Blog Header Banner

TurnKey Internet Celebrates Earth Day 2018 with New Green Awards & Awareness   no comments

Apr 17, 2018 @ 9:00am Press Release

TurnKey Internet Green Data Center

LATHAM, NEW YORK (April 17, 2018) – To celebrate Earth Day, leading Data Center and Cloud Hosting Solutions provider TurnKey Internet, Inc. announced today that it has been awarded and certified by the Green Business Bureau™ and Green America™ for its green initiatives and commitment to the environment. TurnKey Internet’s green data center utilizes state-of-the-art technology and 100% renewable energy to provide the greenest cloud-based IT services for clients all over the world. In anticipation of Earth Day, April 22nd, TurnKey Internet plans to amplify awareness for their low-energy, low-impact IT solutions.

TurnKey Internet will run an Earth Day promotion for the entirety of April to honor their commitment to the environment. Their New York data center offers revolutionary green IT solutions, such as employing low-voltage servers stored in ultra-efficient cold containment pods in each section of their data center. These pods deliver precision spot-cooling to temperature-regulated server racks, which use thirty-three percent less energy than traditional data centers.

TurnKey Internet runs their Energy Star certified facility with 100% renewable hydro and solar power. Their state-of the art data center is equipped with on-site, rooftop solar panels, and uses hydro-power from Niagara Falls to further supplement their renewable energy initiatives as beneficiaries of Gov. Cuomo’s “Recharge New York” power program. In 2013, The New York State Department of Environmental Conservation awarded TurnKey Internet the Environmental Excellence Award in recognition of their innovative data center design and outstanding commitment to environmental sustainability, social responsibility and economic viability.

“The future of both the Cloud Industry and the IT world in general revolve around energy—generating it from renewable resources and consuming it efficiently,” said Adam Wills, CEO of TurnKey Internet. He continued to say, “TurnKey’s green data center was built with sustainability in mind, and our commitment only evolves as the world-wide demand for energy consumption continues to multiply.”

While maintaining their high-level energy-efficient data center, TurnKey Internet looks forward to Earth Day to emphasize that all it takes to merge technology and the environment is a little bit of corporate responsibility.

For more information about TurnKey Internet’s Green Data Center, or to speak with a Cloud Hosting Solutions expert, visit https://www.turnkeyinternet.net/green

About TurnKey Internet

Founded in 1999, TurnKey Internet, Inc. is a full-service Cloud Hosting Solutions provider with Data Centers in New York and California specializing in Infrastructure as a Service (IaaS) to clients in more than 150 countries. Services offered in both East Coast and West Coast, USA – include Public Cloud, Private Cloud, Dedicated & Bare Metal Servers, Backup & Disaster Recovery, Online Storage, Web Hosting, Managed Hosting, Hybrid Solutions and Enterprise Colocation. Headquartered in New York’s Tech Valley Region, TurnKey Internet’s Flagship company owned Datacenter offers SSAE 16 Type II certification powered exclusively by on-site Solar and Hydroelectric sources to provide a 100% renewable energy footprint. In 2013 the facility was designated as the 39th ENERGY STAR® Certified Datacenter in the United States. For more information, please call (518) 618-0999 or visit www.turnkeyinternet.net

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on April 17th, 2018

Tagged with , ,

Finding the Right Data Center for Your Business   1 comment

Apr 10, 2018 @ 10:52am datacenter

Finding the Right Data Center

Once you have decided that utilizing the Cloud is the right decision for your business, you will need to find the right data center provider. You are placing all of your important data or even your company’s entire IT infrastructure in this data center, so you must make sure that you choose the right one.

The best way to find the right data center is to begin by talking to some of the provider’s current clients. These are the people who have already made the decision to trust the provider, and they will have the best insight into how the data center works and what it can offer. Try some of these questions to discover more about the service that you are considering:

  • Did you find the on-boarding process relatively easy to accomplish?
  • What is the technical support like when you encounter problems?
  • Have you personally experienced any serious security concerns or incidents?
  • How have your security concerns been handled by the provider?

If you are dissatisfied with any of the responses to these questions, you do not have to use that particular provider. Keep looking and asking questions until you find a data center that meets your needs and that makes you feel comfortable.

