Over 10,000 Monthly Visitors: Looking Back on Our Top Posts

Written by Joe Kozlowicz on Friday, April 6th 2018 — Categories: Cloud Hosting, Data Center Design, Green Data Center, Networking and Fiber, Security, Virtual Desktop, VMware

The Green House Data blog has hit a major milestone this month, rocketing from around 8,000 monthly unique visitors to 12,000 unique visitors in March. As we pass the 10k mark, we want to say thanks to everyone who has come to our little corner of the internet and also take a look back at our most enduring and popular posts over the years.

From cloud hosting to data center design to information security, the blog has covered a lot of ground in the past five or six years, with experts from our staff joining our marketing and content teams for weekly updates.

Here are the top 10 all time posts from the Green House Data blog.

Continue Reading...


Do You Need to Worry About GDPR Compliance?

Written by Joe Kozlowicz on Thursday, March 22nd 2018 — Categories: Cloud Hosting, Security

GDPR  (General Data Protection Regulation) compliance is coming on May 25th to companies that operate in the European Union or have customers there. Fines for noncompliance can run into the tens of millions. Are you prepared? And do you even have to worry about it, if you’re a US-based operation?

Learn what security requirements fall under GDPR, as well as what situations would require compliance, and how you need to change your operations to avoid sanctions.

Continue Reading...


Weighing VMware vSphere Encryption

Written by Joe Kozlowicz on Thursday, March 8th 2018 — Categories: Cloud Hosting, Cloud Storage, Cloud Hosting, Cloud Storage, HIPAA Compliance, Security, VMware

VMware vSphere 6.5 introduced policy-based encryption, which simplifies the security management of VMs across large scale infrastructure, as each object no longer requires individual key management.

vSphere VM encryption offers quite a few advantages compared to other encryption methods, but it might not be a great fit for every workload. When weighing whether to encrypt or not, you’ll want to consider a few limitations, caveats, and performance issues first.

Continue Reading...


Are Enterprises Shifting Back to On-Premise Hardware?

Written by Joe Kozlowicz on Thursday, March 1st 2018 — Categories: Cloud Hosting, Colocation, Data Center Design, Hybrid IT, IT Modernization, IT Operations

The past five or ten years have been jam-packed with cloud computing hype. Indeed, the cloud is here to stay, without a doubt. But recent reports show analysts expect hardware sales for on-premise enterprise IT to tick up significantly.

High profile examples like Dropbox show that moving back to a more traditional data center can create efficiencies and free up cash flow. Is the enterprise data center – and by extension, colocation – about to put up a fight against the cloud?

Continue Reading...


Cryptocurrency Mining Malware All the Rage in 2018

Written by Joe Kozlowicz on Thursday, February 15th 2018 — Categories: Security

You’ve probably heard about cryptocurrency — the most famous being Bitcoin — as it soared and crashed in value in the past few months. We have a quick explanation about cryptomining  and its associated environmental costs here on the blog. Many are looking to cash in on “free money” by dedicated expensive hardware setups to mining new coins and processing crypto transactions.

So many, in fact, that a new variety of malware has emerged, infecting PCs, servers, and even smartphones with cryptomining software. Unbeknownst to users, cryptojacking software is using valuable computing power to enrich hackers while dramatically slowing down the infected device.

Will 2018 be the year of cryptojacking? How can you fight or avoid these new flavors of malware?

Continue Reading...

Chat Now