<img src="http://m1ll1c4n0.com/images/track/27153.png?trk_user=27153&amp;trk_tit=jsdisabled&amp;trk_ref=jsdisabled&amp;trk_loc=jsdisabled" height="0px" width="0px" style="display:none;">

Mitchell Rutherford

Mitchell is Head of Technical at DTE and ensures all DTE solutions and services meet the high standards of our clients. Mitchell also takes a keen interest in technical developments in the industry.
Find me on:

Recent Posts

Cisco's Mid-Year Security Report 2015

Posted by Mitchell Rutherford

06-Aug-2015 11:00:00


INTRODUCTION:

Cyber threats are adapting and industry experts have been talking this year about the groth in the IT Risk Gap. At the start of the year we brough you Cisco's annual security report, a lengthy read for those of us caught up in the hi tech world of Networkl Defense. Here we are 7 months later and how much has changed in this time compared to the report from January.

Read More

3 Reasons Your Network Efficiency is Broken (And How to Fix It)

Posted by Mitchell Rutherford

02-Jul-2015 11:10:00


 

One of my technicians has been working on a client site for the last couple of weeks, the poor lad has been in Las Vegas of all places terrible I know. Whilst on site he got caught up in several conversations with the networking team discussing how they measure network efficiency.  Did they look at how fast data travelled across the network, how much power the network consumed or how easy it was for end users to get what they expected from the network. Of course how you choose to measure the effectiveness of anything within your IT estate is up to you and should be aligned to you business goals. There are any number of tools available out there to help you measure your network speeds and indicators of performance.

Even if your an established Network Manager or your new to the role and inherited a network full of problems, what are the top 3 things that are creating networking to be less than excellent? 

I asked amongst our technicians and clients and this is what they had to say.

Read More

Topics: Enterprise Networks, Network Management, Cisco

Does Your Network Security Strategy Include VoIP Calls?

Posted by Mitchell Rutherford

18-Jun-2015 10:00:00


IP Telephony: Is it secure?:

Securing your business has always been an important task. We keep all of our data under lock and key, you keep your accounts in secure locations and you train and develop your teams to be security concious. We all know that the fight to keep our clients and our business safe is never ending. This week I want to bring you attention to your phones, in particular the areas of your business where you are taking advantage of the power of VoIP. I have been watching the evolution of VoIP with interest since the start of my career in technology way back in the 90's. At the time I was working with an Avaya reseller who supplied the IP-Office system. Back then the networks we had could not really support VoIP and it has taken a little while for our networks to catch up and provide the service required to enable truly business class communications. Now VoIP is a well known communication platform and helps us to connect in the way it was always intended. What many Telecom providers might not have mentioned to you is exactly how easy it is to hack a VoIP call once it has left your network and the impact this can have on your business. 

These days we are all familiar with hacking, and you do not need to be a celebrity to be a high profile target. Imagine the conversations happening across your business and what is involved. Take for example sales and finance teams discussing payment terms and details, highly secure information is being passed verbally on these calls every day. If you are hacked you could find account details, payment information and personal details are being stolen and used for someone else benefit. Where does this leave your business? With a breach you are unaware of, possibly out of PCI compliance and facing hefty fines! 


Read More

Topics: Network Security, VoIP

Backup it up, Backup it up, Let me begin!

Posted by Mitchell Rutherford

09-Apr-2015 11:00:00

If like me you are a child of the 90's you are probably looking at the title to this blog and wondering why I am getting the lyrics to House of Pain's Jump around all wrong. The answer is simple, there are companies out there that are either running on old antiquated backup systems or even worse NONE AT ALL!! So I repeat Backup Backup and let me begin!

Read More

Topics: Back-Up

5 Ways to Reduce Data Center TCO

Posted by Mitchell Rutherford

24-Feb-2015 11:15:00

Across multiple industries the data center continues to expand to keep pace with the pace of digital commerce. Managers of these centers are in a constant fight to try and cut energy consumption and reduce costs associated with running IT estate.

Read More

Topics: Data Centers, IT infrastructure

Backup the issues of disaster recovery?

Posted by Mitchell Rutherford

20-Jan-2015 11:30:00


Cloud_Backup

Every business has to be prepared for a recovery event! From natural disasters through to technology failures, there are a multitude of reasons to make sure that you have backup and disaster recover solutions in place.

This came to my mind after a relative of mine was explaining how their business had lost 2 days of work thanks to something as simple as a leaky roof! Not only did they lose 2 days of productive working due to a poor Disaster Recovery strategy, they also lost all their data from the previous 4 days. You can imagine the impact that this had on the business operation, reputation with clients and ultimately the revenue that was lost over those days and ongoing. 

The Disaster Recovery strategy was based on people taking work home with them in a paper format. Unfortunately however, the staff had already been contacted and told not to attend the office as the site was unsafe and required inspection. Okay, the leaky roof was an understatement, the roof of the warehouse caved in! The end result though was that the great "take work home with you" strategy failed at the first hurdle.

Upon further investigation of this event, I discovered that they are using DAT tapes as backup and this task falls to the office administrator. A lady who has little to no technical knowledge, travels on the bus and is known for being forgetful with handbags. (I can personally vouch for this having had to go and retrieve said bag more than once from the bus depot) 

What type of solution should you look at to get away from these types of problems?

One such solution is cloud backup. Using the power of the cloud to backup your data and providing the ability to pull this back up information from anywhere at any time on any device. That's 2 days my relatives company would not have lost!

Watch the video below to find out more about iomart and how cloud back up services could support your disaster recovery plans. 

Read More

Topics: Network Management, Cloud, Back-Up, Disaster recovery

Is your network Home Alone? Network Security Solutions Worth Your Time

Posted by Mitchell Rutherford

12-Dec-2014 12:30:00

 

Recently I have been working with a number of clients on “beefing up” their network security. I do not know what it is about this time of year, maybe it’s just me, but security always becomes a big discussion as we enter the holiday season. It could be that events such as Black Friday and the large number of transactions flying around online turn this time of year into hunting season for the Cyber Criminal. You can see why when an estimated £281 million (the telegraph) will be spent online in just 1 day why the criminal society would want to target business at this time of the year. It is not just transactions that are getting targeted these days either! Take your intellectual property as an example, how much is it worth? I bet Sony have a price on theirs after they had 5 movies stolen after a cyber attack.

Security is and should be a high priority for any business, you should protect the business, its staff and its assets. It is the way of the world now though that the criminal has gotten sharper and more sophisticated. No longer just throwing various attacks out there, these attacks are becoming more calculated and specific. The cybercriminal does his research and knows who to target, what the security is likely to be and where a good entrance point is! Maybe they were foolishly inspired by Harry and Marv from Home Alone, the would be criminals who do their homework, find their specific targets and access points and try to run off with all the swag they can get. That is until they meet some upgraded and innovative security features in the shape of a young Macaulay Culkin.

Read More

Topics: Network Management, IT infrastructure, Network Security

About this blog

From the latest cutting edge IT products to hot-button technology issues, at DTE we're dedicated to keeping our customers and prospects up-to-date on news events that matter to their business.

Subscribe to Email Updates

Recent Posts

CTA_icon.png

Need network solutions? 

Whatever your aims and pain points, our specialists will meet with you to discuss what you want to achieve from your network infrastructure. 

Let us help you

Call us on 0845 658 8810