Blog Header Banner

How Colocation Can Help Your Business (Infographic)   no comments

Jul 18, 2017 @ 10:00am colocation

Click Here to see just how Colocation with TurnKey Internet can help your business! – 3 MONTHS FREE!

View Full Size

How Colocation Can Help Your Business (Infographic)

View Full Size

Click Here to see just how Colocation with TurnKey Internet can help your business! – 3 MONTHS FREE!

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on July 18th, 2017

Tagged with ,

How To Be Ready When Ransomware Strikes   no comments

Jul 11, 2017 @ 11:16am disaster recovery

How to be Ready when Ransomware Strikes

From buying insurance policies to installing security cameras, you take every possible step to protect your business from disaster. But you power on your computer and are met with a screen that claims to have encrypted all of your files. Unless you pay a fee before the timer expires, the program will delete your files forever. Although each situation will be different, this is what will likely happen when ransomware strikes your business.

If you store your customer data, tax information, contracts or any other important files on your network, your business can suffer. Not only will ransomware lock your files, but it can also destroy your reputation if your customers find out that your servers are not secure. When the future of your business is on the line, you can’t afford to leave yourself exposed to the threat.

Taking preventative steps to minimize the effects ransomware is a lot easier than trying to remove it. Once the ransomware takes over a computer, you won’t be able to recover your files without paying the ransom. To ensure your business is ready for a ransomware attack, you will need to focus on these key areas: Employee Education, Cloud Backups, and Disaster Recovery as a Service or DRaaS.

 

Employee Education

Criminals and hackers will use a range of tactics to infect a business or organization with their malicious software, including sending an email containing an infected link to one of your employees. The infected email can even be made to appear as if it came from one of your company’s email addresses. The moment your employee clicks on the link, the ransomware will jump into action and hold your files hostage. Also, if a member of your team is infected at home and brings a flash drive to work, you could have a problem on your hands.

Teaching your employees how to stay safe online is one of the top ways to protect your business from such attacks. If you want to avoid taking unneeded risks, prevent your employees from using personal devices on your network. Ensure that each person who works for you knows not to click on links unless they are sure that no danger is present. When someone from your company sends an email, have your team call the person to confirm that the email is legitimate. In addition to showing people how to stay safe when they use your network, consider putting policies in place to add an extra layer of protection.

 

Cloud Backups

Ransomware can easily spread across your office network, encrypting and possibly deleting all of your company’s files. If you want to do everything that you can to avoid such a disaster, consider getting a dedicated cloud backup server or solution for your business. Doing so will allow you to store copies of your files outside of your infected office network, so that you can recover them after an attack.

One thing to keep in mind when searching for a cloud backup provider is storage limits. If your business has a large amount of data that will need to be backed up into the cloud, consider looking for a provider that offers an unlimited storage option.

 

Disaster Recovery as a Service (DRaaS)

No matter how prepared, you can never totally eliminate the threat of ransomware. Even if you have taken the step to backup all of you company’s critical files, you can still be left with the daunting task of restoring all that data as well as needing to recover your company’s entire IT infrastructure. This is where Disaster Recovery as a Service or DRaaS comes in.

With a DRaaS solution, you can have a complete backup of your business’s vital IT infrastructure at an off-site datacenter. Entire operating systems, whether it be physical or virtual, databases or individual files and folders can all safely and securely be replicated to a datacenter. Data can then be securely pushed back down to your office location, or it can even be restored into a virtual cloud environment, utilizing Cloud Replication.

DRaaS solutions that feature Cloud Replication allow for the restoration of data to a virtualized server. Utilizing an off-site datacenter’s cloud infrastructure, data can be made available instantly, then accessed remotely from anywhere in the world over multiple, redundant, high speed networks. This removes the bottleneck of local internet service providers bandwidth availability, and saves potentially hours of business critical time by bypassing the need to wait for your onsite systems to restore and be back in working order.

Should a disaster occur in which your infrastructure is no longer available or accessible to be restored, the need to purchase new hardware can be completely eliminated. Utilizing a DRaaS solution can have your business back online in minutes, not days. Employees can continue their work from home, remotely accessing images of their old workstations running live in the cloud, ensuring your business does not skip a beat.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on July 11th, 2017

Tagged with , , ,

Disaster Recovery in the Cloud   no comments

Jun 27, 2017 @ 10:33am cloud

Disaster Recovery in the Cloud

The cloud has changed the way that many businesses handle disaster recovery and business continuity planning. One of the biggest changes the cloud has brought to the business world is the ability for smaller organizations to use the type of data recovery systems that historically were only available to large organizations.

