in any role where you often produce reports which require a presentation, Copilot takes the work out of doing it.

5. Task management

Copilot 365 can help keep track of your tasks and deadlines, so you never miss an important deadline. With its advanced task management capabilities, you can easily organise your workload and stay on top of your responsibilities.

6. Meeting Scheduling

Copilot 365 can help you schedule meetings with your colleagues, considering everyone’s availability. With its advanced scheduling capabilities, you can easily find a time that works for everyone without going back and forth with multiple emails. With options like Follow Meeting and Copilot-driven notes, you get so much more from meetings!

7. Language Translation

Copilot 365 can translate text from one language to another, making communicating with colleagues or clients who speak a different language easier. With its advanced translation capabilities, you can easily bridge language barriers and communicate effectively. This is great for working with international partners and clients.

8. Voice commands

Copilot 365 can be controlled using voice commands so that you can work hands-free. With its advanced voice recognition capabilities, you c

an easily interact with the tool using your voice, allowing you to work more efficiently.

9. Personalisation

Copilot 365 can be customised to suit your needs and preferences. With its advanced Personalisation capabilities, you can tailor the tool to your specific requirements, ensuring it works how you want it to.

10. Integration with Microsoft 365

Copilot 365 is fully integrated with Microsoft 365, so you can use it seamlessly with the other tools in your productivity suite. This allows you to work more efficiently, easily switching between different tools without wasting time. No other tool can do this; this is where the power exists

In conclusion, Copilot 365 is a powerful tool that can help businesses of all sizes work more efficiently and effectively. With its AI-powered capabilities and seamless integration with Microsoft 365, it’s a must-have for any business looking to stay ahead of the curve. Whether you’re a small business owner or the head of a large corporation, Copilot 365 can help you work smarter, not harder.

If you want to talk to one of our experts about how we can help you get Copilot Ready, please call 01235 433900 or email [email protected]. If you would like to speak to me directly, you can reach out to me via DM or at [email protected]

 

 

 

 

Unleashing The Power Of Microsoft 365 Copilot

Copilot for Microsoft Office 365

Microsoft Copilot for 365  is a chat-based tool that integrates into other 365 applications such as Microsoft Teams, Outlook, and SharePoint. It can learn and understand data from these locations, giving it the ability to answer questions, summarise documents, and more. Copilot is also integrated into the applications, allowing you to use it in real-time to draft emails, summarize emails or Teams chats.

 

Watch our webinar about unleashing the power of Copilot for your organisation

 

How will Copilot change the way we will work?

Microsoft Copilot for 365 won’t be coming after your job anytime soon.  Copilot 365 is there to help make your job more efficient and effective by cutting down the time you would have spent reading unimportant emails or messages, drafting base documents and emails and so on.  It will help you improve your time management skills, professionally write emails and recap your entire working days.

The security and compliance around Copilot

However, Microsoft Copilot 365 poses new security and compliance challenges for businesses as it has access to so much data.  Examples of risk can involve data leaking to the wrong user or a compromised user which could be could be devastating.

Currently, Copilot has inbuilt rules and compliance policies to stop certain actions such as users requesting sensitive data like payslips or contracts. It also has built-in security to only show data that the user would be able to access natively.

It is on Microsoft’s roadmap to integrate this policy into Purview to allow IT admins greater control over copilot security.

If you are eager to harness the full potential of Microsoft Copilot 365 to elevate your business through AI integration in your daily operations, then please call 01235 433900 or email our team of experts at [email protected]. As your trusted Microsoft Solution Partner, we seamlessly guide you through every step – from licensing to integration – ensuring that your investment not only meets but exceeds expectations.

Integrating Generative AI

Integrating Generative AI, Machine Learning and AI

In the dynamic landscape of technology, integrating Generative AI, Machine Learning (ML), and Artificial Intelligence (AI) has become imperative for businesses to stay competitive and innovative.

 

Not since the dot.com era have we seen such a dramatic shift in technology, which has become a part of our everyday lives. 