Technology is constantly changing and improving, and you need to be able to trust that your data center provider will keep up with the evolution of security needs. For any cloud or data center solution, find out whether there are security protocols in place, including:

  • Physical security of the data center
  • Environmental controls
  • Back-up measures for power and internet
  • Back-up measures for your data
  • Technical support when you need it

Frequent system audits are also necessary in order to ensure that all data centers meet or exceed industry standards for data security. When you are searching for a cloud provider, ask potential candidates about their compliance to SSAE-16/SOC1. This set of standards measures the amount of control that a data center maintains over your sensitive data and financial information. An audit will report any flaws in data flow. You should also inquire about compliance to the Health Insurance Portability and Accountability Act (HIPAA). This regulation ensures the security and privacy of private health information that is stored or hosted in a data center.

If your cloud provider’s datacenter is compliant with both of these standards, you can rest assured that your sensitive data will be monitored and its integrity will be maintained.

Choosing to put your business information or IT infrastructure in a data center rather than housing it on-site is an important decision that requires careful vetting of your potential provider. Once you have chosen the right provider, you can trust that they will keep your company operational and important information secure.

TurnKey Internet owns and operates its own private, SSAE-16 Certified, data center located in New York’s Tech Valley region. Owning our data center, we have been able to design, build and maintain every aspect of its construction to provide an ideal hosted server environment. This allows us to provide our clients fast, secure and reliable performance at all times. We’ve also been able to leverage the state-of-the-art in green technologies, making our data center among the most energy-efficient world-wide.

For more information, visit https://www.turnkeyinternet.net/datacenters

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on April 10th, 2018

Tagged with , , ,

Reviewing Your Company’s Backup and Recovery Plan   no comments

Apr 3, 2018 @ 11:00am backup

Backup and Recovery Plan

Is your company prepared for a catastrophe that could result in the loss of your data? You’ve most likely taken out insurance to protect yourself against natural disasters, robberies and similar catastrophic events. Your data should be no different. The only difference is that this type of insurance involves backing up your data and IT infrastructure, so that your business remains online and operational, even during one of those catastrophic situations mentioned above or something like a hardware failure or a disastrous infection. Here are some key things to focus on when reviewing your company’s existing plan or during the development of a new one:

 

What to Back Up

Determining what needs to be backed up should be addressed before you look at how you back it up. Do you want to back up everything that is located on computers at the office? What about data located on laptops or cellphones that are taken to and from home? Is your email or website backed up? Do you want them to be? Do you possess physical forms and documents that you want scanned into electronic form and then backed up in that form so that you are set if something such as a fire or flood destroys the hard copies?

You can back up everything, otherwise known as a full backup. This obviously requires the most storage space as well as the most time. However, it helps ensure that you will be completely back up and running in a timely manner if some disaster causes your primary data source to no longer be accessible.

However, this is not always necessary. In that case, consider an incremental or partial backup. An incremental backup involves the backing up of only files that had been created or changed since the last time your data had been backed up. This tends to be much quicker, but you do need to then ensure that you have access to several incremental backups in order to fully restore your data. It can also be difficult to organize your files or to find a specific one if you are downloading several incremental backups after disaster struck.

A partial backup means that you are only backing up part of your data, presumably the most valuable portion. However, the difference between a partial backup and a complete backup is usually minimal, meaning that, with a few exceptions, you might as well just back up everything.

Focus initially on the most important data, whatever would cause the most damage were the information to become inaccessible. These files should also be backed up more often. Of course, it does take time and money to back up your information, but it is well worth it when you consider the repercussions of losing access to it for a considerable time period or forever.

 

Local / Onsite Backups

Local or onsite backups involve copying and storing your data on a server or drive that is located on the same premises as your primary data source. The most significant benefit of this plan is that you can always have your secondary data right there. If something happens to your primary computer system, it’s normally easy to start utilizing the backup sources, and you don’t need to have an internet connection to do so. The cost of utilizing this type of data backup is usually relatively low, and the process of backing up your data with this method is normally pretty simple.

However, several significant disadvantages exist as well. A natural disaster such as a flood or hurricane that destroys your office or original data source will often take out your backup data too if it’s being kept onsite. And if somebody breaks in and steals your primary data, doing the same to your secondary data too can be done on the same trip.