 

Now, any business’ disaster recovery plan can include complete data backups that are off-site and redundant. Prior to cloud backup systems, businesses were often limited to storing data backups on-site. If a fire broke out or servers were damaged in some other way, on-site data would be lost. Off-site backups frequently required manually making copies of data and/or moving storage media to a different location before cloud computing streamlined the backup process.

 

The cloud now allows data to be saved automatically, and many businesses are working off of cloud-based systems at all times. Another major benefit of using the cloud for backups is that many other types of data storage have significant failure rates. Tapes, in particular, were used for decades as a method of storing backup data, but it has been found that they have about a 10 percent failure rate.

 

Cloud computing offers redundant file storage, so unlike with tapes or even hard drives that could potentially fail, data saved to the cloud is almost guaranteed to always be available. Systems can be set in place to backup data automatically, and cloud storage allows you to keep multiple copies of records with different time-stamps.

 

Another major benefit of using these types of backup systems is that they can be used almost anywhere. So long as an employee has access to the internet, they should be able to log into the cloud and access business files and applications.

 

The Cloud is helping businesses recover their most critical systems and data faster, while also avoiding the expensive infrastructure costs of onsite or in-office datacenters. Leveraging a cloud backup solution such as TurnKey Vault, is by far one of the best, most cost effective ways to protect your company and ensure business continuity when disaster strikes.

 

TurnKey Vault combines advanced technologies with an easy-to-use graphical interface that allows the scheduling and configuration of the backup of your critical data. Entire operating systems, whether it be physical or virtual, databases or individual files and folders can be safely and securely replicated to TurnKey Vault’s state of the art, secured datacenter facility. Data can then be restored into our on-site cloud environment or quickly and securely pushed back down to your location.

Protect anything, anytime, anywhere.

For more information, visit www.TurnKeyVault.com

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on June 27th, 2017

Tagged with , , ,

Securing cPanel   no comments

Jun 20, 2017 @ 10:20am Web hosting

Securing cPanel

cPanel is one of the most popular web hosting control panels available today. With it’s user-friendly graphical interface and robust server automation tools, cPanel is designed to make web hosting as simple as possible. However, like many other popular applications, it can be vulnerable to potential security problems. To prevent your website from falling victim to hackers and malware, it is critical that you manage and routinely check your server’s cPanel security settings.

 

SSH

SSH or Secure Shell, is a common way users access their server or website remotely. Unfortunately, it also provides an entry point for hackers. Data sent through SSH is authenticated and encrypted to prevent outside manipulation, so malicious users can’t touch it unless they break through your security measures. The default port of 22 is the most common setting for SSH access. Changing it to another available port and implementing a security key for logins minimizes the risk of being hacked. Switch the settings from SSH1 to SSH2 for additional protection.

 

Firewall

A firewall lets users access cPanel while keeping unauthorized individuals out. ConfigServer Security and Firewall or CSF, is one of the most popular firewalls for cPanel. It scans the system on a regular basis and checks authentication logs to keep your site safe from hackers at all times. CSF also provides feedback on how to make your server more secure overall.

 

Brute Force Protection

Although a firewall can prevent hackers from gaining access to a website or server, it won’t stop them from trying to log in. Brute force protection is a feature of cPanel used to block IP addresses after multiple failed login attempts. Found under the ‘Security Center’ section, this option is easy to enable and customize. Use the IP Deny Manager to manually input IP addresses known to be malicious so that they’re never allowed to log on. You can customize the brute force option, known as cPHulk, by setting how many minutes the tool monitors for repeated logins, the maximum number of failed logins allowed and how long each IP ban stays in place.

 

Passwords

From your admin cPanel login to individual email accounts, every access point needs a strong, secure password. Longer passwords allow for more complex combinations of numbers, symbols and upper- and lower-case letters. Use a different password for accessing cPanel, FTP, email management and other secure areas, making sure none of them contain obvious information such as phone numbers or birthdays. If you have trouble coming up with enough different combinations, try an online password generator.

 

Automatic Updates

One of the easiest ways to keep cPanel secure is to enable automatic updates. Old versions of software, including cPanel, may contain security vulnerabilities hackers can use to access your server. Automatic updates ensure you’re always running the latest version of cPanel with any associated security patches and bug fixes. Go back and check once and a while to confirm updates are running as they should. If not, update manually and contact your web host to find out why the setting isn’t working.