 

Businesses must adapt and integrate AI, ML and GenAI into their short and long-term IT strategies. To enable employees to access AI tools from their workstations, mobiles and any web-enabled device. 

 

More than ever, IT professionals ought to be committed to developing robust strategies that leverage these technologies to enhance operational efficiency, customer experiences and overall business outcomes. This article will explore key considerations and recommendations for incorporating Generative AI, Machine Learning, and AI into your IT strategies in 2024.

Understanding the Business Objectives:

 

As IT leaders, you must align the adoption of Generative AI, ML, and AI with the broader business objectives.

 

Due to a lack of consideration for your business’s strategic objectives, the improper use and implementation of these technologies may have little or no effect on achieving organisational objectives. In other words, these tools should be complementary and continuously aligned with the organisational strategy. For instance, some technologies may not necessarily support the direction of the business. The same principle applies to the implementation of strategic IT decisions.

 

Conversely, the judicious use of AI can elevate customer service satisfaction and increase operational efficiency, which can lead to gaining a competitive advantage in some shape or form.

 

Crafting an effective IT strategy based on individual business merits will help choose technologies tailored to individual needs that will support development and growth.

 

Talent Acquisition and Skill Development:

 

Investing in talent is crucial for successful implementation. IT leaders should assess the existing skill set within their teams and identify the gaps. This is crucially important as well as your current team’s skill including knowledge of working with IA set vs. AI delivery services.  

Hiring or upskilling employees in areas like data science, machine learning, and deep learning ensures that the organisation has the expertise to drive AI initiatives. Not only focusing on the team who will support it, but your IT strategy must also focus on how you train end users to understand, leverage and validate where AI is used.

 

Establishing a Data-Driven Culture:

 

Generative AI and ML rely heavily on data. IT leaders must foster a data-driven culture within the organisation, emphasising the importance of high-quality, relevant data. It has always been a challenge for businesses to hold data regardless of its quality, relevance, or ability to be reused, ingested, or understood by a system. With AI, both structured and unstructured data can be used, but the data still needs to be relevant if you implement a system to reduce the amount of time your business spends on answering customer queries based on previous fixes but don’t check the previous fixes for validity you are likely to suggest non-solutions and harbour distrust in the system. This involves implementing data governance practices, ensuring data security, and promoting collaboration between IT and business units to derive meaningful insights. Tools like Microsoft Purview are a great place to start when looking into your data and its governance.

 

Creating a Robust Infrastructure:

 

IT leaders need to invest in a robust and scalable infrastructure to support the increased computational demands of AI applications. For most, this will mean looking at a transparent Cloud and edge computing strategy, moving away from private and co-located data centres on dedicated hardware to pooled and shared, scalable solutions like Microsoft Azure, Amazon Web Services (AWS) and Google Cloud Platform (GCP). This becomes critical when you consider that for some AI workloads, you will need specialised hardware such as GPUs, which may be essential IT infrastructure components to ensure optimal performance or gain the results your business requires. For those who want to remain on-premises, then your strategy needs to directly reflect a hybrid cloud approach as you will not be able to run many of these tools in your environment and will instead need to run the toolset where it is best suited be that with the vendor or on a public cloud instance.

 

Implementing Explainable AI:

 

As your strategy reflects how your business increasingly relies on AI-driven decisions, you must ensure that your business, customers, and staff can maintain faith in the solution; therefore, transparency becomes critical. As IT leaders, you should prioritise adopting Explainable AI models that provide clear insights into how AI algorithms arrive at specific conclusions. This transparency builds trust both internally and externally. This is easier said than done with some of the current Generative AI toolings, and therefore, your IT Strategy should reflect how you will tackle this when selecting the tools you will work with.

 

Security and Compliance:

 

Ensuring the security of AI systems is paramount. As an IT leader, you must integrate AI technologies in compliance with industry regulations and standards. Now, most of these AI tools currently take little consideration for the regulations and standards your business might have to reach, be that HIPPA, PCI-DSS, or ISO. Therefore, it will fall to you and your strategic approach to ensure that safeguards are put in place and that you remain in control of your data, its sovereignty and how it is being used. Additionally, implementing robust cybersecurity measures is essential to protect sensitive data and maintain the integrity of AI applications; this does not stop with just placing anti-virus on a system; you will need to think beyond this and engage with the right security partners.

