ISG Technology's parent company Twin Valley deploys gigabit speed

A new article published by Broadband Communities Magazine recently shed some light on the hard work of ISG Technology’s parent company, Twin Valley. This telecommunications provider is unique, not only because of its constant need for innovation in servicing the community, but also because it’s been a family-owned establishment since 1947 and has grown to service 6,000 clients over 2,400 square miles.

Although finding a good old-fashioned family business in today’s corporate world is newsworthy enough, this isn’t the focus of Masha Zager’s article. Rather, Zager took a look at the amazing gigabit service that Twin Valley is providing to more than 2,000 businesses and residential homes in Clay Center.

Twin Valley: Always one step ahead

Considering the family business had the foresight to invest in data center and cloud storage services in ISG Technology in 2011, it’s clear Twin Valley has always seen the value of keeping one eye on the horizon. After reviewing the needs of their many clients, Twin Valley administrators decided that a gigabit Internet service was a good direction to head in. This service, which Twin Valley has named Pulse Internet, would provide speeds that were unheard of in the region.

Twin Valley has always wanted to be a leader of technological innovation.Twin Valley has always wanted to be a leader of technological innovation.

Other companies may have had trouble setting up such a feat, but Twin Valley has consistently seen the value of looking ahead. The fiber infrastructure that the business had implemented in 2008 was future-proof, meaning it could leverage this toward its gigabit service.

Clients couldn’t be happier

Zager’s article also focused in on the client side of this equation. Many times, when a company implements a new and innovative service, clients need a little time to adjust. Clay Center residents obviously didn’t need this time, as those provided with Pulse seemed overjoyed by it.

However, there’s something to be said about providing these managed services to smaller, tight-knit communities. Providing technological services like Pulse allows smaller communities to show their worth in the marketplace.Lori Huber, director of the Clay County Economic Development Group, noted that Pulse Internet is a “game changer” in terms of its Internet speeds. She also remarked that such innovation was going to push “economic growth opportunities,” which is something a community of any size can get behind.

Even President Obama agrees with this statement. While visiting Cedar Falls, Iowa, to view the city’s fiber-fed gigabit infrastructure, Obama stated: “You don’t have to be the biggest community to do really big things; you just have to have some vision, and you have to work together.”

Twin Valley’s perceptiveness towards technological innovation in the area of gigabit Internet obviously shows vision, but Scott Leitzel, vice president of operations and a board member on the Economic Development Group for Clay Center, also wanted to stress the company’s commitment toward working with the community.

“We’re privileged to empower our clients to do whatever they want to do – whether that’s to connect all their devices or run businesses out of their homes – all at an affordable rate,” he said.




Join the ISG Technology Team




Hybrid IT: The basics

Massive innovations in technology are rapidly shifting the current business landscape. Products and services that were once seen as unnecessary luxuries are now quickly becoming vital to a company’s operation. The cloud can most definitely be counted within these services, especially in the world of IT.

We’ve previously discussed the wonders of the hybrid cloud and managed services and what they can bring to your business, but the cloud is so much more than infrastructure. IT resources can leverage a hybrid cloud set up in order to receive similar benefits in what industry experts are calling hybrid IT.

“By 2020, 78 % of businesses will have integrated cloud computing.”

Bringing the benefits of hybrid cloud to IT resources

The cloud is a huge part of modern business, and it’s not going anywhere anytime soon. Forbes contributor Louis Columbus stated that by 2020, 78 percent of businesses will have integrated cloud computing into their current business model. That’s a huge jump from the 37 percent that have adopted cloud managed services today, and this massive increase just goes to show the high demand cloud services have in the business world.

So, with this predicted success of the overall market in mind, the question still remains: What is hybrid IT?

To understand the answer to this question, the demands of IT organizations must first be fleshed out. These companies have set up their business model around the fact that their clients require IT resources such as the development and testing of mission-critical applications.

As the technology developed, cloud storage services began to be more economical and efficient than internal deployment on the part of the client. And so, cloud-based IT managed services was born.