 

Cloud Backup

Those taking advantage of cloud backup options will have their data sent to a remote data center on a regular basis. Probably the most significant benefit of going this route is that multiple copies of your data will can be made to stored on multiple servers located in a variety of places. That way if something disastrous happened to one place or server where your backup data was stored, you could simply access an alternate. Your data is safe at these locations as it is encrypted before being stored, and you have instantly scalable storage capacity. Another benefit is being able to automate the process so that you are not dependent on somebody remembering to back up the data.

An indirect benefit of utilizing a cloud backup method is that those who are authorized to do so can easily access the data, whether they are located across town or even on the other side of the world. This is a great benefit for organizations with multiple locations or remote staff. It’s also generally more cost effective than backing up your data onsite, due to not needing to purchase your own backup equipment.  However, make sure that you research and trust the data center provider you are using to back up your data remotely.

 

Cloud Replication

Cloud Replication allows for the restoration of data to a virtualized server. Utilizing an off-site data center’s cloud infrastructure, data can be made available instantly, then accessed remotely from anywhere in the world over multiple, redundant, high speed networks. This removes the bottleneck of local internet service providers bandwidth availability, and saves potentially hours of business critical time by bypassing the need to wait for your onsite systems to restore and be back in working order.

Should a disaster occur in which your infrastructure is no longer available or accessible to be restored, the need to purchase new hardware can be completely eliminated. Utilizing a Cloud Replication solution can have your business back online in minutes, not days. Employees can continue their work from home, remotely accessing images of their old workstations running live in the cloud, ensuring your business does not skip a beat.

 

Whether it be an office fire, hardware failure, employee error, or malware infection, IT disasters are inevitable. That’s why it is critical that you have a plan in place. Don’t gamble with your company’s data, call TurnKey Internet at 518-618-0999 and receive a free consultation of your company’s Disaster Recovery Plan. Learn more at www.TurnKeyInternet.net/myplan

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on April 3rd, 2018

Tagged with , , ,

World Backup Day is March 31st – Don’t Be an April Fool   no comments

Mar 27, 2018 @ 10:03am backup

World Backup Day - March 31stData is the most important asset of your business. Data could be anything from accounting records to credit card numbers, tax records, phone numbers or even your company’s website. Your data is among the most important commodities to your company. We all know this, but yet, why do so many of us fail to protect our data?

Lets say you had been working on a project for months. You had spent hours in development. Tinkering until the website was the exact setup you want and then, BAM, disaster strikes. Your hard drive dies and you lose all of your work. How could this of been prevented? Backups, which brings us to the importance of March 31st.

You see, March 31st is the World Backup Day. No, it’s not an official holiday, but that doesn’t diminish the importance of the day. We all have data that is very important to us. This data takes many forms and if we lost it, could greatly affect our businesses. World Backup Day, March 31st, is a day set to remind us to backup our data. If you haven’t already, why not? Have you seen the backup options over at TurnKey Vault? Something to fit everyone’s situation.

So April 1st comes around, with March now in the rear view mirror – and people shout April Fools – but if you don’t want to be the subject of a tragic April Fools day gone bad we hope you took a moment to make sure your business has a backup plan, and that its working. Every year we replace computers, servers, laptops and more – so its easy to forget to make sure each new device is being backed up – but March 31st is a great day to remind yourself each year to double check them all in your office.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on March 27th, 2018

Tagged with , ,

How to Secure and Protect Your cPanel Server   no comments

Mar 20, 2018 @ 10:08am internet security

Secure and Protect cPanel

cPanel provides convenient server access and an intuitive, user-friendly interface for managing your website. However, like any server application or environment, it can be vulnerable to several potential security problems. As a responsible webmaster or server admin, it’s up to you to recognize these vulnerabilities and take steps to close any loopholes hackers could use to access your server or website. Lets take a look at some of the ways you can secure and protect your cPanel server.

 

Strong Passwords

From the main cPanel portal to individual email accounts, every login point needs a strong, secure password. Guidelines for length vary, and some sources suggest as many as 14 characters to ensure protection. Longer passwords allow for more complex combinations of numbers, symbols and upper- and lower-case letters. Use a different password for accessing cPanel, FTP, email management and other secure areas, making sure none of them contain obvious information such as phone numbers or birthdays.

