Blog Header Banner

Datacenters vs. In-Office Server Rooms   no comments

Aug 1, 2017 @ 10:27am colocation

Datacenters vs. Server Room

Businesses of all sizes need to be online in order to stay competitive and grow. Initially, most businesses relied on building their own online IT infrastructure, by converting a spare room or space in their office or even their home, into a “Server Room.” There was no thought of cooling systems or ventilation. No notion of backup power systems, or any real working order was to be found in these Server Rooms.

Today, businesses need their operations to run with super speeds, be secure, maintained, monitored, and most of all be redundant. To achieve this, businesses are moving away from on-site or in-office server rooms and instead are utilizing Datacenters.

Here are some of the key advantages to a Datacenter, a Server Room does not have:

 

Security and Monitoring

Most Server Rooms do not have a high volume of security. Besides the buildings overall security, there may be a lock on the Server Room door. Datacenters pride themselves in the security features they offer. All entrances and exits are secured with a key coded entry system, as well as alarms. Not just alarms for entry. Alarms for temperature control, air pressure, fire suppression, etc. Datacenters also have network cameras, accessible to their staff and security team in a needed event. The racks or cages the servers are housed in are all individually locked and are only opened for pre-authorized individuals or by the datacenter staff, if needed.

 

Bandwidth

What good is your server if you have a fixed bandwidth rate? Most in-office Server Rooms are capped off and limited by their ISP as they are using a residential internet service. Datacenters do not use any type of residential internet service and are able to set their own bandwidth limits.

 

Backup Power

If there is a power failure at your business, do you have a backup power plan? Most Server Rooms run from the same power source, as the full office. Making your sites and servers go down if there is ever a power failure. Datacenters have a plan for any type of failure. When it comes to power failures, most datacenters have battery backups, automatically triggered if the main power supply is not responding. When the system sees the backup batteries are being utilized, another backup power source is engaged, the generator. At this point the battery backups turn off and all power is controlled by the generator until normal power is restored.

 

Affordability

With a Server Room, you are accumulating all the costs that go along with it. You may have had to cut advertising short or possibly even lay off good employees as the costs to maintain and house your IT equipment have risen. At a datacenter all those costs are tied into your package and at a much, much lower cost.

 

Controlled Environment

Datacenters control the cooling and humidity – to a precise and perfect level to keep your equipment running as long as possible.  Storing equipment in non-conditioned environmental space like your server room or office closet will shorten the life of your equipment significantly (meaning it will cost you real money to replace broken equipment sooner).  Electronics are sensitive to things like electrical and static shock, which occur due to improper humidity (moisture) and you can even find corrosion on the electronics in some poor environmental conditions.  Its crucial if you have valuable equipment to store it in a properly humidified and cooled location like a datacenter.

 

Some modern datacenters, like TurnKey Internet’s Green Datacenter , offer one additional benefit ontop of everything above. Your IT equipment and servers consume less energy in terms of cooling and power draw in a modern green-focused datacenter – and in TurnKey Internet’s datacenter your equipment consumes energy provided by only by the Sun (on-site solar array) and Water (Hydro power) providing zero carbon foot prints for your IT infrastructure versus having it at your office.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on August 1st, 2017

Tagged with , , ,

How Colocation Can Help Your Business (Infographic)   no comments

Jul 18, 2017 @ 10:00am colocation

Click Here to see just how Colocation with TurnKey Internet can help your business! – 3 MONTHS FREE!

View Full Size

How Colocation Can Help Your Business (Infographic)

View Full Size

Click Here to see just how Colocation with TurnKey Internet can help your business! – 3 MONTHS FREE!

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on July 18th, 2017

Tagged with ,

Disaster Recovery in the Cloud   no comments

Jun 27, 2017 @ 10:33am cloud

Disaster Recovery in the Cloud

The cloud has changed the way that many businesses handle disaster recovery and business continuity planning. One of the biggest changes the cloud has brought to the business world is the ability for smaller organizations to use the type of data recovery systems that historically were only available to large organizations.

 

Now, any business’ disaster recovery plan can include complete data backups that are off-site and redundant. Prior to cloud backup systems, businesses were often limited to storing data backups on-site. If a fire broke out or servers were damaged in some other way, on-site data would be lost. Off-site backups frequently required manually making copies of data and/or moving storage media to a different location before cloud computing streamlined the backup process.

 

The cloud now allows data to be saved automatically, and many businesses are working off of cloud-based systems at all times. Another major benefit of using the cloud for backups is that many other types of data storage have significant failure rates. Tapes, in particular, were used for decades as a method of storing backup data, but it has been found that they have about a 10 percent failure rate.

