Posts

The 4 best cloud backup solutions for small businesses

There are several reasons to consider a cloud backup for data protection for an SMB. These include everything from ease-of-use to cost-effectiveness. But perhaps the most compelling reason simply this—it’s wise to be ready for whatever the future holds.

That’s what data backup is. Preparation for the unexpected.

You can’t guarantee the security of your company’s data if you aren’t ready for natural disasters, cyberattacks and even simple human error. Any number of things could compromise your company’s data, which is why it’s so critical the regularly back up everything.

Cloud computing offers an easy, efficient, secure option for backing up your data, thereby reducing or even eliminating downtime.

But what backup service is the right one for your business? We took a look at some of the most popular and weighed their potential benefits for your SMB.

Veeam

Veeam is a service that focuses heavily on data availability. While it can function as a no-frills backup from day one, it comes with so much more. Many companies, even SMBs, choose to take advantage of Veeam’s five-step process, moving their business toward Intelligent Data Management.

What is Intelligent Data Management? Not only is your data instantly available all the time, split up across multiple clouds so that it resides where it’s both accessible and safe. Veeam’s advanced backup option will also utilize automation to ensure your data is optimized for use and recovery at a moments’ notice.

That’s convenience that pays off.

From small businesses to universities to the Fortune 500, more and more businesses are trusting their data with Veeam. There are a few different tiers of data protection plans available. Find the license that works for you and scale upwards if/when you need to.

Additionally, Veeam is continually updating and adding functionality to its service. You’ll always have the cutting edge of data security.

Carbonite Online

Carbonite Online employs a wide-net approach to data security. Rather than defaulting to backing up a computer in its entirety, Carbonite backs up what it decides is most critical and relies on the user to further fine tune the process.

It’s a process that works well if you’re using a lot of standard folder designations such as My Documents. In fact, in that case it’s a real time-saver. But if you working out of a more customized setup, you may find it frustrating.

Carbonite uses Continuous Data Protection (CDP) to handle backing up rapidly changing data files more or less constantly. If a file changes within a designated folder, it’s backed up quickly. This is very convenient for users who can’t afford to rebuild a recently-lost file, but need their most recently worked on version recovered as quickly as possible.

Pricing isn’t exactly cheap, but arguably worth it if it’s a good fit.

SOS Online Backup

Is security one of your biggest concerns? SOS bills itself as a backup solution that’s all about security. (Though, in fairness to the other solutions listed here, security is big for everyone.) SOS’s security features range from password protection to privately managed keys and multi-layered 256-bit encryption.

SOS will simultaneously backup to a local hard drive or other computer over your local network for quick retrieval. Like Carbonite, SOS backs up what it considers to be the most important data. You’ll need to customize these settings if they don’t work for you.

The pricing is good—that is if you’re not transmitting massive amounts of data. Yearly subscriptions save you some money over monthly options.

iDrive

While certainly not the least expensive choice, iDrive is still reasonably affordable and comes with enough options to warrant a spot in our top-four roundup.

Among its most well-liked features is the availability of client software for nearly every type of PC and device. In addition, extra storage enables syncing all PCs as well as mobile devices. As with most of these services, iDrive utilizes CDP options to keep your backup files as current as possible.

iDrive includes several choices for single user plans which will cover an unlimited number of computers and devices. The business user plans also allow for an unlimited number of users, although storage is limited by pay-tier.

Know what you need

When considering your choices for a data backup service, you’ll want to keep a few things in mind. Examine your needs and compare them to what the various services offer, and at what costs. Among things to look at, include:

  • Operating system and device support
  • Privacy and Security
  • Storage capacity
  • Speed
  • Features
  • Reliability
  • User-friendliness

Once you’ve mapped out your needs and budget, compare them to this list and see which service lines up the best for you.

 

How to include your MSP in your backup and disaster recovery plan

An incomplete or poorly prepared backup and disaster recovery (BDR) plan can result in unacceptably long outages and lost revenue for your company.

