1/3 of Companies Have No IT Governance Policy — Here’s How to Start

Written by Joe Kozlowicz on Thursday, August 9th 2018 — Categories: IT Operations, Security

A new report from Deloitte found that IT spending is on the rise, with executives taking a more hands-on role in procuring or ordering investment in technology and related staff. But while 57% of execs reported spending more on technology, 33% said they have little or no formal IT governance policies.

If it seems slightly foolish to spend significantly more on technology without certifying a business purpose and implementing controls over the lifespan of that technology — well, it is. The report does come with the caveat of polling only midmarket and private organizations. We would expect more public businesses to have formal IT governance in place. But that doesn’t excuse organizations of all sizes from measuring the effectiveness of IT in meeting business and compliance goals.

Get started with an overview of IT governance and what you should include in your policy.

Continue Reading...


Why Would You Lease a New Car and Not Drive It for 12 Months?

Written by Rory McCaw on Monday, July 30th 2018 — Categories: Cloud, Enterprise Advisory Services, Solutions, Technology, Azure, Patching, Windows 10, O365, Microsoft, Security

Why do companies do this with software?

The concept sounds crazy. Logic says that you lease a car, start to drive it immediately, and continue to drive it for the lease term. Yet with Microsoft software, even cloud-based software like Azure, O365, Dynamics CRM, and Windows 10, companies continue to buy SaaS offerings on their traditional Enterprise Agreements (EAs) and pay for them before they start to use them.

Continue Reading...


6 Elements to Consider When Deploying Windows 10

Written by Rory McCaw on Monday, July 16th 2018 — Categories: Cloud, Enterprise Advisory Services, Solutions, Technology, Azure, Windows 10, O365, Microsoft, Security

With any migration or upgrade, challenges will arise. Windows 10 migration is no different – so be prepared.

Continue Reading...


The Biggest Obstacles to Multicloud Deployments

Written by Joe Kozlowicz on Thursday, June 21st 2018 — Categories: Azure, Managed Services, Multi-Cloud, Cloud Hosting, Hybrid IT, IT Modernization, IT Operations, Security, VMware

As cloud adoption rates have increased and cloud models for enterprise IT mature, multicloud deployments have become more and more popular. They happen for a variety of reasons: some cloud platforms are better suited for specific applications, others may have security or compliance measures that are necessary. They might be located in different physical sites, fostering failover and disaster recovery or serving satellite markets. For many users, avoiding being locked in with a single vendor is huge for negotiation and data sovereignty.

Going multicloud isn’t a simple task, however, especially if you want to manage everything with a simple workflow. Here are the biggest stumbling blocks companies are facing when implementing multicloud.

Continue Reading...


If Video Killed the Radio Star, Will Process Automation Kill the IT Guy?

Written by Rory McCaw on Monday, May 21st 2018 — Categories: Cloud, Enterprise Advisory Services, Solutions, Technology, Azure, SCOM, SCCM, Windows 10, O365, Microsoft, Security

The most common type of Artificial Intelligence (AI) today is process automation, often referred to as Robotic Process Automation (RPA). Many IT guys (and, if you will, gals) fear that process automation will make their jobs disappear.

Continue Reading...


Legacy Systems Remain Because They Work — But They Could Be a Major Security Risk

Written by Joe Kozlowicz on Friday, May 4th 2018 — Categories: Data Center Design, IT Modernization, IT Operations, Security

With all the talk about digital transformation and IT modernization, you’d think that everyone was all-in with the cloud at this point. But there are many legacy systems still in production, even at enterprise organizations.

Regardless of why you still have them, there are almost certainly legacy systems within your IT ecosystem, and keeping them secure is of paramount importance, especially if they’re past their support lifecycle and have become exposed to potential vulnerabilities.

Continue Reading...


Server Patching Automation – Just Like an IT Caddy, Only Better

Written by Angie Anderson on Saturday, April 28th 2018 — Categories: Cloud, Enterprise Advisory Services, Solutions, Technology, Azure, SCOM, SCCM, Windows 10, O365, Microsoft, Security, Software Development

Let’s be honest, most of us who play individual games like golf are cheaters. We don’t play by the rules of the game 100% of the time. OK, labelling ourselves cheaters may be a harsh indictment of our collective scorekeeping.

Continue Reading...


How Secure is HTTPS? TLS/SSL Increasingly Used to Transmit Malware

Written by Joe Kozlowicz on Thursday, April 26th 2018 — Categories: Networking and Fiber, Security

Encryption over the HTTP protocol, also known as HTTPS or TLS over HTTP is the reason you see a little lock icon next to your web URL. As you likely know, a website using HTTPS has encrypted network traffic. In other words, outside parties or malicious software should not be able to intercept your communications to and from that website, because it is encrypted. Any time you perform a transaction over the internet that involves financial or personal information, you should be certain the web server is using HTTPS.

However, even as TLS (Transport Layer Security, referring to encrypting at the Transport Layer of the seven layer OSI model of networking) has spread to over half of the internet, clever cybercriminals have engineered network packets that actually use TLS within their malware to disguise it.

HTTPS is increasingly being used as a vehicle for malware to spread across the ‘net. While your information may be secure while it is transmitted, the website you’re visiting could still accidentally slip malware to your computer, or host it on its own servers, harvesting your information or installing a virus.

Here’s how TLS / SSL is being used by malicious actors across the net.

Continue Reading...


Over 10,000 Monthly Visitors: Looking Back on Our Top Posts

Written by Joe Kozlowicz on Friday, April 6th 2018 — Categories: Cloud Hosting, Data Center Design, Green Data Center, Networking and Fiber, Security, Virtual Desktop, VMware

The Green House Data blog has hit a major milestone this month, rocketing from around 8,000 monthly unique visitors to 12,000 unique visitors in March. As we pass the 10k mark, we want to say thanks to everyone who has come to our little corner of the internet and also take a look back at our most enduring and popular posts over the years.

From cloud hosting to data center design to information security, the blog has covered a lot of ground in the past five or six years, with experts from our staff joining our marketing and content teams for weekly updates.

Here are the top 10 all time posts from the Green House Data blog.

Continue Reading...


Do You Need to Worry About GDPR Compliance?

Written by Joe Kozlowicz on Thursday, March 22nd 2018 — Categories: Cloud Hosting, Security

GDPR  (General Data Protection Regulation) compliance is coming on May 25th to companies that operate in the European Union or have customers there. Fines for noncompliance can run into the tens of millions. Are you prepared? And do you even have to worry about it, if you’re a US-based operation?

Learn what security requirements fall under GDPR, as well as what situations would require compliance, and how you need to change your operations to avoid sanctions.

Continue Reading...

Chat Now