 

Continuous Monitoring and Improvement:

 

AI models require ongoing monitoring and refinement. IT leaders should establish mechanisms for continuous evaluation of AI systems, identifying areas for improvement and adapting strategies based on real-world performance. Regular updates and adjustments ensure that AI applications remain effective and aligned with evolving business goals. Remember that even though a model is good today, it will still be better in 6 months or a year. Also, the data set will age out on models, therefore, you need to ensure you understand how and when this will be updated to support your business. 

 

Collaboration and Communication:

 

Successful AI implementation requires effective collaboration between IT and all business units. IT leaders should facilitate communication, break down silos, and encourage cross-functional collaboration to ensure that AI initiatives align with the overall business strategy. No man is an island, and if you make your safe in this landscape, you will quickly fall behind. While implementing your IT strategy, you engage a cross-business group and work with them to support you in understanding how to engage the wider business and provide training, support, and guidance to maximise uptake and effectively communicate the changes coming.

 

In 2024, the strategic integration of Generative AI, Machine Learning, and AI into IT strategies is critical to business success. IT leaders must align these technologies with business objectives, invest in talent and infrastructure, foster a data-driven culture, prioritise security and compliance, and ensure continuous monitoring and improvement. By adopting a holistic approach, you, as an IT professional, can position your organisations at the forefront of technological innovation, driving sustainable growth and competitive advantage in the ever-evolving digital landscape.

 

If you want to talk to one of our experts about how we can help you with your IT strategy or implementing AI into your business, then please call 01235 433900, or you can email [email protected], or if you would like to speak to me directly, you can reach out to me via DM or at [email protected].

Windows Server 2012 R2 End Of Support – Act Now Or Face The Consequences!

Windows Server 2012 R2 End of Support

If you are an IT professional running Windows Server 2012 or Windows Server 2012 R2 server, you need to be aware that support for these products will end on October 10, 2023. This means that regular security updates, non-security updates, bug fixes, technical support, and online technical content updates will no longer be provided by Microsoft.

This poses a serious risk to your business. You will be exposed to potential security breaches, compliance issues, and performance problems. Alongside several key vendors dropping support for their products as soon as this platform leaves standard support with Microsoft.

You will also miss out on the latest features and innovations that newer versions of Windows Server offer. This includes improved security, scalability, reliability, and efficiency.

Therefore, you need to act now and plan your migration strategy before it is too late. You have two real options and one really bad idea to choose from.

Embrace The Cloud and get all the benefits

Migrate to Microsoft Azure and receive free Extended Security Updates (ESUs) for three years after the end of support. You can move your applications and databases to Azure Virtual Machines and benefit from the cloud’s flexibility, scalability, and cost-effectiveness.

You can also use Azure Arc to manage your hybrid environment and receive automated/scheduled ESU updates and installation. This can simply be a lift and shift for now. Use the three years to get prepared for a newer operating system.

Upgrade your Windows Server

Upgrade to Windows Server 2022 or purchase ESUs for Windows Server 2012. If you prefer to stay on-premises, you can upgrade to the latest version of Windows Server. This will offer enhanced security, performance, and innovation. Alternatively, you can purchase ESUs for Windows Server 2012, which will provide security updates only for up to three years after the end of support. This can only be done if you are on an Enterprise Agreement with Microsoft. For most businesses, this won’t be an option.

Or….

…and you’d be really stupid to do this!

Do nothing and wait to join over 50% of UK-based businesses that suffer a major cyber incident each year. With an unsupported product, it will only be a matter of weeks before a major attack is launched by a threat actor against an operating system using unpatched vulnerabilities.

Whichever option you choose, you need to start preparing now and avoid the risks of running unsupported software.

Don’t know which way to turn…. Then reach out to the Technical Architecture team and we will help you understand your options and support you in the drive to move away from 2012 R2.

