Is Technical Debt a Ticking Time Bomb for Your Company?

Written by Joe Kozlowicz on Tuesday, June 20th 2017

While debt can be a useful tool for funding your organization (Green House Data is in fact currently leveraging debt as part of our expansion plans), you need to have a payment plan and carefully manage your debt in order to continue solvency. No business owner who wants to succeed would ignore debt and just hope it sorts itself out, or pay only the minimum required to avoid bankruptcy.

Technical debt shouldn’t be ignored, either. The term refers to the practice of putting off critical infrastructure or software upgrades. Out of date systems pile up — whether it’s your overall systems architecture, an aging switch that can’t handle new network speeds, or an application that only runs on 32-bit servers — and become a mess of band-aided solutions that are ready to fall apart at any moment.

Executives should take technical debt seriously. When your CTO or IT Manager tells you they need to focus budget and staff on reducing technical debt, it’s time to listen.

Continue Reading...


The Ten Zones of Enterprise Cloud Security

Written by Joe Kozlowicz on Thursday, June 15th 2017 — Categories: Cloud Hosting, Security

Juggling security in the cloud can seem like an insurmountable task, especially when hybrid cloud and multicloud environments come into play. While your cloud service provider (CSP) can help manage some layers of cloud security, you’ll still be left with management of at least your users and data, if not your application layer.

One way to help keep track of all the security vectors within your organization is to divide them into these ten zones of enterprise cloud security. Any cloud security policy should cover each of these areas. You can also assign a single engineer or administrator to have ownership over each zone.

Continue Reading...


Is Cloud Computing More About Business than Technology?

Written by Joe Kozlowicz on Thursday, June 8th 2017 — Categories: Cloud Hosting

Focusing on cloud initiatives as a technology problem rather than business realignment can be a major mistake. Success in the cloud comes from more than just telling your CTO that you want your systems on a cloud platform. It requires a shift in overall business strategy and clear messaging from leadership on down.

You need to identify your business goals and work backwards from there to figure out how specific cloud technologies can help solve them. This may involve the creation of a cloud team or adjusting your organization to be an agile, “DevOps” style operation.

Ultimately the core technologies your team will use in the cloud aren’t much different than the old model of IT (at least if you were already virtualized), but they do require a shift in your business model to better use the flexible resources available from cloud computing, or the development of a plan that boosts efficiency, reduces costs, and thereby improves your bottom line.

Here are a few tips to keep cloud strategy front of mind.

Continue Reading...


Despite Rising Automation, Human Error is a Top Cause of Downtime. Here’s How to Avoid It.

Written by Art Salazar on Wednesday, May 31st 2017

Another week, another story about a major data center outage. This time it’s British Airways under public scrutiny as the company scrambles to discover the source of data center downtime that grounded hundreds of flights.

While the cause of that outage isn’t yet released, that hasn’t stopped some experts from suggesting human error as the cause. They aren’t likely to be off base, either: human error remains the leading cause of IT infrastructure outages. Therefore minimizing human error should be a primary focus of reliability efforts.

While we all make mistakes, when critical infrastructure is at stake — not to mention thousands of dollars in downtime related costs — it’s worth some investment to try and reduce the potential negative effects of people on IT systems. Here are some tips to help you avoid downtime stemming from human error.

Continue Reading...


Be Prepared for a Breach with a Cloud Forensics Protocol

Written by Joe Kozlowicz on Friday, May 26th 2017

While the goal of most infosec professionals is ostensibly to prevent data breaches and security incidents, the daily headlines about major hacks prove that no one is completely safe. If — or perhaps we should say “when” — you are breached, one of the first steps is to perform digital forensics to help locate the attack vector, identify compromised systems, and tag any stolen data.

Cloud environments further complicate the digital forensics process, especially in an increasingly multi-cloud world, where multi-tenant hosting environments and hybrid IT infrastructure is more and more common.

Preparing a cloud forensics protocol can help your organization reduce the overall cost of a security investigation and disclosure, quickly figure out how the attacker gained access, restore system operations faster, and even garner discounts on any cyberinsurance you may have.

Continue Reading...

Chat Now