If you have trouble coming up with enough different combinations, try an online password generator. A password manager is useful for keeping track of your login information for all of cPanel so that you don’t have to look up each password every time you sign on.

 

CSF Firewall

A firewall lets you access cPanel while keeping unauthorized users out. Think of it as a border patrol for your server, constantly checking to ensure only the right people get through. ConfigServer Security and Firewall (CSF) is a popular firewall application for cPanel designed to serve this purpose. It scans the system on a regular basis and checks authentication logs to keep your site safe from hackers at all times. CSF also provides feedback on how to make your server more secure overall. Since more is better when it comes to security, check these reports and make any necessary changes as soon as possible.

 

cPHulk

Although a firewall can prevent hackers from gaining access to your site, it won’t stop them from trying to log in. Brute force protection is a feature of cPanel used to block IP addresses after multiple failed login attempts. Found in the Security Center section, this option is easy to enable and customize. Use the IP Deny Manager to manually input IP addresses known to be malicious so that they’re never allowed to log on.

You can customize the brute force option, known as cPHulk, by setting how many minutes the tool monitors for repeated logins, the maximum number of failed logins allowed and how long each IP ban stays in place.

 

FTP Access

With anonymous FTP, anyone can log in to your site via FTP with only a username and a generic password. This may be useful for sharing files with a large number of people, but it’s like an open door to hackers. When all users can gain access to your server through such a simple process, every file becomes subject to tampering.

Set your FTP preferences to allow only for SSL logins, and require a password to be entered each time. The setting can be found under FTP Server Configuration in cPanel.

 

SSH Access

Secure shell (SSH) is a convenient way to access your site from a remote location. Unfortunately, it can also provide an entry point for hackers. Information sent through SSH is authenticated and encrypted to prevent outside manipulation, so malicious users can’t touch it unless they break through your security measures.

The default port of 22 is the most common setting for SSH access. Changing it to another available port and implementing a security key for logins minimizes the risk of being hacked. Switch the settings from SSH1 to SSH2 for additional protection.

 

Hotlink Protection

Hotlinking is the practice of linking an image or file on one server directly to a page on a remote website. Some people do this in ignorance, assuming the easiest way to embed an image is to use the original link, but it’s generally considered a bad practice. Hotlinked files use bandwidth from your site every time someone accesses them, and this has the potential to overload your servers if too many requests are made.

The Security section of cPanel offers hotlinking protection. Simply enable the setting to prevent third parties from linking to your files. Add an extra layer of security by specifying certain file extensions you don’t want to be hotlinked.

 

Tweak Settings

While you’re taking care of the larger security issues in cPanel, make sure you don’t neglect less common settings. Open Tweak Settings under Server Configuration to access an entire list of other possible security measures. With this checklist, you can:

• Help prevent the sending of unauthorized emails, including spam
• Shut down potential email attacks
• Block malicious referrals or redirects from hijacking your site
• Stop the generation of proxy domains
• Require IP validation for cookies
• Set up an additional security token for cPanel access

Enabling these supplemental security settings helps address any remaining vulnerabilities and keep hackers at bay.

 

Automatic Updates

Your web host should have automatic cPanel updates in place. If not, go to Update Preferences in the Server Configuration area and enable the setting yourself. Old versions of software, including cPanel, may contain security vulnerabilities hackers can use to access your server. Automatic updates ensure you’re always running the latest version of cPanel with any associated security patches and bug fixes. Go back and check once and a while to confirm updates are running as they should. If not, update manually and contact your web host to find out why the setting isn’t working.

 

Security is one area of website management where you should never cut corners to save time or effort. The smartest thing you can do is implement proper security measures for cPanel as soon as your hosting account is set up. Don’t wait until disaster strikes or assume the security promised by your web host is enough. Take proactive measures to keep hackers out and stay in control of your cPanel environment.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on March 20th, 2018

Tagged with , , ,

Cloud VPS: 4 Reasons to Upgrade   no comments

Mar 15, 2018 @ 10:53am Web hosting

Cloud VPS

If you are in the market for business web hosting, you probably already know how many options are out there. While large, established businesses may need a dedicated server to meet their needs, most small to medium-sized businesses may find that a Cloud Hosted VPS or virtual private server is the best match. A Cloud VPS is a sub-section of a dedicated server. It’s a guaranteed amount of space that is completely isolated from the rest of the server. This means you get a private, guaranteed portion of a server without the risks of shared hosting (in which potentially hundreds of people are using the same machine) and without the expense of a dedicated server. Lets discuss the various reasons why Cloud VPS technology is a good choice for your business.

