{"id":418,"date":"2017-01-21T05:30:33","date_gmt":"2017-01-21T05:30:33","guid":{"rendered":"http:\/\/pcdoctorsinc.com\/?page_id=418"},"modified":"2017-01-21T06:01:44","modified_gmt":"2017-01-21T06:01:44","slug":"servers","status":"publish","type":"page","link":"https:\/\/pcdoctorsinc.com\/index.php\/services\/business\/servers\/","title":{"rendered":"Servers"},"content":{"rendered":"<p><div  class=\"fusion-fullwidth fullwidth-box fusion-parallax-fixed nonhundred-percent-fullwidth\"  style='background-color: rgba(255,255,255,0);background-image: url(\"http:\/\/pcdoctorsinc.com\/wp-content\/uploads\/2017\/01\/network-repair.jpg\");background-position: center center;background-repeat: no-repeat;padding-top:100px;padding-right:0px;padding-bottom:100px;padding-left:0px;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;background-attachment:fixed;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_1  fusion-one-full fusion-column-first fusion-column-last 1_1\"  style='margin-top:0px;margin-bottom:20px;'>\n\t\t\t<div class=\"fusion-column-wrapper\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"  data-bg-url=\"\">\n\t\t\t\t<h1 style=\"text-align: center; color: #fff;\">The server is&#8230;<\/h1>\n<h2 style=\"text-align: center; color: #f2f2f2;\">At the heart of your entire business. Don&#8217;t let it fail.<\/h2>\n<div class=\"fusion-clearfix\"><\/div>\n\n\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div  class=\"fusion-fullwidth fullwidth-box nonhundred-percent-fullwidth\"  style='background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:70px;padding-right:0px;padding-bottom:100px;padding-left:0px;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3  fusion-one-third fusion-column-first 1_3\"  style='margin-top:0px;margin-bottom:20px;width:33.33%;width:calc(33.33% - ( ( 4% + 4% ) * 0.3333 ) );margin-right: 4%;'>\n\t\t\t<div class=\"fusion-column-wrapper\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"  data-bg-url=\"\">\n\t\t\t\t<div class=\"aligncenter\"><i class=\"fa fontawesome-icon fa-user circle-yes\" style=\"border-color:#000000;background-color:#000000;font-size:28.16px;line-height:56.32px;height:56.32px;width:56.32px;margin-left:0;margin-right:0;color:#ffffff;\"><\/i><\/div><div class=\"fusion-title title fusion-sep-none fusion-title-center fusion-title-size-two\" style=\"margin-top:20px;margin-bottom:31px;\"><h2 class=\"title-heading-center\">Group Policy<\/h2><\/div><p style=\"text-align: center;\">Group policy is where all the magic happens. \u00a0You can set restrictions on what your users have access to and what times they can access their computer. \u00a0You can put users into groups, for example, an accounting group that only they can see the files left there for accounts to see. \u00a0This is the ultimate technological break through for any strong business to have.<\/p>\n<div class=\"fusion-clearfix\"><\/div>\n\n\t\t\t<\/div>\n\t\t<\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3  fusion-one-third 1_3\"  style='margin-top:0px;margin-bottom:20px;width:33.33%;width:calc(33.33% - ( ( 4% + 4% ) * 0.3333 ) );margin-right: 4%;'>\n\t\t\t<div class=\"fusion-column-wrapper\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"  data-bg-url=\"\">\n\t\t\t\t<div class=\"aligncenter\"><i class=\"fa fontawesome-icon fa-lock circle-yes\" style=\"border-color:#000000;background-color:#000000;font-size:28.16px;line-height:56.32px;height:56.32px;width:56.32px;margin-left:0;margin-right:0;color:#ffffff;\"><\/i><\/div><div class=\"fusion-title title fusion-sep-none fusion-title-center fusion-title-size-two\" style=\"margin-top:20px;margin-bottom:31px;\"><h2 class=\"title-heading-center\">User Security<\/h2><\/div><p style=\"text-align: center;\">Your users can get into trouble when reading and opening emails. \u00a0As said previously, group policy can protect against this. \u00a0Using group policy you can have your users permissions to the computer stop them from preforming special tasks that could harm or destroy the computer. \u00a0This is one of the most effective ways to prevent hackers.<\/p>\n<div class=\"fusion-clearfix\"><\/div>\n\n\t\t\t<\/div>\n\t\t<\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3  fusion-one-third fusion-column-last 1_3\"  style='margin-top:0px;margin-bottom:20px;width:33.33%;width:calc(33.33% - ( ( 4% + 4% ) * 0.3333 ) );'>\n\t\t\t<div class=\"fusion-column-wrapper\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"  data-bg-url=\"\">\n\t\t\t\t<div class=\"aligncenter\"><i class=\"fa fontawesome-icon fa-eye circle-yes\" style=\"border-color:#000000;background-color:#000000;font-size:28.16px;line-height:56.32px;height:56.32px;width:56.32px;margin-left:0;margin-right:0;color:#ffffff;\"><\/i><\/div><div class=\"fusion-title title fusion-sep-none fusion-title-center fusion-title-size-two\" style=\"margin-top:20px;margin-bottom:31px;\"><h2 class=\"title-heading-center\">Log your Network and Users<\/h2><\/div><p style=\"text-align: center;\">God forbid if someone hacked or stole your records. \u00a0Using a server database, you can log events happening on computers and the network as a whole. \u00a0This is critical if you ever need to go into court or find out what happened at a certain time of day.