Unfortunately, busy IT employees don’t always have the time to update BDR plans or test them thoroughly. Partnering with your managed IT services provider (MSP) to improve, refine and test your plan offers a simple way to ensure the effectiveness of this valuable resource.

Here are some of the ways your MSP can help you make sure your backup and disaster recovery plan is everything it should be.

Identifying stakeholders

The infrastructure staff and senior managers aren’t the only stakeholders crucial to the success of your BDR plan.

Your MSP can help you identify others in the company who should be involved, such as database managers and application testers. These employees can offer valuable insights and help you identify resources you’ll need to restore your systems.

Setting milestones

It’s not unusual to overlook a crucial milestone or two when developing your BDR plan timeline. Like most IT projects, BDR plans involve multiple stakeholders each tasked with carrying out a small piece of the plan.

MSP staff will help you evaluate the entire plan to ensure that important milestones are noted, including those related to network connectivity, resources, infrastructure, storage, proof of concept, storage replication, recovery point objectives, testing and backup data.

Anticipating disaster scenarios and determining responsibilities

Fires, floods and cyber threats may be the first things that come to mind when you think about disasters, but as British Airways found out in May 2017, even seemingly small problems can lead to major issues. A power surge and outage led to the cancellation of 75,000 flights and forced the airline to pay $68 million in passenger compensation.

Although a power outage should have been a minor blip, the surge also destroyed the airline’s backup system, complicating restoration. The story illustrates the importance of developing a secondary backup plan in your BDR plan.

In addition to assisting you in creating a backup plan, your managed IT services provider will also help you ensure that your employees understand their roles should a disaster occur.

The MSP team can assist you in breaking down specific tasks in the BDR plan, determining which staff members will be responsible for each detail, and creating a communication plan in the event that your team can’t communicate through its usual channels.

Providing documentation

Lack of documentation can doom your BDR plan, yet it’s a common factor in incomplete plans. When Disaster Recovery Journal surveyed 1,000 firms, the publication discovered that 31.5 percent had incomplete BDR plans.

If your key stakeholders haven’t had the time to document crucial processes and instructions, that knowledge will be lost if they ever leave the company. MSP staff will work with your internal staff to develop the documentation needed to fully restore your systems after a disaster or outage.

Additional IT support

In the process of creating a backup and disaster recovery plan, it sometimes happens that you’ll discover other areas where your IT support may be lacking. If you wish, your MSP can jump in and provide either one-time consultation or ongoing IT support to ensure you’re completely taken care of.

Your backup and disaster recovery

Sooner or later, every company experiences some sort of disaster.

Whether a cyberterrorist hacks your website, an employee makes a big mistake, or a hurricane destroys your data center, a comprehensive backup and disaster recovery plan is the key to resolving disruptions quickly.

Partnering with your MSP will help you ensure that your plan will actually work when it’s needed.

5 ways Veeam backup boosts your overall cybersecurity

Cybersecurity is a big topic in every industry due to the increase in threats and the escalating costs of recovering from a breach. If you can protect every device on your network, you’re lucky.

However, an even smarter strategy is to focus on following best practices for protecting your data, regardless of where it resides.

Veeam backup in the cloud provides an exceptionally strong backup and restoration capability.

Backup is critical for cybersecurity

Threat prevention is a valuable part of a cybersecurity strategy. On the other hand, in today’s security environment, many threats come from places that are difficult to control.

For example, research shows that 90-95 percent of cyberattacks start with a phishing email. Educating employees on the threats that may appear in their email inbox is a good first step, but hackers are very clever and many employees can be fooled.

In addition, all organizations are vulnerable, including schools and educational organizations. For example, the Department of Education issued a warning letter to schools based on several successful attempts to extort money from school districts. The personal information schools store in their records make them a prime target.

