

Publish Date
20/04/2022
Categories
Blogs
Azure offers various ways to save money, some of which can be combined to minimise the costs of Azure-based solutions. Over the next few articles, I’ll be discussing some of the different cost-saving options that are available, but first, we need to go over how standard Azure pricing works.
By default, Azure uses a consumption-based, pay-as-you-go (PAYG) pricing model. Under this model, you’re only charged for what you use. Azure uses meters, which I often describe as kind of like how the electric, gas and water meters work in your home. The meters measure usage and at the end of each month, they are read and you’re invoiced the appropriate amounts for what you’ve consumed.
Azure resources tend to fall into one of a few meter types. Some resources only cause the meter to tick up for each second, minute or hour that the resource is “running”, such as Virtual Machines (VMs). When VMs are stopped, the meters for the compute component and any licensing are also stopped.
Other resources cause the meter to tick up as soon as they are deployed, such as Managed Disks which are used by VMs for the operating system disk and data disks. You can’t turn stored data on and off, so these resources keep on incurring a cost for as long as they exist with consumption only stopping if the resource is deleted. The third type of meter measures more traditional consumption such as each gigabyte of data being sent out to the internet – if no data is sent, there is no cost incurred.
Almost all Azure resources are made available in different sizes with related metered unit prices. For example, a VM with 4 vCPU cores costs half as much as a VM with 8 vCPU cores within the same VM family. Many resources are also offered in different performance or capability tiers, such as Standard tier or Premium tier. This provides a lot of choice, allowing resources to be deployed that meet different budgets or requirements.
Some Azure resources also support bursting, which I’ve written about previously. My closing paragraph from that article summarises bursting as “bursting lets you deploy smaller VMs and disks that are aligned your average requirements, rather than your maximum requirements, while still being able to handle short-term demand for increased performance”.
With on-premises IT solutions, the hardware resources were fairly fixed and had to be sized to accommodate peak demand and with consideration for future growth. This often meant purchasing vastly more powerful hardware than was actually required most of the time. You might be tempted to replace on-premises systems like for like with Azure-based ones, but oftentimes this results in resources being under-used. With Azure, you can save money by choosing the most appropriate size and tier of resource for your current needs.
The tier, size and quantity of Azure resources can often be changed very easily and is what is meant when cloud computing is described as being “elastic”. This elasticity when combined with consumption-based pricing offers the flexibility to deploy more accurately sized resources and then adapt them to variations in demand over time. If you need to make a resource bigger, you can. Yes, you will get charged more for it, but make it smaller again later and the price goes back down. Remember, some resources can also be turned off when not needed and stop being charged for altogether. This resizing or powering off and on can even be automated using tools within Azure or from third parties and is another way you can save money in Azure.
In summary, save money by choosing the right size and tier of resource for your needs here and now and then resize them as demands change. However, some services need to be running permanently and have fairly static requirements. For these resources, you may be able to reduce the price in other ways, which I will cover in the future.
Publish Date
12/04/2022
Categories
Company News
Cobweb have recently been involved in fundraising for the Humanitarian Crisis in Ukraine, with initiatives to raise money coming from many different parts of our business.
A collection of essential items was donated by our team with people adding extra items to their weekly shopping, in particular baby products and health essentials. Everything was donated to a charity called Stella’s Voice. This charity is working with refugees from Ukraine in Moldova, and we will be continuing to collect items in our offices.
A raffle was held with Cobweb donating the prizes, raising lots of money for the appeal and making many on the team very happy with the chocolate and wine prizes.
Finally, a sweep-stake was held on the grand national with some of the money being donated. Topped up by some personal contributions, we raised £350 for the Ukraine Humanitarian Appeal, as well as the items shipped to refugees. Thanks to everyone involved in particular the organisers (Lisa & Clare!)
Publish Date
05/04/2022
Categories
Company News
Cobweb are delighted to have been named in the annual Southern Tech 150, a listing of the leading privately-owned technology companies based in the South East, compiled and published by The Business Magazine.
In addition, Cobweb is one of 5 companies from the list nominated for Employer of the Year. This year has seen strong performance by Cobweb including 20% growth and the launch of many new services and products, all whilst transitioning to a fully public cloud-based solutions company.
Cobweb operates in the top-tier of Microsoft UK partners, with multiple Gold competencies, as well as 5 advanced specialisations in Adoption and Change, Teamwork Deployment, Meetings and Meeting Rooms, Linux and Open Source, Microsoft Windows Virtual Desktop.
Managing Director Michael Frisby said: “Our teams are central to our success and our biggest asset. We strive to provide the best environment for everyone that works at Cobweb, regularly consulting and acting on feedback to evolve and enhance the employee experience. Many of our staff have been with us for over 10 years, something we are very proud of.”