However, there was a problem with this that needed to be fixed. Many IT organizations leveraged public cloud infrastructure in order to meet the needs of their clients. This works just fine for applications and data that are business-critical. That being said, problems began to arise when sensitive information needed to be hosted on the cloud.

As we discussed in our earlier article on public and private clouds, the public cloud has some security concerns. Due to the fact that you’re sharing a public cloud infrastructure with other clients, the data contained on these clouds simply isn’t as safe as those within an on-site, private cloud. On the flip side of this, private cloud infrastructures are very safe, but they’re also a lot more expensive to set up and implement.

Utilizing hybrid cloud managed services is the answer

So what do you do when you need the security of the private cloud but don’t want to pay for the entirety of your IT resources to be implemented on one? You have your cake and eat it too, of course.

Hybrid IT allows for security and cost effectiveness. Have your public cloud and secure your applications, too!

As managing vice president of Gartner Chris Howard said on the subject, “The cloud will simply become one of the ways that we ‘do’ computing, and workloads will move around in hybrid internal/external IT environments.” Basically, IT organizations are beginning to see that certain client applications simply can’t be hosted on the public cloud and have decided to implement a hybrid cloud solution.

The hybrid cloud combines the security of mission-critical IT applications in a private cloud infrastructure with the cost-effectiveness of a public cloud for data that isn’t business-critical. Hybrid IT is a revolutionary new concept and it’s sweeping enterprise IT right now, as providers like ISG Technology help IT organizations implement these solutions.

Next time, we’ll discuss the use cases of hybrid IT as well as its applications that span multiple industries and business models.

Improved Service Delivery with NetApp, Cisco, and VMW

Client Profile

Meritrust Credit Union was founded 75 years ago to offer Stearman Aircraft Company employees and their family members an option to participate in a financial cooperative. Today the organization provides personal and business banking services to thousands of members across Kansas. Headquartered in Wichita, Kansas, Meritrust has 14 branches and a staff of 220 employees, plus more than 4,000 shared branches nationwide.

 

The Challenge

Building more flexibility into its IT infrastructure

As a credit union, Meritrust offers its members benefits that include competitive interest rates on deposits, lower interest rates on loans, and a broad array of member services. To deliver superior banking services that meet consumer and business consumer needs and foster member loyalty, the organization depends on an advanced  IT infrastructure. Having experienced significant growth in recent years, Meritrust demands a highly flexible IT environment that offers superior performance to deliver its applications to internal and external clients, adapt to changing market demands, and expand its services to remain competitive.

 

“Meeting the changing needs of our client is paramount to maintaining the level of member service that Meritrust is known for and [to] succeeding in a volatile industry,” says Cliff Shoff, director of Information Technology at Meritrust Credit Union. “We’ve listened to what our members want and are investing resources in areas such as extending our online banking and mobile banking services and Web-based offerings overall.”

 

In addition to providing the infrastructure to support expanded services, the IT department is focused on driving new efficiencies through an aggressive virtualization strategy. To continue on its growth path and keep delivering exceptional services to its members, Meritrust decided it was time to update an aging IT infrastructure. The previous infrastructure featured 30 standalone servers and a complex server-attached storage environment that was cumbersome to manage and costly to expand when needed to accommodate growth. Additional challenges included inconsistent performance in the storage systems supporting its business-critical Oracle Database 10g environment.

 

“Overall, FlexPod allows us to focus our efforts on the user experience rather than worrying about the back end, now that we have validated, integrated technologies.”

Cliff Shoff Director of Information Technology, Meritrust Credit Union

Meritrust engaged ISG Technology, an IT solutions provider and participant in the NetApp Partner Program for Resellers, to assist with identifying a best-in-class solution that would meet all of the company’s IT and business objectives. To accommodate growth, support its virtualization initiative, and enhance storage performance, Meritrust selected FlexPod from NetApp and Cisco with VMware technology. “The FlexPod data center solution made perfect sense for Meritrust,” says Randall Aronis, account manager at ISG Technology. “The components work together seamlessly by design, which simplifies management and offers a highly scalable growth path for Meritrust.”