 

Additional Settings to ‘Tweak’

While you’re taking care of the larger security issues in cPanel, make sure you don’t neglect less common settings. Open ‘Tweak Settings’ under Server Configuration to access an entire list of other possible security measures. With this checklist, you can:

• Help prevent the sending of unauthorized emails, including spam
• Shut down potential email attacks
• Block malicious referrals or redirects from hijacking your site
• Stop the generation of proxy domains
• Require IP validation for cookies
• Set up an additional security token for cPanel access

Enabling these additional cPanel security settings helps address any remaining vulnerabilities and keep hackers at bay. But, for those of you who feel there’s just not enough time in your day to employ these security measures, or if you just prefer someone else does it for you, at TurnKey Internet we got your back. We offer Fully Managed solutions that include Server Hardening. We’ll take care of securing and protecting your server and cPanel so you can focus on running your business.

For more information, visit https://turnkeyinternet.net/managed/

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on June 20th, 2017

Tagged with , , , , ,

Content Management System (CMS)   1 comment

Jun 13, 2017 @ 10:32am Web hosting

CMS - Content Management System

Whether you are a beginner looking to start your first website, or a tech-savvy business owner creating your company’s e-commerce store, one of the first decisions you will make is what Content Management System, or CMS, to use. A CMS is an application that supports the creation and publication of digital content and media. More importantly, a CMS allows creators with little knowledge of programming languages to easily create and manage websites and their content.

While there are various options when it comes to choosing a CMS, a few standout due to their popularity:

 

Drupal

Currently ranked the 3rd most popular CMS in the world, Drupal is considered as one of the most versatile, and robust systems available today. If you’re building a website that will contain a large amount of complex data, and expect to have heavy visitor traffic, Drupal is an excellent choice due to the speed and strength from its advanced structure. It also features a large amount of free themes and available add-ons. However, all of this comes at the cost of needing more experience and expertise to truly utilize this powerful, yet at times complex CMS. Drupal is enterprise-ready and will scale with your growing business.

 

Joomla

Next we have the 2nd most popular CMS, Joomla. When it comes to E-Commerce sites, Joomla tends to be a favorite choice for many. It’s based on PHP and MySQL, allowing more advanced developers to create powerful web applications. This has helped Joomla to build what’s considered to be one of the strongest developer communities around. With a minor amount of effort into learning Joomla’s terminology and structure, you can go on to create a fairly advanced website.

 

WordPress

Finally, we have by far the most popular CMS out there, WordPress. Back in 2003, WordPress started out as just a simple blogging tool. Today, it has grown into a full, feature-rich, content management system, that is currently running on more than 75 million websites. With it’s extremely easy to use interface, you can create a website in only a matter of minutes. Plus, with the endless amount of free themes and plugins available for WordPress, it’s easy to make your website look great. However, popularity does have it’s drawbacks. For instance, WordPress is one of the biggest targets for hackers. It is critical you keep it up-to-date to prevent attacks on your website. Regardless, with it’s intuitive design and countless number of free customizations, this easy to manage CMS demonstrates why it’s a popular choice.

 

All three CMS applications listed above have their own pros and cons, but a benefit they all share is that they are free to use, open-source software. Plus to make things even easier, they all support simple one-click installations. Need help getting started? At TurnKey Internet, our Cloud Solution Specialists are here to assist. Contact us today!

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on June 13th, 2017

Tagged with , , , ,

Web Hosting 101: What is a VPS?   no comments

Jun 6, 2017 @ 10:18am Web hosting

What is a VPS?

Businesses are faced with a wide variety of choices and options when it comes to finding a hosting solution for their website, company email and data. One option is shared hosting, in which a single server’s resources are shared by a number of different websites and users. However, if you’re a business looking for more power, control, and flexibility, the solution for you may be a VPS or Virtual Private Server. A VPS offers the ultimate combination of performance, value, security and are far more flexible than other hosting options, giving your organization full control over the security settings, choice of operating system, control panels, software configuration, and applications.

Let’s take a look at some specific advantages of choosing a VPS:

 

Guaranteed Resources

When using a VPS, your server is provisioned with a specified amount of performance resources that is exclusive and guaranteed to you and no one else. Not only will this give your business more room to work with and expand, it will also prevent issues with your site caused by other websites. For example, if you’re site is hosted on a shared server where there is another website that is being attacked or hogging up resources, this can affect the performance of your own company’s website.

 

Customized Performance & Software

A VPS allows your business to customize performance and software based on your company’s unique needs. Things like CPU Cores, Memory, and Hard Drive space can all be customized and upgraded on a VPS. With shared hosting, you are limited to the software already installed on the server, and sometimes it may lack a requirement or feature your business needs. But with a VPS, you have full flexibility over which software the server runs, even down to the Operating System.