With a total of 15 finalists across four categories, judges have identified this shortlist who are now invited, together with the whole listing, to an exclusive dinner at Oakley Hall in Basingstoke on April 27, where sponsors Morgan Lovell, RSM UK and Spectrum IT will reveal the winners.
Publish Date
03/03/2022
Categories
Blogs
I was going to sort it out later. I was too busy. Someone else was in charge of that. I was waiting for the new person to start. I thought it all updated automatically. There wasn’t enough budget this year. I didn’t think anyone would target someone like us….
Some of the reasons that are given when it’s too late. There is no good time to be the victim of a cyber-attack but having the correct protection in place will put your business in the best position to thwart cyber-criminals. No security solutions or procedures can ever claim to be 100% effective, as attacks continuously evolve to evade detection, however there are some fundamental steps that can be taken to minimise risks.
Basic security provided by operating systems, whilst increasingly robust, does not provide the diverse layers of security required in a modern workplace. Ensuring basic settings such as Multifactor Authentication are turned on are essential, but other layers such as back-up solutions, password managers and anti-phishing software, increase these layers to ensure if one aspect is breached further security measures are in place.
Whether you have internal resources looking after your IT or outsource it, regular Security Reviews are essential. Whatever systems you use, security updates will be released on a regular basis including patches for vulnerabilities. Regularly checking these updates and patches have deployed correctly is key to avoiding gaps in your security. Security Reviews can also look at individuals that may not be adhering to company policies and allow you to train and educate these employees.
Employees are and always will be a business’s biggest weakness when it comes to cyber-security. Whilst policies can force certain measures such as how robust a password is, there are numerous other ways cyber-weakness can manifest itself. Phishing emails are one of the main ways hackers infiltrate businesses. Social Engineering of information is something many individuals are unaware of and where hackers can gain valuable intelligence. Behaviours as simple as leaving devices laying around or unlocked are commonplace. As more companies embrace Hybrid Working and Bring Your Own Device employee security flaws increase.
Although security solutions are designed to prevent cyber-attacks, it is imperative there is a disaster recovery plan in place should an attack be successful. Back-up solutions play a key part in disaster recovery, allowing you to revert your systems to a point in time before an attack took place. How often you back up, and how long it will take you to make up the time and data lost between a back-up point and attack, are all considerations that should be taken when implementing a disaster recovery plan.
Any of the above will strengthen your cyber-security protection and implementing all will put you in a great position against hackers. It’s important to make sure your business gets ahead of the curve and doesn’t end up looking back in hindsight on the security measures you planned to put in place.
Publish Date
22/02/2022
Categories
Blogs
Cyber-Attacks, once seen a as rare occurrence and easily dealt with by simple Anti-Virus Software, are now one of the biggest potential threats to any business. The different types of attack and sophistication has increased exponentially to include Phishing, Malware, Man-in-the-Middle Attacks (MiTM), Denial-of-Service (DOS) Attacks, SQL Injections, Zero-day Exploits and Password Attacks. Many of these then lead to Ransomware demands.
The profile of the people behind these attacks is evolving, as knowledge and accessibility to tools becomes more available. Whilst large, organised crime groups on the dark web such as REvil, Darkside & Conti continue to target major companies such as Acer, Garmin and JBS Foods for ransoms running into the millions, new groups and individual cyber-criminals with less structure and resources are now targeting small and medium sized businesses (SMBs), demanding lower, but still devastating ransoms – relative to the turnover of the company.
One of the most worrying developments that has enabled this new target group is the growth in ransomware-as-a-service (RaaS). This service is subscription based, similar to any other legitimate software-as-a-service (SaaS). Cyber-attackers buy the RaaS solution online with the basic framework of a ransomware virus. These may include encryption tools, a way to collect ransom (usually through cryptocurrency payment), how to communicate with the targets to get best results and general hints and tips to ensure traceability is minimised. The attackers then have to customise certain elements to use in a cyber-attack. The major ransomware groups are predominantly behind the supply of these ‘RaaS’ software packages.
The most common mistake that SMBs make when considering cyber-security is thinking that it won’t happen to them. Increasingly it is not until an attack takes place that the reality kicks in. The UK Government continues to produce and update guides stressing the dangers and spreading messaging to educate and advise businesses for free.
For the businesses unfortunate enough to fall victim to an attack, up to 60% will go out of business within a year – whether that be through financial loss, downtime resolving the issue, loss of company reputation, or a combination of all three.
As cyber-attacks become news for the mainstream media, in particular Ransomware attacks, awareness is growing, and we see an increasing trend for enquiries to help secure businesses. It is essential if you haven’t already, to review your security for vulnerabilities, implement layers of protection and ensure your staff awareness of cyber-threats is always up-to-date.