 

The Solution

Supporting 14 branches from a single, integrated solution Meritrust worked with ISG Technology to deploy a NetApp® FAS3240HA storage system in its primary data center. NetApp storage is a component of the company’s FlexPod data center solution, a predesigned configuration comprised of a Cisco® Unified Computing System™ (UCS™) B200 M2 Blade Server, Cisco UCS Manager 1.4(1j), Cisco Nexus® 5000 switches, and NetApp FAS storage. The integrated FlexPod solution, with the addition of VMware vSphere and vCenter™ technologies, supports the credit union’s 14 Kansas banking locations and its account, investment, insurance, and other services.
Meritrust delivers its Oracle Database 10g environment—which is core to business operations—on the FlexPod solution. The IT team leverages NetApp multiprotocol support, particularly NFS connectivity, to maintain tight integration with the Oracle environment. The NetApp Data ONTAP® 8.0 system operating in 7-Mode is at the core of the flexible unified architecture that addresses Meritrust’s multiprotocol needs in a common platform. Meritrust IT uses data management software including OnCommand™ System Manager, Operations Manager, Protection Manager, and Provisioning Manager to control, automate, and analyze the storage infrastructure.
The company optimizes performance of its storage using the NetApp Virtual Storage Tier with intelligent caching from NetApp Flash Cache, which prioritizes critical workloads for fast response. “Performance in our Oracle environment was a key driver in selecting the FlexPod solution,” says Shoff. “Whether supporting Meritrust employees or our businesses and consumer clients around Kansas, FlexPod and the NetApp Virtual Storage Tier deliver the superior 24/7 system performance we need.”
The FlexPod data center solution supports the company’s Microsoft Windows® 2003 and 2008 servers, Linux® servers, Microsoft Exchange Server 2010, and Microsoft Windows MultiPoint server, which provides the interface between its debit card processor and Oracle Database 10g. FlexPod also supports the organization’s Citrix XenApp on-demand application delivery system. The FlexPod solution delivers the company’s virtualized infrastructure, running simultaneous mission-critical virtualized workloads including Microsoft SharePoint® and Microsoft SQL Server®.

Business Benefits Reaching 80% Virtualization
The FlexPod data center solution is helping Meritrust reach its ultimate goal of a 100% virtualized data center. To date, the IT team has virtualized approximately 80% of the company’s application environments, with 70 virtual servers deployed so far. The team has already eliminated 27 physical servers, with more to come. Virtualization and consolidation are reducing the data center footprint while decreasing related costs. “Prior to deploying the FlexPod solution, we eliminated 4 of 10 storage racks by the time we reached 50% virtualization,” says Shoff. “With virtualization from FlexPod, we’ve eliminated another 5 racks, which reduces storage costs by 40% and our power and cooling costs by 25%.”

 

ISG Technology notes the importance of technology innovation to Meritrust. “Meritrust was an early adopter of the FlexPod data center solution,” says Aronis. “As a preconfigured, integrated virtualization solution, FlexPod enabled Meritrust to see immediate returns in storage efficiency and performance, as well as management simplicity. And with the inherent flexibility in the solution, Meritrust can better provide the robust services that every consumer and prospect is looking to the credit union to deliver. The FlexPod data center solution from NetApp and Cisco with VMware technology allows Meritrust to deliver the right data to the right person at the right time in the right way. That’s the ultimate in flexibility.”
Improved performance, enhanced user experience

