Are Costs and Security Fair Considerations in Cloud Computing?

Meet Clyde Ludd of XYZ Manufacturing based in the upper Midwest. Clyde manages technology operations at the plant, which is one of the few remaining facilities in the world where cassette tapes are built and distributed.
 
Unlike all other area manufacturers who have long outsourced their power needs to the large energy companies, XYZ Manufacturing runs a group of 24 generators wired in a custom-built grid that can tolerate up to four simultaneous generator failures. A large gas barrel is positioned at each corner of the generator array, with twice-daily refills trucked in from the local gas company.
 
“My business is simply too important to trust to some far-off electrical company that shares its infrastructure with thousands of other users,” Clyde says angrily when asked about his unique setup. “What can they do if their power fails? Nothing.  But I stay up and running.  If a generator goes out, I just run to the store and get another one.”
 
Ludd has the same philosophy about the newly-popular Cloud Computing concept, in which onsite servers are replaced with computing power in remote data centers. “That’s just dumb!” he laughs. “I’ve got everything I need on this thumb drive here in my desk,” he says, motioning at an empty drawer that he opens and shuts while speaking. Behind him, two dusty computers are running on a steel table. “I have a guy that comes in every week to apply patches and to ensure that everything is okay. I think it’s almost time to add another computer, but we can’t figure out how to get Windows Server 2012 to interoperate with the Windows 98 systems that I’m already running here.”

Continue reading...

Tuesday, April 14, 2015/Comments (0)/ Article rating: 5.0

PCI Compliance: It's Just Business



With constantly changing technology and increasingly sophisticated cyber threats, how can your company maintain PCI Data Security Standard (PCI DSS) compliance? The latest version of the standard, Version 3.0, may make it easier by helping your organization make payment security “business as usual.”

The key message behind the changes is that meeting the PCI requirements shouldn’t be a once a year kind of thing. Rather, security monitoring, corrective action and reviews should be integrated into everyday business processes. 

Here’s what you need to know to start making that happen...
 
Monday, January 19, 2015/Comments (0)/ Article rating: 5.0

Data Security in a Post-Target World

Asked why he robbed banks, Willie “The Actor” Sutton is reputed to have said “Because that’s where the money is.” The same logic may explain why hackers went after heavily protected customer data at Target: big challenge, big prize! In retrospect, Target’s logo now seems to have been the bull's-eye thieves went after looking for a monumental payday, but you don’t have to have tens of millions of customers’ credit cards and personal data to become the next ”target.” Here at Consolidated Communications we see lots of customers, both large and small, who face the same kind of risk. The asset can be company data, customer data, protected medical information, or third party information of all kinds. And the attack can occur via an in-house computer, the network, an unencrypted laptop, a phone or tablet, or even a customer device. We’ve seen attackers talk employees into giving out sensitive passwords and a penetration tester, who showed up dressed as a power company representative, was escorted into the computer room, and walked out with one of the company’s servers. Data security has never been more important than it is now, nor has it ever been harder to maintain. When your data storage is provided by Enventis, we work tirelessly to secure your data and prevent any telecommunication mishaps. 
Thursday, January 23, 2014/Comments (0)/ Article rating: 5.0