 

1. Potential for Growth

When you’re shopping for a cloud or hosting solution for your business, it is essential that you consider your business’ potential for growth. You don’t want to buy server space, get your website up and running and start selling only to exceed your server’s capacity. If that happens your site goes down. If your site goes down, you lose money! A Cloud VPS offers the instant capability of allocating a large amount of space and resources so your business can grow unfettered.

 

2. Support

Good VPS Hosting comes with robust support. This means you always have a resource if you run into problems. If your site goes down, you have a real person to call. Make sure your VPS Host or Cloud provider has online chat support, a phone number and a ticketing system (TurnKey has all three). There are many hosts out there that do not offer 24x7x365 support. Often these hosts don’t own their hardware and are not always reliable. Do some research before choosing a host to make sure you will get the kind of customer service your business deserves.

 

3. Security

Cloud VPS hosting offers unique IP addresses alongside password protection, firewalls and security software managed by your hosting company (if you choose the right host). This means your data is secure, regularly backed-up and protected from potential attacks. A Cloud VPS is an excellent choice if you are concerned about data security.

 

4. Value

If you are concerned about controlling business expenses (and who isn’t!?) a Cloud VPS is an extremely economical choice. You get nearly all of the benefits of a dedicated machine without the large monthly bill. Of course, if your business grows quickly and you find you need more resources, you can easily upgrade from a Cloud VPS at that time.

Our TurnKey Cloud-Hosted Virtual Servers (VPS) offer the highest level of service and the ultimate combination of performance, value, security and ease of use for your hosting needs. Our VPS’s are far more flexible than other hosting options giving your organization full control over the security settings, choice of operating system, control panels, software configuration, and applications. For more information, visit turnkeyinternet.net/cloud-hosted-virtual-servers-vps

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on March 15th, 2018

Tagged with , , ,

3 Ways to Speed Up Your Website   no comments

Mar 6, 2018 @ 10:06am Web hosting

Website Speed Loading

Many online business owners make the mistake of overlooking the importance of having a fast website. When you want to get the most from your online presence, the loading speed of your content is one of the most important factors to your success. Your prospects have a lot of distractions fighting for their attention, and you must compete with their friends, family and other advertisers if you want to make any progress.

Web users don’t have much tolerance for slow websites, and most will navigate away if your content takes longer than a few seconds to appear on the screen. So every step that you take to increase your website’s performance will help you attract and retain customers, and you are about to learn how to get moving down the right path.

 

1. Content Delivery Network (CDN)

One of the benefits of working online is that you can reach a worldwide audience, and doing so is one of the best ways to enhance your profitability. But when someone downloads your content or accesses your website, the speed at which the content loads will depend on that person’s location. For example, if your hosting server is located in New York, someone who lives in China will encounter delays when trying to access your website.

If your prospects are forced to wait too long, they will often opt to find a local business that can offer them efficient download speeds. You can overcome that problem by using a content delivery network, or CDN. When you have a CDN, your content is stored on several servers around the world. When someone accesses your website or tries to download a file, the CDN will send the files to them from the server that is closest to that person’s location.

 

2. Check Your Plugins

You can find many plugins or scripts that will help you captivate and engage your audience, but using too many of them can decrease the loading speed of your website. If you want to speed it up, take a look at each plugin to determine if you need it and how much it is impacting your site. Disable one plugin at a time to determine if the changes make a difference in the amount of time that it takes for your content to load. If one of your plugins is causing a lot of harm, consider removing it, but you can also check to see if the developer has released any updates.

 

3. Upgrade Your Cloud or Web Hosting

If you have tried everything of which you can think to improve your loading speed, then you might want to take a look at your cloud or web hosting provider. If you have a basic plan, then you might not have access to the amount of bandwidth and resources that you need to improve the speed with which your audience can access your content.