Publish Date
15/02/2022
Categories
Blogs
Andrew May, Cobweb Cloud Solutions Architect discusses high availability….
Computers fail all the time! It could be the physical hardware burning out, a bad software update containing an undetected bug or an issue with supporting infrastructure such as mains electricity or air conditioning. At a larger scale, natural disasters can damage entire datacentre buildings.
IT solutions should be designed to be highly available, so that when components do fail, the solution as a whole remains up and running. With Azure, high availability is a shared responsibility between Microsoft and the customer. Microsoft provides underlying infrastructure which has resilience built in, such as clusters of compute nodes that may have multiple power supplies and network connections, and data stored three times across different storage hardware. Microsoft also provides information and capabilities within Azure to allow customers to control where their resources are deployed.
As customers, our responsibility is to use this knowledge and functionality to design our Azure solutions to meet our high availability requirements. High availability can be implemented to varying degrees, but generally the more resilient a solution is, the more complex it is and the more it costs. The level of high availability a solution has must balance the increased cost against the impact of the solution being unavailable.
A common myth is a single Virtual Machine (VM) running in Azure can never go down. If it needs rebooting or the OS crashes, the VM will be offline and despite Microsoft’s best efforts, hardware still fails unexpectedly, even if the VM is quickly restarted on a different node. Instead of that single VM, at its most basic, a simple level of high availability would have at least two of these VMs running on different hardware within the same datacentre building.
I’ve written previously that Microsoft groups their Azure datacentres into regions – named locations, such as UK South in London, UK. Regions are usually great distances from each other, so an issue in one region is unlikely to affect other regions. When an Azure resource is deployed, one of the properties that must be specified is which region it will be created in. Distributing highly available solutions across more than one region protects against a single region suffering an outage, but it requires duplicate infrastructure in each region, including virtual networks, load balancers, backups, etc. On top of this, there must be some way to distribute the workload across the regions and handle the situation should a region have an issue and become unavailable.
Multi-region solutions can be complex to build, costly to run or provide a level of high availability that is beyond what is required. In recent years Microsoft have enabled some Azure regions with Availability Zones and more are scheduled to be enabled throughout 2022. An Availability Zone is a distinct physical location within an Azure Region that has its own power, networking and cooling. To simplify things, I often describe each Availability Zone as a separate datacentre building within the region. If you don’t choose to use Availability Zones or a zone redundant tier of a resource, your Azure resources and redundant copies of Azure services may all be created in one building, but if you do choose to use them, your resources will be distributed across multiple, independent datacentre buildings.
Some resources such as VMs, must be pinned to a specific zone of your choice, allowing you to ensure solution components that must be separated can be. Others, such as virtual networks and load balancers, span all of the Availability Zones in a region. This means pinned resources in different zones can be connected to the same networking, which reduces infrastructure duplication and therefore complexity and cost.
Availability Zones are a great, cost-effective way to increase resiliency in Azure, allowing solutions to be made highly available much more easily. Many Azure services now support Availability Zones and many more are being updated to support them all the time. If you want to add Availability Zones to an existing solution, or you’re looking to build a new solution with high availability, Cobweb can help guide you to an optimised solution.
Publish Date
07/02/2022
Categories
Blogs
https://azure.microsoft.com/en-us/updates/public-preview-azure-sql-updates-for-early-february-2022/
https://azure.microsoft.com/en-us/updates/public-preview-test-action-groups-in-azure-monitor/
https://azure.microsoft.com/en-us/updates/public-preview-microsoft-azure-payment-hsm-service/
https://docs.microsoft.com/en-us/azure/virtual-desktop/automatic-migration
Publish Date
06/12/2021
Categories
Blogs
Windows Virtual Desktop (WVD) is a cloud-based solution that allows users to access a Windows desktop environment remotely, using any device with an internet connection. The benefits of using WVD are numerous, and in this article, we explore some of the key advantages that make it a popular choice for organisations of all sizes.
WVD allows organisations to easily scale their virtual desktop environment up or down to meet their changing business needs. With WVD, companies can quickly provision new desktops for new employees, or reduce the number of desktops during periods of low demand. This scalability and flexibility mean that businesses can save on infrastructure costs while maintaining optimal levels of performance.
In today’s digital landscape, security is a top concern for businesses of all sizes. With WVD, all data and applications are stored in the cloud, which provides a higher level of security than traditional desktop environments. WVD also enables IT admins to implement multi-factor authentication, conditional access policies, and other security measures to ensure that only authorised users can access data and applications.
