Document, Document, Document: Change Management & More in the Data Center

Written by Joe Kozlowicz on Tuesday, March 22nd 2016 — Categories: Data Center Design, HIPAA Compliance, Security

In the IT world, if it isn’t logged or documented, it might as well never have happened. Without properly keeping track of change management, even for routine processes, it can be impossible to discover why a system stopped working, or worse. Technicians might be stuck halfway through a switch upgrade, unable to retrace their steps when they realize the equipment install won’t work. Or an entire organization could be held accountable under the law because they failed in their compliance.

IT documentation, in other words, is an essential if occasionally painstaking piece of data center operations. At Green House Data, we document everything we possibly can. Outside of support or internal emergency responses, which are always tracked in a ticket, planned changes must undergo a five-step process in order to keep track and learn from the change.

Continue Reading...

Upcoming Events: Come Meet Green House Data in NYC, Seattle, or Vegas

Written by Joe Kozlowicz on Tuesday, March 15th 2016

Green House Data is making the rounds this spring, attending several industry conferences and hosting events in cities across the country. If you're attending Data Center World or Channel Partners Conference swing by our booth and say hello! We'll also have representatives at the Greater New York Data Center Summit and Datacenter Dynamics Converged.

Green House Data is hosting upcoming Lunch and Learns and Happy Hours in Seattle, Bellevue, and New York. Don't miss CEO Shawn Mills, who is speaking at several events as well.

Find booth numbers, dates, details, and registration links after the jump.

Continue Reading...

Don’t DROWN: Check Your Servers for HTTPS Vulnerability

Written by Joe Kozlowicz on Thursday, March 3rd 2016 — Categories: Cloud Hosting, Microsoft, Security

HTTPS is supposed to be secure, right? Of course, nothing on the internet is ever truly safe. This week, a new vulnerability in OpenSSL was uncovered, allowing hackers to access websites secured with SSLv2. Although this security protocol is out of date, over 11 million websites—1/3 of all HTTPS secured servers—are at risk.

Plenty of websites that store sensitive information like credit card details are vulnerable to DROWN, which is an acronym for Decrypting RSA with Obsolete and Weakened eNcryption. Websites can be hacked in just minutes using this attack vector.

Learn how to check your site for DROWN vulnerability and what you should use to replace SSLv2 after the jump.

Continue Reading...

What is Cloud Storage Durability & Do You Really Need 11 Nines?

Written by Joe Kozlowicz on Thursday, February 25th 2016 — Categories: Cloud Hosting, Cloud Storage, Cloud Hosting, Cloud Storage, Disaster Recovery

Cloud storage, especially object storage, is often marketed by touting its “durability,” with many providers boasting eleven or thirteen “nines”, in other words 99.999999999% reliability. It sounds great—as close to 100% reliable as you can get. But what is durability in relation to storage, and do you really need those eleven nines?

Not every service provider even offers a durability rating as it can be difficult to measure and guarantee. A more important question to ask your cloud hosting provider is about how they are protecting against data loss generally. What technologies are in play? What are your odds of recovering data? How can you tie in backup?

Continue Reading...

When You Can’t Avoid Malware, Turn to Cloud Backup

Written by Joe Kozlowicz on Thursday, February 18th 2016 — Categories: Cloud Hosting, Cloud Hosting, Security

We’ve covered cryptolocker and other encryption-based malware on the blog in the past. One click-happy or poorly trained employee could bring your organization to its knees.

For Hollywood Presbyterian Hospital in Los Angeles, the cryptolocker threat became all too real. This attack may have been targeted, as the hackers requested $3.4 million to unlock the hospital’s computer systems. More or less everything in the facility is tied to the computers, even the emergency room. For now, that means some patients requiring certain equipment or testing have been moved while the facility works off paper.

Cryptolockers aren’t the only malware that can take down your IT systems. Botnets hijacking your resources, rootkits granting administrative access, spyware collecting data, Trojans, viruses, and worms can all restrict or remove access to the applications, files, and data your business needs to operate.

Cloud backup can be a great tool to restore normal operations if your systems are completely inoperable due to malware.

Continue Reading...