We are an IT company based in the UK that advises thousands of businesses, IT managers and leaders on all things Tech. We can help you with your migration plan and ensure a smooth transition to the latest Windows Server solutions. Contact us today and let us help you secure your future.

Windows Server 2012 R2 End of Support

2022 – The Big Technology Winners & Losers

technology winners

As some of you might know, once December comes around, I sit down and take a lookahead at the at the technology that I believe will shape our year.

That article will be released the first week of January so watch this space…

Before that though, I always think it’s a bit of fun to look back at the last 12 months and see how right or wrong my predictions last year actually were.

In a change from previous years, 2022 technology landscape wasn’t as dominated by COVID-19. Instead, we were impacted by other unforeseen challenges such as the war in Ukraine, disaster mini-budgets and the loss of our head of state.

Because of this, some of our forecasts were slightly delayed, but overall, our predictions were pretty spot on. I won’t go into the detail again, but if you want to review our 2022 predictions, click here.

But now, using the powerful tool of hindsight, who exactly were the winners and losers of 2022?

 

Winners

 

Public Cloud

Once again, it has been a huge year for all things cloud technology. IaaS, SaaS, PaaS have, as predicted, accelerated to a new high, despite the critics in the market saying they are unaffordable.

Our customers have moved to the cloud in mass. The key for everyone has been looking at the workload and refining it to be cloud ready. If this is achieved, then workloads are streamlined, and the cloud is undoubtably a success.

The other interesting side effect of the success of public cloud is that the big server producers are all coming out with Hybrid cloud products. This is focused on keeping them in the game for a few more years, with products that allow easy workload migration to the cloud, cross scaling and targeted cloud leverage.

This will only continue in 2023, but my takeaway from it all is that the writing in now on the wall for the traditional server and storage world. HCI and owned equipment for servers is not far behind it.

cloud computing

 

Working From Home

The big companies of the world (mainly in finance) tried to tell us working from home was going to die off in 2022. Did they really believe people would flood back to the office?

This of course did not happen. WFH is here and it’s here to stay, with the focus for IT being on flexibility. The modern employee wants the chance to work where suits them. We are now able to tap into a globally connected market of extremely talented people who have previously been excluded from roles due to geographic location.

With Teams, Zoom, Slack and all the other tools at our fingertips, there is now no reason to not allow complete working flexibility and allow a better work life balance.

This is something that we at Planet IT have openly adopted. Without a doubt, this has seen an increase in people’s overall wellbeing and general approach to work has only gone from strength to strength.

Linux in the Mainstream

Stop right there! STOP!

Before all the IT people of the world lynch me and say “Linux has always been…..” or “Linux is the greatest operating system…..” I am in no way saying that Linux hasn’t been a very viable business operating system for the last 10 years.

Ubuntu as a distribution has been very user friendly and, for a while, even companies like Dell thought it was the future of the desktop consumer OS. Then ChromeOS came along and diverted their attention.

What I am saying is that in 2022, we saw the release of hardware running dedicated builds of Linux which are finally disrupting the market. One of these devices was the Valve Steam Deck, which was so popular this year that pre order took 11 months to fulfil.

However, the key for me is the story behind the hardware which is an operating system free from license costs. This overcomes some of the core challenges Linux has had in the past, compatibility. With this move and Apple’s move in opposite direction, 2023 looks set to be the year more business adopt the platform.

Let’s be honest, most cloud platforms are built around Linux anyway, so it only makes sense!

 

 

Losers

 

Private Datacenters

Déjà vu?

Last year, I said the coffin was ready and that we were about to hold the final goodbye for the private DC. I was pretty spot-on in fairness.

Even though a few hold outs tried to sell a revolutionary approach to private cloud, the final nail in the coffin was the energy crisis. Costs increased and private datacenters had to increase charges to customers. Meanwhile, AWS, Google and Microsoft simply swallowed most of the cost. This left most customers the choice between turning kit off or moving away.

There will always be a place for niche private datacenters for specific use cases, but for 95% of business’ the cloud is the future.

