Surveys: Cloud Computing Helps Ease IT Budgets

Written by Joe Kozlowicz on Tuesday, April 12th 2016 — Categories: Cloud Hosting

IT spending is expected to stay flat or even constrict throughout 2016, according to Gartner.

How can CIOs, CTOs, or CFOs make their IT budgets go further while still delivering the applications and services their users have come to expect? Gartner, IDG, and others suggest the answer may lie in the cloud.

Continue Reading...

Introducing mid-MODular Data Centers

Written by Joe Kozlowicz on Friday, April 1st 2016

Citing an overlap between the clean, functional design of a well-organized and planned data center and the intentions of the Bauhaus and International movements, Green House Data CEO Shawn Mills announced the company would be retrofitting all data centers with mid-century modern modular design starting April 1, 2016.

Continue Reading...

Protect Yourself As DDoS Attacks on Data Centers Increase

Written by Joe Kozlowicz on Tuesday, March 29th 2016 — Categories: Cloud Hosting, Colocation, Data Center Design, Security

Distributed Denial of Service attacks are nothing new, but they’re becoming more and more common, from politically motivated attacks on financial and government institutions to recent attacks on data centers like Digital Ocean. DDoS attacks are when hackers use hijacked computers to flood servers with incoming requests and essentially shut down services by clogging network traffic or sending mass quantities of junk data. They are increasingly difficult to defend against as they grow in scale, and because they are distributed among various infected machines, it can be difficult to block traffic based on IP address.

Public institutions, financial industries, eCommerce sites, and hosting providers are among the most popular targets, but anyone can be a victim—and if your IT infrastructure is hosted in a data center, you need that facility to provide strong DDoS mitigation to avoid service interruptions of your own.

Read on to learn common DDoS attack methods and mitigation strategies.

Continue Reading...

Who’s in Charge of Cloud Security, Users or Providers?

Written by Joe Kozlowicz on Thursday, March 24th 2016 — Categories: Cloud Hosting, Security

One of the most commonly cited obstacles to cloud adoption is security, which itself is an extension of the perceived loss of control over the infrastructure running your applications and storing your data. On the whole, cloud infrastructure is actually more secure than in-house data centers,  as providers have dedicated staff, software, and hardware protections in place at a greater level than the majority of on-site facilities.

These protections take the form of many layers of physical security, best practices and documented plans for security responses, industry-leading firewalls, antivirus, antimalware, and monitoring software, and strict access control for users and administrators. But the malleability of the cloud, plus its many forms and applications, means that it is not always clear who should be in charge of securing a cloud deployment.

Do users or cloud providers need to be in charge of security? The answer depends on which part of the cloud stack you’re looking at.

Continue Reading...

Document, Document, Document: Change Management & More in the Data Center

Written by Joe Kozlowicz on Tuesday, March 22nd 2016 — Categories: Data Center Design, HIPAA Compliance, Security

In the IT world, if it isn’t logged or documented, it might as well never have happened. Without properly keeping track of change management, even for routine processes, it can be impossible to discover why a system stopped working, or worse. Technicians might be stuck halfway through a switch upgrade, unable to retrace their steps when they realize the equipment install won’t work. Or an entire organization could be held accountable under the law because they failed in their compliance.

IT documentation, in other words, is an essential if occasionally painstaking piece of data center operations. At Green House Data, we document everything we possibly can. Outside of support or internal emergency responses, which are always tracked in a ticket, planned changes must undergo a five-step process in order to keep track and learn from the change.

Continue Reading...

Chat Now