The NetApp Virtual Storage Tier with Flash Cache on the company’s FAS3240HA storage systems offers significant performance improvements over the previous storage infrastructure, particularly in the Oracle Database environment. The IT team runs Oracle Database batch processes nightly, which used to take 16 hours to complete. After deploying the FlexPod data center solution, the processing window decreased to 12 hours. Once the team installed Flash Cache, Oracle Database batch processing time dropped to 9 hours, eliminating the impact on weekday operations.
Other performance improvements include application delivery in the Citrix XenApp environment. “We deliver applications as a service to users across our company using Citrix XenApp,” says Shoff. “With the performance gains offered by NetApp, Citrix XenApp login activities that used to take up to 45 seconds now take less than 20 seconds. When you take into account 220 credit union employees accessing applications all day long, those saved seconds translate pretty quickly into improved productivity, not to mention an enhanced user experience.”
A simplified, transformed data center

Within the IT department, moving from infrastructure silos to the preconfigured, unified infrastructure provided by the FlexPod solution has improved the IT management experience for staff members. In the former server-attached storage environment, the IT team managed the complex storage environment from as many as five consoles. Today the team centrally manages computing, networking, storage, and infrastructure software. In addition, the open design management framework integrates with Meritrust’s existing third-party infrastructure management solutions for investment protection and management ease.
The team depends on NetApp OnCommand management software to provision, monitor, manage, and optimize the storage environment. The staff leverages NetApp Data ONTAP 8.0 to configure storage to deliver maximum efficiency and performance while saving on administration time. Featuring 64-bit aggregates, Meritrust IT can store entire databases on a single aggregate while simplifying database management. “NetApp Data ONTAP 8.0 7-Mode makes it much easier for us to resize and move volumes within aggregates, which previously required extensive IT time and resulted in wasted storage space,” says Shoff.
The team achieves additional storage efficiencies using NetApp deduplication, which has reduced storage requirements by 40%. Whether performing deduplication or other storage management activities, the team is benefiting from a noticeably more streamlined approach to storage management with NetApp storage and the FlexPod data center solution. Data center efficiencies result in more budget and staff resources for innovative projects that help Meritrust compete in a complex industry.

 

“The FlexPod solution is much easier to manage, and infrastructure changes take far less time.”

Cliff Shoff Director of Information Technology, Meritrust Credit Union

 

“Scaling up is also a breeze compared with our former storage environment, where we had to power down the system and work through a lengthy deployment process. With FlexPod, we simply add a shelf, plug in a few cables, create an aggregate, load it with volumes, and we’re good to go.” Easy provisioning enables the IT team to more readily respond to the needs of the business units it serves.

 

Adds Shoff, “We can deploy servers in minutes versus hours and quickly allocate storage space whenever needed to accommodate growing pools of data and deliver new applications and services. Overall, FlexPod allows us to focus our efforts on the user experience rather than worrying about the back end, now that we have validated, integrated technologies from NetApp, VMware, and Cisco providing the foundation for our credit union operations.”

 

“The FlexPod data center solution from  NetApp and Cisco with VMware technology
allows Meritrust to deliver the right data to the right person at the right time in the right
way. That’s the ultimate in flexibility.” – Randall Aronis, Account Manager, ISG Technology, Inc.

3 tips for increased BYOD security

The benefits of allowing employees to bring their own devices to work are pretty clear. A study conducted by Pew Research Center earlier this year found that 64 percent of American adults own a smartphone, which means a vast majority of the workforce already has the hardware your company needs to conduct business. This means less of a financial burden on you company for hardware procurement, while also allowing employees to use the devices they know and love.

But there is a dark side to BYOD.

The reason many workplaces are hesitant to fall in line with the BYOD revolution is the security risks it typically entails. Allowing people to blend their home life and work life in a single device can be dangerous. However, by following basic security protocols, BYOD can be a viable option. 

To that end, we've compiled this list of three security tips to make sure your company benefits from all BYOD has to offer without falling victim to the security risks:

1. Have a well-defined list of do's and don'ts: Any company even remotely considering enacting a BYOD policy needs to sit down and have a long discussion about the definition of acceptable behavior on a personal device used for work purposes. Employees will be used to doing as they please on their own devices, which is perfectly fine when these devices don't have company data on them.