 

Meta

Having an extensional crisis about what the Metaverse is and what their products mean, Meta (previously Facebook) have struggled this year. Loosing revenue from adverts, losing ground to other platforms and heavily investing in Quest and the Metaverse which most people remain skeptical about anyway.

This shift has seen the company slip in its standing and become a bit of an outlier. This alongside a shift by Gen X and Y to TikTok and other faster social platforms is leaving Facebook and Instagram looking dated and doomed to be the next Bebo or MySpace (Sorry Tom!).

Many will say this is a good thing. The power in the hands of these super tech giants with everyone’s data makes governments and individuals nervous. So maybe a few of them shrinking may not upset too many.

P.S I won’t talk about Twitter in this section … because by the time you read anything I put about Twitter, Elon will have made huge changes, maybe renamed or deleted the platform and it will certainly be out of date! 🙂

SaaS Security

Surprised to see this in the technology loser section?

Security, is so important. It is even more important when you’re a company like Last Pass who recently suffered a data breach. They are the last in a long line of companies whose platforms have been compromised in 2022. Therefore, we cannot but think that maybe these big companies need to take platform or software security a little more seriously. This is a common trend and definitely hits my loser list because it shows how even the biggest companies can faulter.

Do better next year big tech, please!

 

The Lightning port

Why!!!??!

Its 2022! Why am I still talking about a micro connector that replaced a 30 pin USB 1 standard?

I will tell you why… because finally the EU has stood up to Apple and told them to get rid! 2022 will be the last year that a £1,400 device comes with a connector which cannot provide fast charging, cannot offer fast data transfer and is proprietary!

Long live USB C or well USB 3.2 or USB4 or Thunderbolt 3 or 4, whatever the standard, just use the same port for a couple of years. This will certainly allow me to cut down on the number of cables I hold onto!

lightening port

Conclusion

2022, like 2021, and 2020, was a year of change. Technology moves at a lightening pace (except, erm, the lightening port). We had some big winners, some little winners but overall, tech developments are moving quicker than ever. While Moore’s law may be starting to fail, the ability of technology companies to innovate is not.

Do you agree with our technology winners and losers list? What tech impressed you this year? Or what did you see crash and burn?

Comment on my post or DM me on LinkedIn, or email me directly on [email protected] if you would like to debate our choices or even talk about how the Planet experts can help you in 2023

 

2021 – The Big Technology Winners & Losers

2021 Best and Worst Technology

Just over a year ago, I sat down to write a technology review of 2020. We had just seen the single biggest transformation that had happened to global businesses in the last 20 years!

The digital acceleration forced upon businesses as COVID-19 hit and government lockdowns continued changed the way that businesses needed to operate. Those who had failed to invest in their IT systems very quickly came unstuck. Businesses looked at their IT teams and demanded their systems be brought up to date.

(If you missed it, you can still read last year’s article HERE)

Entering 2021, I knew it was going to be the year of the cloud, and it very much has proven to be. The global silicone shortages impacting chip production alone assured this. For many business the only choice has to been to go to public cloud and leave the traditional on-premise infrastructure behind. Because of this, and what has turned into a challenging year for different, but somewhat the same reasons as 2020, here is my list of the 2021 winners and losers…

Winners

 

Public Cloud

Both Microsoft and Amazon have this year continued to gather businesses in their ever growing datacenters. This proves that business are finally coming around to the fact that some things can be done better if you let the industry giants do it. I have long believed the future was public cloud. 2020 proved this point with 2021 then accelerating this at a rate that was far beyond anything we thought possible. Business who were steadfast against the cloud removed barriers to get into Microsoft, Amazons and Google’s systems.

Public cloud will in my option continue to be one of the biggest drivers in 2022, with many businesses having an approach of either on-premise with hybrid cloud or full public cloud in 2022. The focus on compliance and data security by the big three continues to make private cloud a challenge to uptake for many businesses as they struggle to complete with the tools and level of protection that Amazon, Microsoft and Google can invest in. Just remember, when moving to Public Cloud that it is a shared responsibility model!!!