If your web hosting plan is the source of the problem, then you might want to upgrade to a better provider. Although you likely wish to avoid spending more money than needed, the enhanced speed of an effective hosting plan is an investment that will pay for itself over time.

Those who don’t take steps to optimize their website’s loading speed are likely losing more customers than they realize, and you don’t want to repeat the same mistake. Putting in a little effort can go a long way when it comes to keeping your prospects engaged and focused on what you have to say. Optimizing your website is a good place to start when you want to make your content load with enhanced efficiency. But if that step does not help, then upgrading your hosting plan is sure to get the job done.

When your website loads quickly, your customers’ experience will not be interrupted, and they will be that much more likely to make a purchase as a result. The speed with which your content loads is also a reflection of you and your products. When you prevent delays, you are also showing your customers that you care about your reputation, and you will start to earn their respect.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on March 6th, 2018

Tagged with , , , , ,

4 Ways to Protect Your Business From Email Phishing   no comments

Feb 27, 2018 @ 9:43am internet security

Email Phishing

Phishing is the process of posing as another person or as a company to deceive people into giving personal or confidential information away, and criminals have been known to use emails as a way to reach their goals. Knowing about the threat is not always enough when your task is to keep yourself and your business safe, and the attack can occur at any time.

An employee will be checking their email as they would on any other day. Suddenly, the employee spots an email from the bank that asks the user to log in to the account to confirm a recent transaction. But the email was not from the bank, and the user’s information is now in the hands of an identity thief. If you don’t want to encounter this situation, then the following 4 tips will help.

 

1. Don’t Share Sensitive Information Through Email

In a common phishing attack, a criminal will pretend to be someone whom you trust to steal sensitive data. The email could appear as though it had been sent by a friend, boss or business contact, and you might be asked for your account information or pin number. But no credible business will request sensitive data in an email, so the request should be your first red flag.

Rather than sending personal details in an email, pick up your phone and call the company or the individual who requested the information. Although this step might seem a little time-consuming, it can save you from a lot of trouble.

 

2. Manually Navigate to Web Addresses

Long before sending you a fraudulent email, experienced criminals will put in the effort to clone the website of a bank or business. They will then send an email posing as your bank or another trusted entity, and you will be encouraged to click a link that will take you to a malicious website.

Although the content, logo and other details might appear identical to the real thing, any information that you send will be exposed. Avoiding this type of attack is not difficult. Simply open a separate web browser and manually navigate to the website that you intend to visit.

 

3. Look for Spelling Errors

Keep in mind that phishing attacks can come from any location on the planet, so a lot of fake emails are sent by those who don’t speak English as their first language. When someone from another country sends a fraudulent email, the message will often contain obvious spelling errors. Some people dismiss the spelling errors that they find, but they will likely have their personal information stolen as a result. Customer service agents can make mistakes, but using caution is the best way to avoid becoming a victim.

Also, even criminals who speak English fluently can make mistakes when typing an email. If you notice anything that seems odd, call the company or person from whom the email appears to originate and ask for verification. If the email is not legitimate, report it as spam and block the domain.

 

4. Don’t Trust Attachments

Downloading and running email attachments is a good way to get a virus or to have other malicious software installed on your device. In the past, hackers would use screen savers and free games to infect their victims, but hackers can even use Word and Excel documents to inflict damage. After a computer is infected, the malicious code will sometimes automatically email itself to everyone in the victim’s address book. If you want to avoid this problem, never download an attachment that you were not expecting.

 

Having your identity stolen can destroy your credit score, and some people are forced to wait years before they can reverse the damage. Nobody should overlook the threat of phishing, and you can never eliminate the risk entirely. But you can significantly reduce the odds of having your personal or business information exposed by keeping safety at the front of your mind. Protecting yourself and your business will require some time and effort, but safeguarding your information is always easier than trying to pick up the pieces after an incident occurs. Those who focus on security when communicating online will follow these tips, but they will also use common sense to detect the signs of suspicious activity.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on February 27th, 2018

Tagged with , ,

6 Reasons Your Business Should Use Data Center Colocation   no comments

Feb 20, 2018 @ 10:34am colocation

Data Center Colocation

Businesses need their online and IT operations to run with super speeds, be secure, maintained, monitored, and most of all be redundant. Some businesses decide to use in-office or on-site server rooms, while others utilize colocation solutions from a Data Center.