The problems begin to arise when employees forget the importance of the work information stored on their devices. If given the opportunity to work from their own devices, employees will invariably make some bad decisions in terms of data security. All it takes is a worker clicking one wrong link to put all of your company's data at risk. It's vital that employees recognize the importance of proper device usage, and it's why they should also be included in the creation of this list of rules. 

2. Mandate proper device security: This tip sounds like it should just be a part of the first, or even something that should be left to common sense. Sadly, quite a lot of Americans simply don't value the security of their devices. A study conducted by Consumer Reports last year found that around 34 percent of Americans take no security measures whatsoever to keep their phone safe.

This means that more than a third of your employees don't even use a password to protect their own data, a troubling statistic if you're attempting to implement a BYOD policy. When sitting down with employees to talk about the list of do's and don'ts, you'll need to have a separate discussion concerning safety practices such as setting up a complex password to gain access to the device. 

3. Prepare for the eventuality of lost device: Notice that this tip doesn't say "Prepare for the possibility of a lost device." This is because if you intend to cash in on all of the benefits of a BYOD policy, you're going to have to accept the risk that one of your employees will eventually lose a device with work information on it. The same Consumer Reports study found that in 2013 alone, 4.5 million devices were either lost or stolen.

But don't let this statistic get you down about the advantages of BYOD. Your company can absolutely benefit from not having to constantly upgrade hardware, as long as you take the necessary precautions. This is why anyone wishing to implement a BYOD policy should contact the experts at ISG Technology. Not only can they help you set up your list of do's and don'ts, they can also help protect your company data through device encryption, taking the headache out of employees losing hardware or not taking the proper precautions. 

Top 3 strategies to strengthen cybersecurity

Cybersecurity is a hot-button issue within the technology industry lately – and it should be a crucial topic of conversation in every sector. With the rising number of data breaches and the continual increase in costs incurred when a breach does occur, it's becoming ever more important to make sure systems are protected and that measures are taken to bolster data security.

The federal government is making strides to step up its cybersecurity game of late. In fact, according to Greg Otto of FedScoop, the federal government has increased spending on cybersecurity strategies by over 500 percent over a three-year period. From 2011 to 2014, federal cybersecurity spending rose from $6 billion to $31 billion. This marked increase is a definitive indication that the feds are taking cybersecurity more seriously than ever – an outlook that every industry could benefit from.

Businesses should follow the government's lead when it comes to cybersecurity. Here are a few tips on how to best protect your systems from physical and network-based harm:

1. Invest in malware removal services

Managed services experts can help your company stay on top of malware that may infiltrate your systems. By closely monitoring systems and making sure they are free of any viruses or malicious programs, managed security professionals can pinpoint exactly where the vulnerabilities are in your computing network and help you expunge any potential threats. Careful management of employee workstations can make a difference when trying to protect against hackers.

"Virtual networking can provide an enhanced level of security for computer systems."

2. Virtualization

There are multiple kinds of virtualization solutions, and they all have characteristics that go a long way toward helping companies remain secure. At the September 2015 VMworld conference in San Francisco, VMware announced that virtual networking can provide an enhanced level of security for computer systems. It does this by providing a base for defining application security requirements, according to Computerworld. With this kind of virtualization, IT managers have more control over traffic flow along the network and facilitate the movement of virtualized servers, which in turn enhances dynamic protection, according to SecurityWeek contributor Danelle Au.

3. Physical security

You can have the most secure network in the world, but if you leave your computer systems open to attack from the inside or don't physically protect your workspace, people could potentially gain access to information that you don't want to be out there in the wrong hands. Investing in stronger physical security can give your company a head start when it comes to comprehensive data protection. TechTarget noted that physical security can get pushed to the side "in favor of more technical and dramatic issues" like hacking and malware – but you don't want to overlook this crucial aspect of system protection.

How secure are your computer systems?How secure are your computer systems?

No matter which security solution you choose – or all three! – it helps to partner with experts who know how to navigate the ever-changing cybersecurity landscape. Contact ISG Technology today to see how we can pair you up with the right protection solution for your company's systems.