Public Cloud

 

Intel

What a difference a year can make! 12 months ago Intel was a shell of its former glory and was looking like a Marvel hero at the end of Infinity War (*Spoolers the hero’s don’t do well in that movie).

With the desktop processor being stuck on an architecture which AMD and Apple had long since surpassed limited to core counts and feeling like it could be a tough 2021 for big blue. Well this all changed with the return of a titan in Pat Gelsinger, after his stint with VMware. Pat returned to put Intel back on the path that he had started them on some 8 years before and successfully accelerated the new chip design out the door.

Dubbed “Alder Lake” the new Intel desktop processor line-up moves away from the traditional design to mirror that of Apple with E and P Cores (Efficiency and Performance). The focus being that E cores can use less power and thus make your laptop battery run for longer. The P cores can be activated to drive the system forward when it needs to complete some heavy compute tasks. These processors were released under the 12-Generation banner and have received praise from across the technology landscape. Windows 11 has specifically taking advantage of the core design and then have shown an experience well above that of the AMD processor with their all power core design.

This has been a good year for Intel and with Pat back in charge, I think we are likely to see them continue to battle Team Red for years to come.

 

Microsoft Windows 11

Windows 10 will be the last operating system you ever need, said Microsoft in 2015.

Well, 6 years later we are all upgrading to Windows 11, a very well thought-out and great overhaul of the Windows operating system. We now have some of the best features of MacOS and Linux with the trusted platform of Windows 10 providing its core.

I am a massive advocate of Windows 11, even if the naming convention is getting a little stupid (but then they could have called it Windows 21 then we all would have been in a much worse place).

In my review of Windows 11 I warned that early upgrades for business can be risky and that Windows 11 offers some challenges. Well I am glad to say, 3 months on my daily driver still remains on Windows 11 and my home device has even been given the upgrade with no real issues to speak off.

I think Microsoft have placed Windows 11 in a great position to be the operating system for businesses and home users in 2022. Hopefully by the later part of 2022 most devices will have moved from Windows 10 and we will finally see the death of Windows 7 (well, a man can dream right?)

windows 11 launch

Losers

 

Private Datacenters

On the exact reverse of the rise of public cloud we continue to see the need for private data center hosting reduce.

Many businesses are asking the question; “what can you do better that AWS, GCP or Azure?”. In the past, this difference was a clear winning feature for private cloud, however as time moves on the realisation that what are ultimately smaller players in the hosting market aren’t able to compete with the uptime, security, financial protection and costs that public cloud offers.

While I still strongly believe there are use cases for private cloud, I think the salesman’s arguments of it being “safer” than the public cloud have all been proven to be subjective and businesses should ultimately choose the best solution for them.

Apple

Second year in a row for Apple in this category, and no it’s not Apple Hate!

Apple have been hit pretty hard this year by two factors: the chip shortages and then a lack of interest in the products in a year where many people upgraded midterm.

2020 has seen Apple’s shares drop quite heavily against the backdrop of a lack of device production and thus device sales. Hopefully for Apple this gives them a kick to invent something new or dramatically different in 2022. As the company that coined the phrase “Think Different” it’s about time they did exactly that.

Apple macbook

Onsite Infrastructure

The downturn of on premise infrastructure continued in 2021 with devices being hard to source due to the chip shortage. Add this to the move to the cloud and we can easily see the onsite infrastructure requirement drop down to a new low. However, we expect this to come back with a vengeance in 2022 as kit becomes available and business adjust to a hybrid approach.

Unfortunately for on premise infrastructure this is being held back considerably by the global supply issues and less so by peoples want for the technology.

 

There has been many more winners this year, with business firing on all cylinders in 2021. However, we have also seen that this year some of the losers have taken a much bigger hit than expected.

I think the major take away for 2022 is that the IT landscape was changed by 2020 in a major way. The needs and wants of business have adjusted and now, as IT professionals, we need to fit around the needs of 2022 and onwards and stop looking to legacy for the solutions.

Whatever 2022 brings I am excited to be at the forefront of matching our customers to the latest and greatest technical solutions.

Looking for a technology partner?
Let’s talk

  • This field is for validation purposes and should be left unchanged.