 

Administrative Access

One downside of shared hosting solution is the lack of Administrative or root access. This limitation affects what software you can install as well as the settings and options that you can configure. This can greatly impact the potential of what you are able to do with your website. However with a VPS, you do have root/admin access to your virtual server. This advantage will also provide you with the ability to better monitor and troubleshoot your website because you’ll have full access to your virtual server’s logs.

 

Dedicated IP Address

Each VPS comes with its own dedicated IP address. With shared hosting, your site may be sharing an IP address with multiple websites. If your website happens to share an IP with a site that spams or contains malware, this can cause multiple problems. Your website can end up getting blocked, your email rejected as spam, even your search results can be affected. Another thing to consider is whether or not you’ll be running e-commerce software or selling things on your site. If so, you will need to have an SSL for your site, which in turn requires a unique dedicated IP.

 

Now if you’re worried that you’re not tech savvy enough to run your own VPS, consider the option of going with a Managed VPS solution, which will provide many additional benefits on top of what’s listed above. There are countless other advantages to using a VPS, however the 4 above are some of the most notable. So before you decide to host your website on a shared server, consider the added flexibility, reliability, and performance that a VPS can provide.

Backed with bulletproof reliability, TurnKey Internet’s virtual private servers offer the perfect balance of value, performance, and ease-of-use. All VPS packages include 100% network up-time, 24/7 support, and a 30-day money-back guarantee! Turnkey Internet offers a full suite of managed hosting services such as server back-ups, hands-on system administration, intrusion detection protection, and advanced firewall protection services. Select from Linux or Windows operating systems. Choose control panel software from cPanel, Plesk and DirectAdmin. For more information, visit www.turnkeyinternet.net

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on June 6th, 2017

Tagged with , , ,

Choosing the Right Cloud Provider and Datacenter   no comments

May 30, 2017 @ 11:52am cloud

Choosing the Right Cloud Provider & Datacenter

Once you have decided that utilizing the cloud is the right decision for your business, you will need to find the right provider and datacenter. You are placing all of your important data or even your company’s entire IT infrastructure in the hands of this provider, so you must make sure that you choose the right one.

 

The best way to find the right cloud provider is to begin by talking to some of the provider’s current clients. These are the people who have already made the decision to trust the provider, and they will have the best insight into how the provider works and what it can offer. Try some of these questions to discover more about the service that you are considering:

  • Did you find the on-boarding process relatively easy to accomplish?
  • What is the technical support like when you encounter problems?
  • Have you personally experienced any serious security concerns or incidents?
  • How have your security concerns been handled by the provider?

 

If you are dissatisfied with any of the responses to these questions, you do not have to use that particular provider. Keep looking and asking questions until you find a cloud service that meets your needs and that makes you feel comfortable.

 

Technology is constantly changing and improving, and you need to be able to trust that your datacenter will keep up with the evolution of security needs. For any cloud service, find out whether there are security protocols in place, including:

  • Physical security of the datacenter
  • Environmental controls
  • Back-up measures for power and internet
  • Back-up measures for your data
  • Technical support when you need it

 

Frequent system audits are also necessary in order to ensure that all datacenters meet or exceed industry standards for data security. When you are searching for a cloud provider, ask potential candidates about their compliance to SSAE-16/SOC1. This set of standards measures the amount of control that a datacenter maintains over your sensitive data and financial information. An audit will report any flaws in data flow. You should also inquire about compliance to the Health Insurance Portability and Accountability Act (HIPAA). This regulation ensures the security and privacy of private health information that is stored or hosted in a datacenter.

If your cloud provider’s datacenter is compliant with both of these standards, you can rest assured that your sensitive data will be monitored and its integrity will be maintained.

Choosing to put your business information or IT infrastructure in a cloud provider’s datacenter rather than housing it on-site is an important decision that requires careful vetting of your potential provider. Once you have chosen the right provider, you can trust that their datacenter will keep your company’s important information safe and secure.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on May 30th, 2017

Tagged with , , , , ,

Why Website Speed Matters (Infographic)   no comments

May 23, 2017 @ 9:36am Web hosting

Click Here to see just how fast your website can be with TurnKey Internet! – FIRST MONTH FREE!

View Full Size

Why Website Speed Matters - Infographic

View Full Size

Click Here to see just how fast your website can be with TurnKey Internet! – FIRST MONTH FREE!

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on May 23rd, 2017

Tagged with , ,

What is Ransomware?   no comments

May 16, 2017 @ 10:12am internet security

What is Ransomware?

Over the past few years malware infections have seen an exponential growth. They are becoming more sophisticated, using newer methods that are not only harder to detect, but also require less user interaction. One of the more prominent forms of malware, especially in recent days, is called Ransomware.