<\/p>\n<div class=\"fusion-clearfix\"><\/div>\n\n\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div  class=\"fusion-fullwidth fullwidth-box nonhundred-percent-fullwidth\"  style='background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:20px;padding-right:0px;padding-bottom:100px;padding-left:0px;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3  fusion-one-third fusion-column-first 1_3\"  style='margin-top:0px;margin-bottom:20px;width:33.33%;width:calc(33.33% - ( ( 4% + 4% ) * 0.3333 ) );margin-right: 4%;'>\n\t\t\t<div class=\"fusion-column-wrapper\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"  data-bg-url=\"\">\n\t\t\t\t<div class=\"aligncenter\"><i class=\"fa fontawesome-icon fa-database circle-yes\" style=\"border-color:#000000;background-color:#000000;font-size:28.16px;line-height:56.32px;height:56.32px;width:56.32px;margin-left:0;margin-right:0;color:#ffffff;\"><\/i><\/div><div class=\"fusion-title title fusion-sep-none fusion-title-center fusion-title-size-two\" style=\"margin-top:20px;margin-bottom:31px;\"><h2 class=\"title-heading-center\">Data Confidentality<\/h2><\/div><p style=\"text-align: center;\">Data confidentially is done through a number of means. \u00a0Windows Server has a suite of tools to protect file and information for only managers and executives to see. \u00a0Folders will be inaccessible to anyone who isn&#8217;t privileged to see them.<\/p>\n<div class=\"fusion-clearfix\"><\/div>\n\n\t\t\t<\/div>\n\t\t<\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3  fusion-one-third 1_3\"  style='margin-top:0px;margin-bottom:20px;width:33.33%;width:calc(33.33% - ( ( 4% + 4% ) * 0.3333 ) );margin-right: 4%;'>\n\t\t\t<div class=\"fusion-column-wrapper\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"  data-bg-url=\"\">\n\t\t\t\t<div class=\"aligncenter\"><i class=\"fa fontawesome-icon fa-home circle-yes\" style=\"border-color:#000000;background-color:#000000;font-size:28.16px;line-height:56.32px;height:56.32px;width:56.32px;margin-left:0;margin-right:0;color:#ffffff;\"><\/i><\/div><div class=\"fusion-title title fusion-sep-none fusion-title-center fusion-title-size-two\" style=\"margin-top:20px;margin-bottom:31px;\"><h2 class=\"title-heading-center\">Secure VPNs<\/h2><\/div><p style=\"text-align: center;\">VPNs prevent man-in-the-middle attacks. \u00a0Basically if you don&#8217;t encrypt your network traffic then you are open to someone tapping into that traffic and reading things like Usernames, Passwords, or even tapping into your cameras and phone systems. \u00a0It&#8217;s crucial to use VPNs to encrypt and protect your traffic along with the use of technologies like TLS.<\/p>\n<div class=\"fusion-clearfix\"><\/div>\n\n\t\t\t<\/div>\n\t\t<\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3  fusion-one-third fusion-column-last 1_3\"  style='margin-top:0px;margin-bottom:20px;width:33.33%;width:calc(33.33% - ( ( 4% + 4% ) * 0.3333 ) );'>\n\t\t\t<div class=\"fusion-column-wrapper\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"  data-bg-url=\"\">\n\t\t\t\t<div class=\"aligncenter\"><i class=\"fa fontawesome-icon fa-folder-open circle-yes\" style=\"border-color:#000000;background-color:#000000;font-size:28.16px;line-height:56.32px;height:56.32px;width:56.32px;margin-left:0;margin-right:0;color:#ffffff;\"><\/i><\/div><div class=\"fusion-title title fusion-sep-none fusion-title-center fusion-title-size-two\" style=\"margin-top:20px;margin-bottom:31px;\"><h2 class=\"title-heading-center\">Ensure Data Availability<\/h2><\/div><p style=\"text-align: center;\">If one or two hard drives die, you can still keep your business running. \u00a0This is made possible by installing what&#8217;s known as a RAID. \u00a0RAID technology will keep your systems running in the case of a hard drive failure. \u00a0This is very important for businesses that rely heavily on their businesses technology.<\/p>\n<div class=\"fusion-clearfix\"><\/div>\n\n\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":379,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-418","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/pages\/418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/comments?post=418"}],"version-history":[{"count":3,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/pages\/418\/revisions"}],"predecessor-version":[{"id":426,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/pages\/418\/revisions\/426"}],"up":[{"embeddable":true,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/pages\/379"}],"wp:attachment":[{"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/media?parent=418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}