Surviving a cyberattack by using strong backup and recovery procedures becomes even more important as hackers get better at what they do.

How Veeam backup makes a difference

The Veeam software is unique in that the company developed it in the era of the cloud. This allowed the company to create a backup process that easily outperforms legacy backup software.

In fact, the International Data Corporation (IDC) market share numbers for 2017 show that Veeam leads the industry in terms of market share growth.

Here are 5 ways that Veeam backups boost your cybersecurity.

Lightning fast recovery

Provides hyper availability.

Data loss avoidance

Streamlines disaster recovery.

Verified recoverability

Guaranteed recovery of every file, application and virtual server

Leveraged data

Includes safe deployment with production-style testing

Complete transparency

Ongoing monitoring that provides alerts before operational impact

The ISG Technology and Veeam partnership

ISG Technology established Platinum status agreements for both the Veeam Cloud and Service Provider Program and the Veeam Reseller Program. According to ISG Chief Operating Officer, Jon Bierman “The partnership goes beyond strengthening our technical team. Our sales and customer-facing teams will also be better equipped to serve our customers as we increase our alignment with Veeam.”

The partnerships allow ISG Technology to provide managed cloud backup services that take full advantage of the Veeam backup technology. For many organizations, online backup services are a cost-effective insurance policy.

With the Veeam technology, we can effectively provide backup as a service both on and offsite.

Final Thoughts

In today’s environment, organizations face several data challenges:

  • They need to gather information and offer user-friendly tools to use it
  • They need to ensure that the data is always available for internal and external users
  • They need to protect the data from cyberattacks
  • They need to ensure quick restoration of data when any type of disruption occurs

Veeam backup meets the need for keeping data available and restoring it quickly and accurately.

In addition, organizations that take advantage of Veeam technology through a managed service provider can have the same high level of capability without the capital outlay required to develop cloud backup capabilities.

The essential components for complete ransomware protection

For criminals, ransomware is big business.

The methodology is simple: attackers target a company with malware which encrypts their data, then send a request for money, usually in the form of Bitcoin or another difficult-to-trace cryptocurrency. Should the company refuse to pay up, their data will remain encrypted and inaccessible. Or it might even be shared publicly on the internet.

Given the potential damage both financial and reputational that might result, it’s no wonder that many companies choose to pay the ransom.

Kaspersky Lab noted a thirteen-fold increase in ransomware attacks in the first quarter of 2017 compared to the previous year. With the average cost of a ransomware attack sitting at over $1,000, the danger is a significant one . . . and no company is safe.

Victims range from small businesses to huge organizations, such as the UK’s National Health Service and aeronautical engineering firm Boeing. Whatever the size of your company, protecting data against ransomware is every bit as essential as physically protecting your premises from burglars.

Here are four things you can do to ensure that you are effectively protected against ransomware.

Backup everything, often

A robust backup plan can make all the difference to a company hit by a ransomware attack.

Rolling back to a previous version may make it possible to avoid paying the ransom and resume normal operations. But beware. Ransomware is becoming increasingly sophisticated. Many new viruses are designed to seek out backups and encrypt those as well.

To avoid this worst-case scenario ensure that you employ a backup solution with versioning or one that is physically disconnected from your system, like a cloud backup solution.

Train your staff

Every staff member in your organization is a potential entry point for malware. Many attacks still succeed largely due to human error.

Indeed the “WannaCry” attack which struck Boeing was transmitted by means of a zipped file attached to an email. In order for the malware to take effect, an employee within the organization had to unzip and run the file.

Train your employees to identify fake emails and encourage a culture of double-checking the origin of any suspicious attachments. Also, establish robust procedures for employees to follow when they think they might have exposed a device to malware. A swift response can isolate the machine in question and potentially save thousands of dollars in damages.

Stay up to date

There are many reasons to keep the operating systems, browsers and plugins up to date. Ransomware prevention is just one of them.