 

Cloud computing offers redundant file storage, so unlike with tapes or even hard drives that could potentially fail, data saved to the cloud is almost guaranteed to always be available. Systems can be set in place to backup data automatically, and cloud storage allows you to keep multiple copies of records with different time-stamps.

 

Another major benefit of using these types of backup systems is that they can be used almost anywhere. So long as an employee has access to the internet, they should be able to log into the cloud and access business files and applications.

 

The Cloud is helping businesses recover their most critical systems and data faster, while also avoiding the expensive infrastructure costs of onsite or in-office datacenters. Leveraging a cloud backup solution such as TurnKey Vault, is by far one of the best, most cost effective ways to protect your company and ensure business continuity when disaster strikes.

 

TurnKey Vault combines advanced technologies with an easy-to-use graphical interface that allows the scheduling and configuration of the backup of your critical data. Entire operating systems, whether it be physical or virtual, databases or individual files and folders can be safely and securely replicated to TurnKey Vault’s state of the art, secured datacenter facility. Data can then be restored into our on-site cloud environment or quickly and securely pushed back down to your location.

Protect anything, anytime, anywhere.

For more information, visit www.TurnKeyVault.com

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on June 27th, 2017

Tagged with , , ,

Securing cPanel   no comments

Jun 20, 2017 @ 10:20am Web hosting

Securing cPanel

cPanel is one of the most popular web hosting control panels available today. With it’s user-friendly graphical interface and robust server automation tools, cPanel is designed to make web hosting as simple as possible. However, like many other popular applications, it can be vulnerable to potential security problems. To prevent your website from falling victim to hackers and malware, it is critical that you manage and routinely check your server’s cPanel security settings.

 

SSH

SSH or Secure Shell, is a common way users access their server or website remotely. Unfortunately, it also provides an entry point for hackers. Data sent through SSH is authenticated and encrypted to prevent outside manipulation, so malicious users can’t touch it unless they break through your security measures. The default port of 22 is the most common setting for SSH access. Changing it to another available port and implementing a security key for logins minimizes the risk of being hacked. Switch the settings from SSH1 to SSH2 for additional protection.

 

Firewall

A firewall lets users access cPanel while keeping unauthorized individuals out. ConfigServer Security and Firewall or CSF, is one of the most popular firewalls for cPanel. It scans the system on a regular basis and checks authentication logs to keep your site safe from hackers at all times. CSF also provides feedback on how to make your server more secure overall.

 

Brute Force Protection

Although a firewall can prevent hackers from gaining access to a website or server, it won’t stop them from trying to log in. Brute force protection is a feature of cPanel used to block IP addresses after multiple failed login attempts. Found under the ‘Security Center’ section, this option is easy to enable and customize. Use the IP Deny Manager to manually input IP addresses known to be malicious so that they’re never allowed to log on. You can customize the brute force option, known as cPHulk, by setting how many minutes the tool monitors for repeated logins, the maximum number of failed logins allowed and how long each IP ban stays in place.

 

Passwords

From your admin cPanel login to individual email accounts, every access point needs a strong, secure password. Longer passwords allow for more complex combinations of numbers, symbols and upper- and lower-case letters. Use a different password for accessing cPanel, FTP, email management and other secure areas, making sure none of them contain obvious information such as phone numbers or birthdays. If you have trouble coming up with enough different combinations, try an online password generator.

 

Automatic Updates

One of the easiest ways to keep cPanel secure is to enable automatic updates. Old versions of software, including cPanel, may contain security vulnerabilities hackers can use to access your server. Automatic updates ensure you’re always running the latest version of cPanel with any associated security patches and bug fixes. Go back and check once and a while to confirm updates are running as they should. If not, update manually and contact your web host to find out why the setting isn’t working.

 

Additional Settings to ‘Tweak’

While you’re taking care of the larger security issues in cPanel, make sure you don’t neglect less common settings. Open ‘Tweak Settings’ under Server Configuration to access an entire list of other possible security measures. With this checklist, you can:

• Help prevent the sending of unauthorized emails, including spam
• Shut down potential email attacks
• Block malicious referrals or redirects from hijacking your site
• Stop the generation of proxy domains
• Require IP validation for cookies
• Set up an additional security token for cPanel access

Enabling these additional cPanel security settings helps address any remaining vulnerabilities and keep hackers at bay. But, for those of you who feel there’s just not enough time in your day to employ these security measures, or if you just prefer someone else does it for you, at TurnKey Internet we got your back. We offer Fully Managed solutions that include Server Hardening. We’ll take care of securing and protecting your server and cPanel so you can focus on running your business.

