Green House Data is making the rounds this spring, attending several industry conferences and hosting events in cities across the country. If you're attending Data Center World or Channel Partners Conference swing by our booth and say hello! We'll also have representatives at the Greater New York Data Center Summit and Datacenter Dynamics Converged.
Green House Data is hosting upcoming Lunch and Learns and Happy Hours in Seattle, Bellevue, and New York. Don't miss CEO Shawn Mills, who is speaking at several events as well.
Find booth numbers, dates, details, and registration links after the jump.
HTTPS is supposed to be secure, right? Of course, nothing on the internet is ever truly safe. This week, a new vulnerability in OpenSSL was uncovered, allowing hackers to access websites secured with SSLv2. Although this security protocol is out of date, over 11 million websites—1/3 of all HTTPS secured servers—are at risk.
Plenty of websites that store sensitive information like credit card details are vulnerable to DROWN, which is an acronym for Decrypting RSA with Obsolete and Weakened eNcryption. Websites can be hacked in just minutes using this attack vector.
Learn how to check your site for DROWN vulnerability and what you should use to replace SSLv2 after the jump.
Cloud storage, especially object storage, is often marketed by touting its “durability,” with many providers boasting eleven or thirteen “nines”, in other words 99.999999999% reliability. It sounds great—as close to 100% reliable as you can get. But what is durability in relation to storage, and do you really need those eleven nines?
Not every service provider even offers a durability rating as it can be difficult to measure and guarantee. A more important question to ask your cloud hosting provider is about how they are protecting against data loss generally. What technologies are in play? What are your odds of recoving data? How can you tie in backup?
For Hollywood Presbyterian Hospital in Los Angeles, the cryptolocker threat became all too real. This attack may have been targeted, as the hackers requested $3.4 million to unlock the hospital’s computer systems. More or less everything in the facility is tied to the computers, even the emergency room. For now, that means some patients requiring certain equipment or testing have been moved while the facility works off paper.
Cryptolockers aren’t the only malware that can take down your IT systems. Botnets hijacking your resources, rootkits granting administrative access, spyware collecting data, Trojans, viruses, and worms can all restrict or remove access to the applications, files, and data your business needs to operate.
Cloud backup can be a great tool to restore normal operations if your systems are completely inoperable due to malware.
Hybrid cloud remains the most popular option for cloud infrastructure, as more and more businesses have an active hybrid environment or plan to adopt one. A recent EMC and IDG Research survey found that 88% of respondents believe hybrid cloud is ‘important’ or ‘critical’ to enable digital business transformation. The results seem to indicate what EMC calls one of the only things industry experts can agree on: hybrid is the future of enterprise IT infrastructure.
Meanwhile, RightScale's State of the Cloud report finds that 71% have already adopted hybrid. Are you following suit?