Many ransomware attackers gain entry to a system via weaknesses inherent in out-of-date plugins and other tech. By recommending (or, better yet, enforcing) updates, you can stay ahead of the criminals and keep your sensitive data secure.

Employ ransomware protection

Last, but by no means least, you should ensure that every machine (even personal devices used for work purposes) in your organization is running malware protection software from a reputable provider. While no program can prevent every single attack, most will be able to guard against a whole raft of common exploits.

If the worst does happen . . .

If you are subject to a ransomware attack and cannot recover your data from backup, your options are limited.

Paying the ransom might seem like the most sensible course of action, but there have been numerous cases in which doing so didn’t yield a decryption key. If that happens, you’ve only added an extra cost to an already-expensive situation.

An expert might be able to help you mitigate the damage, but it is vastly preferable to avoid attacks in the first place. The time to act is now—protect your data and ensure that your company doesn’t end up on the long list of ransomware victims.

The biggest cybersecurity breaches of 2017 and what we can learn from them

If we’ve learned anything from the biggest cybersecurity breaches of 2017, it’s this: no one is immune from online threats. Not even the largest companies with millions in technology resources, serious cybersecurity measures and strong reputations as household names.

2017 came and went with multiple significant cybersecurity breaches involving major organizations. And the bad news doesn’t stop there. Cybercriminals aren’t going anywhere. Cybersecurity breaches are still very much a thing.

The average cost of a data breach in 2020 will exceed $150 million by 2020, as more business infrastructure gets connected. – Juniper Research

Here are three of the biggest cybersecurity breaches of 2017, what happened, and what we can learn from them.

Equifax

One of the worst breaches of all time happened in 2017 with Equifax. Equifax, as you almost certainly know, is one of the three largest credit agencies in the United States. Their data, the data that was compromised, is extremely sensitive.

Stolen information included names of customers, their dates of birth, credit card numbers, addresses, driver’s license numbers, and social security numbers. That’s pretty much everything a cybercriminal needs to engage in identity theft.

Verizon

In July of 2017, Verizon had a major cybersecurity breach that affected over 14 million subscribers.

A third-party analytics provider, NICE Systems, was using Amazon’s S3 cloud platform to store “customer call data” from telecom providers including Verizon. Forbes

While this breach was claimed to have been brief, the 14 million affected had their data exposed, including their names, addresses, phone numbers, and most importantly, their plain text PINs. Again, this is prime information for identity theft.

This happened because some of Verizon’s security measures simply weren’t set up the right way.

Instead of a private security setting, the information was made public. Anyone with the public link could see the Verizon data, which was stored on an Amazon S3 storage server—a commonly used cloud storage for data.

Uber

While Uber’s security breach wasn’t at the same level as the Equifax or Verizon cybersecurity breaches, it was still embarrassing and alarming. In this case, the worst of it was how Uber managed things in the aftermath of the cybersecurity breach.

Uber paid a 20-year-old hacker $100,000 to keep quiet after he managed to get his hands on the personal data of 57 million users.

Instead of being transparent about the leak, Uber tried to conceal it. Not only is that illegal in California, where the home company is based, but it further erodes customer confidence. Any company that falls prey to a cybersecurity breach will take a hit to their reputation. But if you continue to mishandle things, your reputation can suffer even more.

Just ask the folks at Uber.

What we have learned

One of the major takeaways here is that while the cyberattacks have grown sophisticated and complex, there’s a lot companies of all sizes can do to be proactive. The threat is valid, but if you address potential vulnerabilities in a timely manner, you’ll be able to avoid making these kinds of headlines.

For instance, the Equifax attack was due to a flaw in a web application, Apache Struts. The tool is used to build web applications. And here’s the kicker. The problem that led to the breach was identified months earlier, but all of the Equifax machines were not updated. This allowed hackers the ability to enter.