For more information, visit https://turnkeyinternet.net/managed/

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on June 20th, 2017

Tagged with , , , , ,

Content Management System (CMS)   1 comment

Jun 13, 2017 @ 10:32am Web hosting

CMS - Content Management System

Whether you are a beginner looking to start your first website, or a tech-savvy business owner creating your company’s e-commerce store, one of the first decisions you will make is what Content Management System, or CMS, to use. A CMS is an application that supports the creation and publication of digital content and media. More importantly, a CMS allows creators with little knowledge of programming languages to easily create and manage websites and their content.

While there are various options when it comes to choosing a CMS, a few standout due to their popularity:

 

Drupal

Currently ranked the 3rd most popular CMS in the world, Drupal is considered as one of the most versatile, and robust systems available today. If you’re building a website that will contain a large amount of complex data, and expect to have heavy visitor traffic, Drupal is an excellent choice due to the speed and strength from its advanced structure. It also features a large amount of free themes and available add-ons. However, all of this comes at the cost of needing more experience and expertise to truly utilize this powerful, yet at times complex CMS. Drupal is enterprise-ready and will scale with your growing business.

 

Joomla

Next we have the 2nd most popular CMS, Joomla. When it comes to E-Commerce sites, Joomla tends to be a favorite choice for many. It’s based on PHP and MySQL, allowing more advanced developers to create powerful web applications. This has helped Joomla to build what’s considered to be one of the strongest developer communities around. With a minor amount of effort into learning Joomla’s terminology and structure, you can go on to create a fairly advanced website.

 

WordPress

Finally, we have by far the most popular CMS out there, WordPress. Back in 2003, WordPress started out as just a simple blogging tool. Today, it has grown into a full, feature-rich, content management system, that is currently running on more than 75 million websites. With it’s extremely easy to use interface, you can create a website in only a matter of minutes. Plus, with the endless amount of free themes and plugins available for WordPress, it’s easy to make your website look great. However, popularity does have it’s drawbacks. For instance, WordPress is one of the biggest targets for hackers. It is critical you keep it up-to-date to prevent attacks on your website. Regardless, with it’s intuitive design and countless number of free customizations, this easy to manage CMS demonstrates why it’s a popular choice.

 

All three CMS applications listed above have their own pros and cons, but a benefit they all share is that they are free to use, open-source software. Plus to make things even easier, they all support simple one-click installations. Need help getting started? At TurnKey Internet, our Cloud Solution Specialists are here to assist. Contact us today!

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on June 13th, 2017

Tagged with , , , ,

Web Hosting 101: What is a VPS?   1 comment

Jun 6, 2017 @ 10:18am Web hosting

What is a VPS?

Businesses are faced with a wide variety of choices and options when it comes to finding a hosting solution for their website, company email and data. One option is shared hosting, in which a single server’s resources are shared by a number of different websites and users. However, if you’re a business looking for more power, control, and flexibility, the solution for you may be a VPS or Virtual Private Server. A VPS offers the ultimate combination of performance, value, security and are far more flexible than other hosting options, giving your organization full control over the security settings, choice of operating system, control panels, software configuration, and applications.

Let’s take a look at some specific advantages of choosing a VPS:

 

Guaranteed Resources

When using a VPS, your server is provisioned with a specified amount of performance resources that is exclusive and guaranteed to you and no one else. Not only will this give your business more room to work with and expand, it will also prevent issues with your site caused by other websites. For example, if you’re site is hosted on a shared server where there is another website that is being attacked or hogging up resources, this can affect the performance of your own company’s website.

 

Customized Performance & Software

A VPS allows your business to customize performance and software based on your company’s unique needs. Things like CPU Cores, Memory, and Hard Drive space can all be customized and upgraded on a VPS. With shared hosting, you are limited to the software already installed on the server, and sometimes it may lack a requirement or feature your business needs. But with a VPS, you have full flexibility over which software the server runs, even down to the Operating System.

 

Administrative Access

One downside of shared hosting solution is the lack of Administrative or root access. This limitation affects what software you can install as well as the settings and options that you can configure. This can greatly impact the potential of what you are able to do with your website. However with a VPS, you do have root/admin access to your virtual server. This advantage will also provide you with the ability to better monitor and troubleshoot your website because you’ll have full access to your virtual server’s logs.