Top 2 ways desktop virtualization can impact your company

Computing infrastructure seems to become more complicated with each new innovation or machine to connect to the network. With each advance in technology comes more challenges, often resulting in IT complexity, which can be bad news for small businesses and enterprises alike. One way to reduce this kind of complexity is by employing a desktop virtualization solution.

Desktop virtualization employs the same concept as server virtualization, except with individual computers on a network instead of servers. Administrators create virtual machines that make it possible to deploy operating systems, programs and software present on computers in the network.

Let's take a look at the top two ways desktop virtualization can positively impact organizations looking to streamline their computing infrastructure:

"By creating a handful of VMs or VM templates across a company's network, IT staff can more easily manage individual computers."

1. Enhanced security
Businesses can more easily protect endpoints and enhance network security when utilizing virtual infrastructure. TechTarget contributor Yuval Shavit noted that desktop virtualization strengthens cybersecurity efforts by allowing IT managers to have an eye on each machine on the network. In this way, they can keep track of what's happening on these computers and be alerted if something goes awry, such as malware infiltration.

"Because the VM is abstracted and separate from the computer's hardware and other VMs, security is one of the major benefits of desktop virtualization," Shavit wrote.

By creating a handful of VMs or VM templates across a company's network, IT staff can more easily manage individual computers. This strengthens endpoint security.

2. Immediately deploy updates across computing fleet
One of the biggest ways virtualization is useful is in the way companies can install updates across all of the computers on a certain network. With VDI, security patches and general software upgrades are simple to implement.

For instance, when the U.S. Air Force switched to a virtualized desktop infrastructure, updating software was easily accomplished. Gregory Garcia, the director of the U.S. Army Information Technology Agency, told Federal Times that the virtualization solution utilized by his organization allowed managers to easily deploy desktop applications across a fleet of 20,000 to 30,000 computers at once.

"[W]hen I was in the Air Force, we were able to go from 27 days to patch to three days by doing it on the network," Garcia said. "What you can do with [virtual desktop infrastructure] is to go to minutes and seconds. And that's a huge benefit in terms of labor and cybersecurity."

In addition, Garcia noted, technology refreshes were made easier by this technology. Instead of having to go to individual machines on a network and install new tech, IT managers had the capability at their fingertips to accomplish this with the touch of a button.

Implementing a virtual desktop solution can help boost security and streamline IT processes.Implementing a virtual desktop solution can help boost security and streamline IT processes.

Is VDI the right solution for you?
Partnering with a managed services provider that has experience with desktop virtualization can save your company both time and money in the long run. MSPs can determine your particular technology needs and then pair you with a virtualization solution that will improve your IT dexterity and cut down on costly complexities. Contact ISG Technology today.

Basic tips to avoid cybercrime

 

With people using the Internet for banking, shopping, socializing and everything in between, the risk of falling victim to a cybercrime scheme has never been more real. In fact, a CNNMoney report found that 110 million American adults were hacked in 2014 alone. Considering this number is 47 percent of the U.S. adult population, it’s obvious that online security is just as much of a concern for people as physical security.

And while these numbers are frightening in their own right, an even scarier thought is how drastically unprepared some businesses are for cyberattacks. A McAfee report found that about 90 percent of small-to-medium-sized businesses don’t use data protection of any kind for themselves or their clients.

Statistics like this make dealing with smaller businesses seem risky, and as such every small business should make cybersecurity a top priority. To this end, this list of very basic online practices has been compiled in order to make navigating the Internet safer.

Don’t click on something unless you are 100 percent sure what it is: This may seem very basic, however, many people don’t fully understand how risky it is to click a link they aren’t absolutely sure about. Frank Heidt, CEO of Leviathan Security Group, gave a TED talk about this very topic. In the speech, he stated that the easiest way to hack someone in a particular company is through their loved ones.

A CEO’s computer will have very specific security protocols, but his child’s computer probably won’t. All a hacker has to do is gain access to the child’s computer and then send the CEO a message using the child’s email address. This email, which will look identical to any other sent by the child, will contain a piece of malware in the form of a seemingly harmless clickable link. Once clicked, this virus will run through the CEO’s computer and will eventually require malware removal across the entire company’s network. The takeaway from this is that no part of your online experience is 100 percent safe, and any and all links should remain suspect.