WVD eliminates the need for organisations to purchase and maintain physical desktops for their employees. Instead, employees can access their virtual desktop environment from any device, whether it be a personal laptop or a company-issued tablet. This not only saves on hardware costs but also reduces the need for IT support and maintenance, which can be a significant expense for many businesses.
WVD enables employees to access their desktop environment from anywhere, at any time. This means that employees can work remotely, from home or while traveling, without sacrificing productivity. Additionally, because WVD provides a consistent user experience across all devices, employees can quickly and easily access the applications and data they need to do their jobs, without any of the usual limitations or delays associated with traditional desktop environments.
Managing desktop environments for a large organisation can be a complex and time-consuming task – but Windows Virtual Desktop manages the virtual desktop infrastructure for you, so you can focus on users, apps, and OS images instead of hardware inventory and maintenance.
If you’d like to learn more about Windows Virtual Desktop, please reach out to our team.
Publish Date
30/09/2021
Categories
Company News
As cyber security threats constantly evolve and target businesses of all sizes, it is essential that companies optimise their IT protection to secure against cyber criminals.
It requires deep knowledge of these threats to ensure the correct preventative measures are taken, and most companies do not have the in-house resource and bandwidth to keep pace with the growing advances of digital crime.
At Cobweb we are committed to keeping our customers user identities, data, applications and devices secure and continue to invest in our skills and knowledge to keep ahead of the evolving cyber threats.
Earning the Microsoft Threat Protection Advanced Specialisation is evidence of this focus to keep customers safe from cyber criminals.
As plug-and-play solutions become less effective, many companies are turning to partners to secure their business-critical systems and data. Microsoft created Advanced Specialisations to help businesses identify which solution providers have the deep technical expertise and knowledge needed to deliver the optimum solution for customers.
Microsoft sets stringent criteria to be met when awarding Advanced Specialisations, and our teams have worked hard to achieve the Threat Protection Advanced Specialisation – one of only a few providers in the UK to do so. This latest accreditation builds upon our existing Advanced Specialisations in Windows Server and SQL Server Migration to Microsoft Azure and Microsoft Windows Virtual Desktop, demonstrating our deep expertise and knowledge in helping customers achieve their goals as they move to the cloud for their IT needs.
Michael Frisby, Cobweb’s Managing Director commented on the achievement, “I’m very proud of our teams’ commitment and dedication in earning the Microsoft Threat Protection Advanced Specialisation. Microsoft validates that partners not only have the expertise needed but also the experience of delivering the solution for multiple customers before awarding Advanced Specialisations. Keeping our customers secure from cyber criminals is a top priority for Cobweb and this accreditation recognises that commitment and the knowledge of our teams across the business.”
If you’d like to understand how Cobweb can help keep your business secure from cyber criminals get in touch with the Team.
Publish Date
23/07/2021
Categories
Company News
I’m very proud to share the news that Cobweb has been named by cyber security specialist Mimecast, as their MSP (Managed Service Provider) of the Year.
The announcement was made at Mimecast’s annual Partner Awards ceremony (hosted as a virtual event) on Tuesday 20th July 2021. This is a great recognition of the depth of the level of protection we jointly provide to 100s of customers, particularly as this is the third time in four years, we’ve won the award.
The UK government’s Department for Digital, Culture, Media & Sport’s recently published Cyber Security Breaches Survey 2021 says, “cyber security breaches are a serious threat to all types of businesses. Among those identifying breaches or attacks, their frequency is undiminished.”
The paper goes on to say, “Four in ten businesses (39%) report having cyber security breaches or attacks in the last 12 months.”
Further on, the paper highlights that “the risk level is potentially higher than ever under COVID-19, and that businesses are finding it harder to administer cyber security measures during the pandemic.”
As we move to fewer restrictions and a new more flexible hybrid work model, we know that many businesses will continue to face significant cyber security risks.
Cobweb partners with leading cyber security provider Mimecast to be able to offer customers the very best in cyber protection, not just from attacks via email but also to protect customers’ brands and reputation.
Mimecast Cloud Cybersecurity Services help businesses safeguard data, email, and web browsing, delivering protection for whatever the continually evolving threat landscape tries to throw at today’s business.
At Cobweb, we’ve seen a massive uptake of Mimecast’s solutions over the past year, supporting our customers to help stay safe in this particularly difficult time.
We place a high priority on training and upskilling our teams, so that we can deliver the best possible service and experiences to our customers. We’re, therefore, particularly pleased to have the quality and depth of our technical expertise called out by Mimecast when making the MSP of the Year announcement.
If you’d like more information about Mimecast’s solutions and how Cobweb can advise on the services to suit your individual need, contact any of the Cobweb team. They will be happy to help!
Recent Comments