 

Dedicated IP Address

Each VPS comes with its own dedicated IP address. With shared hosting, your site may be sharing an IP address with multiple websites. If your website happens to share an IP with a site that spams or contains malware, this can cause multiple problems. Your website can end up getting blocked, your email rejected as spam, even your search results can be affected. Another thing to consider is whether or not you’ll be running e-commerce software or selling things on your site. If so, you will need to have an SSL for your site, which in turn requires a unique dedicated IP.

 

Now if you’re worried that you’re not tech savvy enough to run your own VPS, consider the option of going with a Managed VPS solution, which will provide many additional benefits on top of what’s listed above. There are countless other advantages to using a VPS, however the 4 above are some of the most notable. So before you decide to host your website on a shared server, consider the added flexibility, reliability, and performance that a VPS can provide.

Backed with bulletproof reliability, TurnKey Internet’s virtual private servers offer the perfect balance of value, performance, and ease-of-use. All VPS packages include 100% network up-time, 24/7 support, and a 30-day money-back guarantee! Turnkey Internet offers a full suite of managed hosting services such as server back-ups, hands-on system administration, intrusion detection protection, and advanced firewall protection services. Select from Linux or Windows operating systems. Choose control panel software from cPanel, Plesk and DirectAdmin. For more information, visit www.turnkeyinternet.net

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on June 6th, 2017

Tagged with , , ,

Choosing the Right Cloud Provider and Datacenter   no comments

May 30, 2017 @ 11:52am cloud

Choosing the Right Cloud Provider & Datacenter

Once you have decided that utilizing the cloud is the right decision for your business, you will need to find the right provider and datacenter. You are placing all of your important data or even your company’s entire IT infrastructure in the hands of this provider, so you must make sure that you choose the right one.

 

The best way to find the right cloud provider is to begin by talking to some of the provider’s current clients. These are the people who have already made the decision to trust the provider, and they will have the best insight into how the provider works and what it can offer. Try some of these questions to discover more about the service that you are considering:

  • Did you find the on-boarding process relatively easy to accomplish?
  • What is the technical support like when you encounter problems?
  • Have you personally experienced any serious security concerns or incidents?
  • How have your security concerns been handled by the provider?

 

If you are dissatisfied with any of the responses to these questions, you do not have to use that particular provider. Keep looking and asking questions until you find a cloud service that meets your needs and that makes you feel comfortable.

 

Technology is constantly changing and improving, and you need to be able to trust that your datacenter will keep up with the evolution of security needs. For any cloud service, find out whether there are security protocols in place, including:

  • Physical security of the datacenter
  • Environmental controls
  • Back-up measures for power and internet
  • Back-up measures for your data
  • Technical support when you need it

 

Frequent system audits are also necessary in order to ensure that all datacenters meet or exceed industry standards for data security. When you are searching for a cloud provider, ask potential candidates about their compliance to SSAE-16/SOC1. This set of standards measures the amount of control that a datacenter maintains over your sensitive data and financial information. An audit will report any flaws in data flow. You should also inquire about compliance to the Health Insurance Portability and Accountability Act (HIPAA). This regulation ensures the security and privacy of private health information that is stored or hosted in a datacenter.

If your cloud provider’s datacenter is compliant with both of these standards, you can rest assured that your sensitive data will be monitored and its integrity will be maintained.

Choosing to put your business information or IT infrastructure in a cloud provider’s datacenter rather than housing it on-site is an important decision that requires careful vetting of your potential provider. Once you have chosen the right provider, you can trust that their datacenter will keep your company’s important information safe and secure.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on May 30th, 2017

Tagged with , , , , ,

Why Website Speed Matters (Infographic)   no comments

May 23, 2017 @ 9:36am Web hosting

Click Here to see just how fast your website can be with TurnKey Internet! – FIRST MONTH FREE!

View Full Size

Why Website Speed Matters - Infographic

View Full Size

Click Here to see just how fast your website can be with TurnKey Internet! – FIRST MONTH FREE!

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on May 23rd, 2017

Tagged with , ,

What is Ransomware?   no comments

May 16, 2017 @ 10:12am internet security

What is Ransomware?

Over the past few years malware infections have seen an exponential growth. They are becoming more sophisticated, using newer methods that are not only harder to detect, but also require less user interaction. One of the more prominent forms of malware, especially in recent days, is called Ransomware.

 

Ransomware is form of malware, or malicious software, that carries out its attack by encrypting the data on a computer or server, then blocking access to that data until a ransom is paid.