Update your software: With the fast-paced nature of modern technologies, keeping software up-to-date can be extremely hard for some smaller companies. And even though your business might be getting along just fine with Windows XP, for example, you’re actually putting yourself in danger.

On April 8, 2014, Windows announced that it would no longer be putting out updates for Windows XP. This means that any security holes in the software that need patching will not be fixed, and that hackers will be free to exploit them. Having up-to-date software not only gives clients a better experience with the company, but it also makes sure their data is better protected.

Keep passwords complex: Although most people know to keep passwords hard to crack, few know how truly important it is to keep passwords complex. A Bloomberg study about password complexity showed how making a few tiny changes could drastically change a hacker’s ability to access your computer. The article stated that a six-word, all lowercase password takes a hacker’s computer about 10 minutes to crack on average. However, if you were to add an uppercase letter and a number/symbol to that password, the time to crack it jumps to 463 years.

Contact a company that deals in cybersecurity: If you had to pick only one of these tips to follow, this one would definitely be the one to choose. Companies like ISG Technology stay current with their cybersecurity knowledge, and can help with everything from malware removal to safe data storage. They can also help assess the security of your company’s network, ensuring that both company and client information stay out of the hands of hackers.

What to know about letting employees bring devices from home

The bring-your-own-device movement has been getting serious traction lately, as the amount of technology owned by employees continues to go up. Whether it be their personal phone, tablet or even laptop, people really seem to like the idea of having their own tech at work. And this recent BYOD trend doesn't seem to be slowing down. In fact, research firm Gartner said approximately 70 percent of mobile workers will be using their own smart devices rather than those given to them by their company by 2018. With those kinds of numbers, it's no wonder that many companies are gearing up for the BYOD revolution. 

BYOD: The risks and rewards
Just like every trend, there are positives and negatives to letting employees bring their own electronics to work. The simplest and perhaps the most obvious of the positives is that people like their own devices. Employees don't just grab the first phone or computer that catches their eye. They take enormous amounts of time and energy to figure out what device is right for them. There is a multitude of things a device can offer someone, and allowing employees to tailor their work devices to their own wants and needs is certainly a benefit to both productivity and employee morale

Another positive point to consider with BYOD is the fact that employees upgrade their own devices at a much more rapid pace than their employers. According to eMarketer, about 54 percent of smartphone users plan to buy a new device within the next 12 months. Any company attempting to keep their own hardware this current would most certainly run itself into the ground. It's best to let employees worry about having the most current device.

Despite the many positives to BYOD, there are also some risks every company should consider. The biggest problem a company implementing a BYOD plan is likely to run into is the fact that it is extremely hard to tell employees what they can and can't do with their own devices. People get used to surfing the Web on their personal laptops, and while this is fine if the device is strictly for personal use, it becomes a problem when the device is brought into the office. It's very easy to tell an employee what they can and can't do with company-owned property, but it becomes a little harder when the employees own those devices. Any company considering BYOD should express these concerns with employees if they wish to keep productivity at peak levels. 

Aside from productivity, there is also a sizeable security risk from employees using BYOD hardware like they would at home. Something as simple as an employee downloading apps on their phone allows third-party access to company data. This is due to the relative simplicity of developing mobile viruses and can lead to the necessity of malware removal. Again, companies considering letting employees bring their own devices into work need to instruct these people in the correct use of devices. 

But companies shouldn't let the risks scare them away. With help from BYOD experts like ISG Technology, allowing employees to bring their own equipment can have a multitude of benefits without any downsides. 

Data lost is money lost

When people think of Google, they tend to imagine the search engine giant as an indestructible force in the technical world. It would seem that Google is such a big player that it can handle any and all obstacles thrown in its way. Google's recent foray into literally any part of the technology industry it sees fit to invest in shows the scale at which the company operates. And while Google's data is probably more secure than the average company from hacking attempts, one force it simply can't match is that of Mother Nature.