The Uber fiasco illustrates another compelling point. If you do suffer a cyberattack, there are good ways to handle the situation and bad ways to handle it. Restoring customer trust is critical, so it’s best to be transparent and take full responsibility.

Protecting your company from a cybersecurity breach

Your company’s critical data must be protected not only for your customers and their peace of mind but for the sake of your data, as well. You need to stay ahead of ever-changing threats. Cybercriminals are constantly changing their tactics. You have to constantly adjust your protection just to keep pace.

Know where your data is stored, how it’s protected, how often that protection is updated, and utilize data analytics to strategically update your protection as needed.

Cybersecurity breaches are on the rise. Companies must take proactive steps in order to keep their data secure.

 

The CIO’s guide to lowering IT costs and boosting performance

There’s one question that haunts every single business leader, regardless of industry, business size, mission statement or product. How do you lower costs without sacrificing performance?  If you can answer that question effectively, you’re set up for ROI and stability. If you can’t, you won’t be a business leader for long.

To complicate matters, the answer will vary for different departments within your organization. The strategies that lower IT costs may or may not work when you turn to HR or accounting. Some techniques are universal, and some are functionality-specific.

In this whitepaper, we’re going to focus on trimming your company’s IT costs.

But before we dive in, there are no magic bullets here. The suggestions outlined below aren’t even particularly innovative or unique. Instead, they’re solid. When combined, you’re sure to see a difference in your technology budgeting.

If you’re serious about reducing your IT costs, this is how you can do it.

Learn to be proactive

We begin with an underlying philosophical approach. Stop waiting for network problems to pop up before you address them. Get out in front of potential technical issues by becoming a proactive organization.

The primary advantage of getting proactive is a reduction in downtime. Few things will drive IT costs up like downtime. The hourly cost of downtime varies, of course, with estimates soaring as high as $100,000 per hour in some cases.

There are two things you can do to stop downtime before it starts.

Man and woman looking at monitor

Infrastructure monitoring and alerting

The only way to know if your IT network is healthy is to monitor it. If there are warning signs, alerts should trigger appropriate preventative action. If you’re unfamiliar with monitoring and alerting, Network World has a great introductory article on the subject.

Patching and updating

Software patches are critical for network health. They include everything from security updates to bug fixes. They’re easy to overlook, though, because they rarely feel urgent and they seem so frequent. We strongly encourage you to make them a priority if you’re interested in lowering potential IT costs.

Tackle IT projects strategically

No organizational project should ever begin without clear objectives. That’s particularly true for IT projects where timelines, budgets and organizational impact can easily get out of hand—if you don’t have a solid game plan.

We recommend a balanced approach. Yes, upfront IT costs are a consideration. However, you should also think about productivity, integration, efficiency, reporting, training and employee satisfaction before you undertake a new IT project.

For example, there are compelling reasons to move from a PBX phone system to a hosted voice solution, but there’s more to the decision than the math. Also consider how your staff, customers and processes will be affected by such a foundational change.

Utilize outsourced support

While many CIOs are hesitant to embrace outsourced IT support, there’s a strong case to be made for the change. Not only that, but you don’t have to approach the decision focused exclusively on an absolute solution.

Why not have both in-house and outsourced IT support? Just make sure you use the two support sources differently in ways that make strategic sense. Some tasks, due to security, compliance or other business needs, are better kept in-house. And some tasks can be effectively managed by an outsourced firm at a fraction of the cost.

Additionally, keep in mind that even a world-class outsourced IT support provider will need your organization to play an active role. Take the time to find the best way to work with your IT support provider and don’t forget to bring your employees into the loop.

Take cybersecurity seriously

It’s difficult to overstate the importance of cybersecurity. In the last year alone, the headlines have been littered with horror stories of data breach. It only takes one cybersecurity lapse to compromise your company’s data and devastate your reputation.

Just one.