 

Security researchers report attackers are not only upgrading their ransomware to make it more unbreakable, they are also using unique methods of distribution. In some cases, these methods require no user interaction at all. In the past, most ransomware infections occurred via phishing attacks, which required a user to click on a malicious website or email link. But these newer attacks are less dependent on user interaction and more dependent on unpatched software or Operating System vulnerabilities or poor security practices.

 

Ransomware is spreading faster and is self-replicating within organizations and businesses before coordinating ransom demands. It is critical that companies take the needed steps to prepare and protect their network as well as their local and cloud-based servers. The damage of ransomware encrypting and disabling all of your corporate data within seconds or minutes is real and has lead to some high profile cases including hospitals being locked out of all their data due to ransomware.

 

There are some easy yet vital best practices you should follow to protect yourself and your company from becoming victims of ransomware. First and by far the most important, backup your data. Second, consistently keep your software and systems up-to-date. Third, make sure you are utilizing some form of antivirus and malware protection software on your PC’s and servers. Finally, BACKUP YOUR DATA! Yes, I know I said that already, but this step is so critical it’s worth mentioning twice. If you don’t currently have a backup solution, there are many cloud-based disaster recovery and backup options to choose from, such as TurnKey Vault.

 

Your primary goal is to protect your users, not just your network. Whether they are on a laptop, tablet or smartphone, your users need to be protected everywhere.  However, it is unreasonable to assume that you will be 100% protected from every threat that exists. New more advanced methods to attack computers and encrypt their files are popping up everyday. This is why your number one priority should be to backup your data regularly.

 

Make sure whatever backup solution you deploy offers data encryption, supports both desktop PC’s and Macs, as well as Linux and Windows based servers. A backup solution like TurnKey Vault offers live cloud replication which will get you back on your feet in minutes in case of a true disaster by creating a live cloud-based copy of any PC workstation or Server accessible from anywhere over the Internet to get you access to your data and applications quickly.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on May 16th, 2017

Tagged with , , , ,

TurnKey Internet, Inc. Receives Privacy Shield Certification   no comments

May 11, 2017 @ 12:50pm Press Release

TurnKey Internet

LATHAM, NEW YORK (May 11th, 2017) – Leading Datacenter and Cloud Hosting Solutions provider TurnKey Internet, Inc. has announced its Privacy Shield certification.

The EU-U.S. Privacy Shield framework and certification was designed by the U.S. Department of Commerce and the European Commission to provide companies on both sides of the Atlantic with a mechanism to comply with data protection requirements when transferring personal data from the European Union to the United States in support of transatlantic commerce.

“Our Privacy Shield certification reflects our fundamental commitment to protecting our customers and their data,” said Adam Wills, CEO of TurnKey Internet, Inc. He continued, “At TurnKey Internet, we strive to meet the highest levels of data privacy protection. We believe it is critical that we do everything we can to build trust and ensure privacy compliance for all of our global clients.”

The EU-U.S. Privacy Shield replaces the Safe Harbour Agreement after the European Court of Justice declared that it did not meet Europe’s data protection standards. This new framework protects the fundamental rights of anyone in the EU whose personal data is transferred to the United States as well as bringing legal clarity for businesses relying on transatlantic data transfers.

“Our clients from over 150 countries entrust us to securely receive and host their personal data,” says Wills. “This certification highlights our vision of providing the most secure and reliable Cloud Hosting solutions available today.”

For more information about TurnKey Internet or to speak with a Cloud Hosting Solutions expert, visit https://turnkeyinternet.net/

 

About Turnkey Internet

Founded in 1999, TurnKey Internet, Inc. is a full-service Cloud Hosting Solutions provider with Datacenters in New York and California specializing in Infrastructure as a Service (IaaS) to clients in more than 150 countries. Services offered in both East Coast and West Coast, USA – include Public Cloud, Private Cloud, Dedicated & Bare Metal Servers, Backup & Disaster Recovery, Online Storage, Web Hosting, Managed Hosting, Hybrid Solutions and Enterprise Colocation. Headquartered in New York’s Tech Valley Region, TurnKey Internet’s Flagship company owned Datacenter offers SSAE 16 Type II certification powered exclusively by on-site Solar and Hydroelectric sources to provide a 100% renewable energy footprint. In 2013, the facility was designated as the 39th ENERGY STAR® Certified Datacenter in the United States. For more information, please call (518) 618-0999 or visit www.turnkeyinternet.net/media.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on May 11th, 2017

Tagged with , , , ,