A server room can be any room, in any building that houses servers. Whereas with colocation, your IT infrastructure is housed in a Data Center; a whole building designed to support and provide a secure, power protected, environmentally controlled space, used for accommodating servers, networking, and computer equipment. When deciding where your business should host/store it’s IT equipment, there are 6 main reasons why you should choose Data Center Colocation over an in-office server room:

 

1. Security

Most Server Rooms do not have a high volume of security. Besides the buildings overall security, there may be a lock on the Server Room door. Data Centers pride themselves in the security features they offer. All entrances and exits are secured with a key coded entry system, as well as alarms. Not just alarms for entry. Alarms for temperature control, air pressure, fire/water control, etc. All Data Centers have network cameras, accessible to their staff and security team in a needed event. The racks the servers are housed in are all locked. Only opened when your team needs to visit or by the Data Center staff, if needed.

 

2. Connectivity

What good is your server if you have a fixed bandwidth rate? Most Server Rooms are capped off by their local Internet Service Provider (ISP) as they are using a residential internet service. Data Centers do not use any type of residential internet service and most times are able to set the bandwidth limits as they are needed by the server.

 

3. Redundancy

If there is a power failure at your business, do you have a backup power plan? Most Server Rooms run from the same power source, as the full office. Making your sites and servers go down if there is ever a power failure. Data Centers have a plan for any type of failure. When it comes to power failures, most Data Centers have battery backups, automatically triggered if the main power supply is not responding. When the system sees the backup batteries are being utilized, another backup power source is engaged, the generator. At this point the battery backups turn off and all power is controlled by the generator until normal power is restored.

 

4. Affordability

With a Server Room, you are accumulating all the costs that go along with it. You may have had to cut advertising short or possibly even lay off good employees as the costs to maintain and house your equipment have risen. At a Data Center all those costs are tied into your colocation package and at a much, much lower cost.

 

5. Environment

Data Centers control the cooling and humidity – to a precise and perfect level to keep your equipment running as long as possible. Storing equipment in non-conditioned environmental space like your server room or office closet will shorten the life of your equipment significantly (meaning it will cost you real money to replace broken equipment sooner). Electronics are sensitive to things like electrical and static shock, which occur due to improper humidity (moisture) and you can even find corrosion on the electronics in some poor environmental conditions. Its crucial if you have valuable equipment to store it in a properly humidified and cooled location like a Data Center.

 

6.  Green

Some modern Data Centers, like TurnKey Internet’s Green Data Center , offer one additional benefit ontop of everything above.  Your IT equipment and servers consume less energy, in terms of cooling and power draw, in a modern green-focused data center – and in TurnKey Internet’s Data Center your equipment consumes energy provided only by the Sun (on-site solar array) and Water (Hydro power) providing zero carbon foot prints for your IT infrastructure versus having it at your office.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on February 20th, 2018

Tagged with , ,

Data Centers: Keeping Your Data Safe in the Cloud   no comments

Feb 13, 2018 @ 10:09am cloud

data center security

The question of where to store data and sensitive information continues to concern many businesses. If you are like most companies, you worry about the security of your data. You may be thinking that you need to keep the data as close to you as possible, storing it at your own on-site server room where you can “keep an eye on everything.” How could you possible know what is happening with your data at a data center far away from your office space?

The fact of the matter is, however, that your data is much more secure at a data center, than on your in-house servers. A data center is able to offer you many more security features and guarantees for your data than you have in your own space. However, you have to feel comfortable with your data center keeping your data. A quick look at the many benefits of cloud storage may help convince you.