 

Ransomware is form of malware, or malicious software, that carries out its attack by encrypting the data on a computer or server, then blocking access to that data until a ransom is paid.

 

Security researchers report attackers are not only upgrading their ransomware to make it more unbreakable, they are also using unique methods of distribution. In some cases, these methods require no user interaction at all. In the past, most ransomware infections occurred via phishing attacks, which required a user to click on a malicious website or email link. But these newer attacks are less dependent on user interaction and more dependent on unpatched software or Operating System vulnerabilities or poor security practices.

 

Ransomware is spreading faster and is self-replicating within organizations and businesses before coordinating ransom demands. It is critical that companies take the needed steps to prepare and protect their network as well as their local and cloud-based servers. The damage of ransomware encrypting and disabling all of your corporate data within seconds or minutes is real and has lead to some high profile cases including hospitals being locked out of all their data due to ransomware.

 

There are some easy yet vital best practices you should follow to protect yourself and your company from becoming victims of ransomware. First and by far the most important, backup your data. Second, consistently keep your software and systems up-to-date. Third, make sure you are utilizing some form of antivirus and malware protection software on your PC’s and servers. Finally, BACKUP YOUR DATA! Yes, I know I said that already, but this step is so critical it’s worth mentioning twice. If you don’t currently have a backup solution, there are many cloud-based disaster recovery and backup options to choose from, such as TurnKey Vault.

 

Your primary goal is to protect your users, not just your network. Whether they are on a laptop, tablet or smartphone, your users need to be protected everywhere.  However, it is unreasonable to assume that you will be 100% protected from every threat that exists. New more advanced methods to attack computers and encrypt their files are popping up everyday. This is why your number one priority should be to backup your data regularly.

 

Make sure whatever backup solution you deploy offers data encryption, supports both desktop PC’s and Macs, as well as Linux and Windows based servers. A backup solution like TurnKey Vault offers live cloud replication which will get you back on your feet in minutes in case of a true disaster by creating a live cloud-based copy of any PC workstation or Server accessible from anywhere over the Internet to get you access to your data and applications quickly.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on May 16th, 2017

Tagged with , , , ,

TurnKey Internet, Inc. Receives Privacy Shield Certification   no comments

May 11, 2017 @ 12:50pm Press Release

TurnKey Internet

LATHAM, NEW YORK (May 11th, 2017) – Leading Datacenter and Cloud Hosting Solutions provider TurnKey Internet, Inc. has announced its Privacy Shield certification.

The EU-U.S. Privacy Shield framework and certification was designed by the U.S. Department of Commerce and the European Commission to provide companies on both sides of the Atlantic with a mechanism to comply with data protection requirements when transferring personal data from the European Union to the United States in support of transatlantic commerce.

“Our Privacy Shield certification reflects our fundamental commitment to protecting our customers and their data,” said Adam Wills, CEO of TurnKey Internet, Inc. He continued, “At TurnKey Internet, we strive to meet the highest levels of data privacy protection. We believe it is critical that we do everything we can to build trust and ensure privacy compliance for all of our global clients.”

The EU-U.S. Privacy Shield replaces the Safe Harbour Agreement after the European Court of Justice declared that it did not meet Europe’s data protection standards. This new framework protects the fundamental rights of anyone in the EU whose personal data is transferred to the United States as well as bringing legal clarity for businesses relying on transatlantic data transfers.

“Our clients from over 150 countries entrust us to securely receive and host their personal data,” says Wills. “This certification highlights our vision of providing the most secure and reliable Cloud Hosting solutions available today.”

For more information about TurnKey Internet or to speak with a Cloud Hosting Solutions expert, visit https://turnkeyinternet.net/

 

About Turnkey Internet

Founded in 1999, TurnKey Internet, Inc. is a full-service Cloud Hosting Solutions provider with Datacenters in New York and California specializing in Infrastructure as a Service (IaaS) to clients in more than 150 countries. Services offered in both East Coast and West Coast, USA – include Public Cloud, Private Cloud, Dedicated & Bare Metal Servers, Backup & Disaster Recovery, Online Storage, Web Hosting, Managed Hosting, Hybrid Solutions and Enterprise Colocation. Headquartered in New York’s Tech Valley Region, TurnKey Internet’s Flagship company owned Datacenter offers SSAE 16 Type II certification powered exclusively by on-site Solar and Hydroelectric sources to provide a 100% renewable energy footprint. In 2013, the facility was designated as the 39th ENERGY STAR® Certified Datacenter in the United States. For more information, please call (518) 618-0999 or visit www.turnkeyinternet.net/media.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on May 11th, 2017

Tagged with , , , ,