Nature's power over man was proven recently when one of Google's Belgian data centers was struck by lightening four times. Although a vast majority of data survived (well over 99 percent, in fact) the point still remains that there are some problems that even the biggest of companies simply can't avoid. If Google's data storage is at risk, how can any other company even hope to protect itself from every single threat imaginable?

The real cost of data loss: Downtime
As any company that has lost data can attest, one of the most frustrating parts about losing data is the amount of time and money it takes to get the company up and running again. In order to find out just how much money data loss and downtime costs companies, EMC Corporation spoke to 3,300 IT professions from 24 countries in 2014. A SecurityWeek article about the study reported that organizations of more than 250 people lost some $1.7 trillion due to downtime and data loss in 2014 alone.

That's quite a lot of money to be lost and only speaks to the sheer, unimaginable magnitude of the problem that is data loss. To compound this, the massive amount of lost revenue felt by companies due to this problem is only made worse considering the study's finding that 64 percent of surveyed enterprises ran into downtime or data loss in the past year.

This kind of data should be a rude awakening to companies that think they are above the threat of data loss. No one is completely safe from data loss, and the only way a company can truly protects itself is to back up its data as much as possible. A robust online backup service, such as what is offered by ISG Technology, is peace of mind in a world where industry heavy-hitters like Google can lose data in a freak accident.  

There's more to data center security than you think

When it comes to computers and technology, there is one thing at the forefront of everyone's minds these days: security. This idea is especially critical when talking about data centers, as digital, physical and structural security are all critical to operations.

There are a variety of different security concerns when it comes to data centers, from compliance requirements to building security to protections against the weather. Businesses need to make themselves aware of the security precautions taken by their data center service provider and carefully consider three areas of security before choosing a facility.

"Businesses need to carefully consider three areas of security when choosing a data center."

Physical
Most people think digital security is the only concern when it comes to data centers, but if the power supply cuts out or a tornado tears the facility down, that can be even more debilitating than a data breach. Consider these physical aspects when choosing a data center:

  • A secure location: The site needs to be located a good distance away from company headquarters and out of the path of natural disasters like earthquakes, tornadoes and hurricanes.
  • Redundant utilities: A secure facility will employ two separate sources for critical utilities, being able to trace electricity back to two unique substations.
  • Controlled building access: Make sure the data center has security guards in place and a limited number of entry points into the building, as well as security cameras and gates to keep out unwanted visitors.
There are many different security concerns that must be addressed when choosing a <a  data-cke-saved-href=There are many different security concerns that must be addressed when choosing a data center.

Digital
While the physical considerations of a computing facility are very important to the overall security of the building, digital security precautions must also be taken in order to protect the files stored within.

  • Implement two factor authentication: Biometric identification is increasingly being used in data centers as a second layer of security to ensure only the appropriate people are handling certain information.
  • Encrypt data in motion: Encryption is a necessity when working within distributed computing environments where application workloads communicate across both private and public networks.
  • Meets multiple regulatory compliance requirements: Make sure any data center being utilized meets the necessary guidelines to be compliant with industry regulations for the sector you're operating in.

Structural
Separate from physical and digital security measures, steps must be taken to build security into a data center's infrastructure to create a robust protection strategy and atmosphere of defense.

  • Anticipate changes to workloads: Enterprise applications are not static entities, but are instead workloads that move from one location to another and must be monitored as they go. Utilizing adaptive security measures allows workloads to move freely while enabling IT administrators to focus on other business-critical operations.
  • Future-proof application development: Make sure security solutions are deployed that can stay consistent across private and public cloud platforms so the same level of protection will be maintained no matter where the apps run.
  • Audit application interactions: Periodically take stock of the traffic flowing between the individual workloads that make up each application. This will provide enterprises with a comprehensive view of the interactions taking place, as well as any connection requests from outside entities that may be popping up.