 

Benefits of The Cloud

Choosing to migrate your data and IT infrastructure into a data center or cloud provider is no easy decision. However, the number of benefits that data centers offer to you and your business can make this change well worth it. Consider the many benefits, including:

  1. Data security – Possibly the most important aspect of cloud storage, data security is the main priority of data centers. With some high-profile companies becoming the victims of data breaches in the last couple of years, data centers and cloud providers have upped their investments in access control, identity management, intrusion prevention and virus and malware protection. These improvements have resulted in increased security protocols and more protection for communication between users and servers.
  2. DDoS protection – Distributed Denial of Service (DDoS) attacks are designed to overwhelm servers, flooding them with requests until the security breaks down and actual user needs are ignored. Such an attack can derail a business quickly, losing revenue, customer trust and authority. Data centers are now providing services that monitor and protect against DDoS attacks.
  3. Regulatory compliance – Data centers are required to follow the industry and governmental regulations that oversee their sectors. This includes guarantees and restitutions for your data in the event of a breach.
  4. Reduced in-house data costs – Migrating all of your data and infrastructure into a data center will allow you to reduce the size and cost of your on-site location. For example, you will be able to remove servers, lower your software costs and potentially reduce IT staff without compromising the integrity or security of your data. Most cloud storage is paid on an as-needed basis, so you will only pay for the amount of server and infrastructure capacity that your business needs, and you can change that amount at any time.
  5. Constant availability – Data centers are exceptionally reliable. The connection is on 99.99 percent of the time, only going down for maintenance, and you will have access to your applications and data at all times and from practically anywhere.
  6. Improved mobility and collaboration – The Cloud is available to those who need it no matter where they are located. With today’s internet connections via tablets and smartphones, you will be able to access your data and your applications no matter what you are doing. You can also share your information and conduct collaborations via shared storage capabilities offered by cloud providers.

 

Choosing the Right Data Center

Once you have decided that storing your information in the cloud is the right decision for your business, you will need to find the right data center provider. You are placing all of your important data in the hands of this provider, so you must make sure that you choose the right one.

The best way to find the right data center is to begin by talking to some of the provider’s current clients. These are the people who have already made the decision to trust the provider, and they will have the best insight into how the provider works and what it can offer. Try some of these questions to discover more about the service that you are considering:

  • Did you find the on-boarding process relatively easy to accomplish?
  • Did the service provide education and training about the new technology for your staff?
  • What is the technical support like when you encounter problems with the service?
  • Have you personally experienced any serious security concerns or incidents?
  • How have your security concerns been handled by the provider?

If you are dissatisfied with any of the responses to these questions, you do not have to use that particular provider. Keep looking and asking questions until you find a data center that meets your needs and that makes you feel comfortable.

 

Your Security and Peace of Mind

Technology is constantly changing and improving, and you need to be able to trust that your data center will keep up with the evolution of security needs. For any cloud service, find out whether there are security protocols in place, including:

  • Physical security of the data center
  • Environmental controls
  • Back-up measures for power and internet
  • Back-up measures for your data
  • Technical support when you need it

Frequent system audits are also necessary in order to ensure that all servers meet or exceed industry standards for data security.

When you are searching for a data center, ask potential candidates about their compliance to SSAE 16/SOC1. This set of standards measures the amount of control that a service organization maintains over your sensitive data and financial information. An audit will report any flaws in data flow. You should also inquire about compliance to the Health Insurance Portability and Accountability Act (HIPAA). This regulation ensures the security and privacy of private health information that is stored on cloud services. A HIPAA audit will demonstrate holes in the security of such specific and sensitive data. If your data center choice is compliant with both of these standards, you can rest assured that your sensitive data will be monitored and its integrity will be maintained.

Choosing to put your business information in a data center rather than housing it on-site is an important decision that requires careful vetting of your potential provider. Once you have chosen a service, you can trust that a data center will keep your important information safe and secure.

TurnKey Internet owns and operates its own private data center located in New York’s Tech Valley region. Our SSAE-16 Certified data center was a former U.S. Government building that was purchased by TurnKey in 2010. It is made to U.S. Federal Government standards, with 1-foot thick concrete along the perimeter, plus additional reinforced walls and security enhancements. We have installed advanced security systems, and infrared based surveillance monitoring cameras. Employees all undergo background screening, and clients are not permitted within the facility except with photo ID and escorted by trained security personnel at all times. Owning our data center, we have been able to design, build and maintain every aspect of its construction to provide an ideal hosted server environment. This allows us to provide our clients fast, secure and reliable performance at all times. For more information, visit www.TurnKeyInternet.net

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on February 13th, 2018

Tagged with , , ,