Cybersecurity key on keyboard

While it’s possible to handle network security on your own, we highly recommend partnering with a managed IT services provider for the best possible protection. Cybersecurity is a complex, multi-layered issue. This is one area where it’s simply pragmatic to trust an expert.

The moderate IT cost of cybersecurity protection from an MSP far outweighs the negative impact of a successful cyberattack.

Get your employees up to speed

We’ve touched on this idea a couple of times already, but it deserves its own section. If you’re not convinced, consider this. 100% of government IT workers surveyed report that they believe employees to be the single greatest threat to cybersecurity.

You read that right. 100%.

That doesn’t mean most employees mean to pose a risk. In many cases, employees simply don’t know the best practices necessary to maintain network security. The same goes for every other factor that can drive up IT costs, from downtime to productivity.

Employees need to know how to protect data, utilize available IT tools, and interact productively with IT support to lower IT costs.

Prepare a worst-case-scenario plan

Finally, few things will unexpectedly add to your IT costs like a disaster. Disasters include things like floods, hurricanes, tornadoes and fires, as well as smaller downtime-causing incidents like power outages and equipment failure.

In other words, a “disaster” is anything that takes your IT network offline.

How you react in the face of a disaster, regardless of scale, will either set you apart from the competition or bury you beneath them. The deciding factor is typically your level of preparation. Smart CIOs make sure their companies have a complete backup and disaster recovery plan.

Everyone in your organization, from your IT support (in-house or outsourced) to customer service and sales should be familiar with your backup and disaster recovery plan. The less time you spend offline, the lower the impact on your reputation and your revenue.

Wrapping up

It’s not that difficult to lower IT costs while simultaneously boosting organizational performance. All that’s required is a strategic approach that includes all of the above areas. If you cover these bases, your company will operate more efficiently without incurring unnecessary expenses.

That’s a major win for any CIO.

3 things you might be forgetting about disaster recovery

When things are good, it’s hard to imagine how the world could ever wrong you. But when something goes wrong, it’s nearly impossible to see the sun through the clouds. Disasters happen without warning, and they can cripple a company if you’re not ready.

This is the entire reasoning behind investing in a disaster recovery plan. These procedures help companies get back on their feet after a major catastrophe, and they’re often the reason businesses don’t go belly-up following such an event.

That said, a large number of companies aren’t properly prepared for the worst. They may have disaster recovery solutions, but they haven’t fully worked them out. This can be just as dangerous as not having any plan at all, and we would like to rectify these issues by discussing some aspects of disaster recovery that you may not be considering.

1. You need to test constantly

“Everyone has a plan until they get punched in the face.” That’s a quote from Mike Tyson, and it’s just as true in boxing as it is in disaster recovery planning. Actually coming up with a plan is great and puts you ahead of the companies that haven’t, but it’s impossible to know if your procedure will work until you’ve put it through its paces.

“A huge portion of organizations just aren’t putting any priority into testing.”

Sadly, a huge portion of organizations just aren’t putting any priority into testing. Some test once or twice and think they’re done, while other literally never test at all. Therefore, it’s up to you to ensure that your company’s plan actually works.

TechTarget recommends starting with a test that checks data recovery, application recovery and communications. That last aspect is the most important, as not being able to discuss issues with your team can lead to widespread panic and confusion. The site states that these tests should happen on a “regular basis” all throughout the year, so don’t think you can do it once and be done.

Finally, you’ll want to examine audit logs to see exactly what worked and what needs some more tweaking. With enough patience and testing, you can come up with a procedure that will hopefully see you through the worst disasters.

2. What about your employees?

Although most people think of data systems and downtime when discussing disaster recovery, it’s important to realize there is a much more human element to this process that you’re want to consider. Specifically, you need to figure out what your employees will be doing during such an event.

Of course, the first step is to make sure everyone is alive and well following a catastrophe. After this, you’ll need to think about where these people can work. Will they be able to simply log in from home? Do they need access to data systems stored in the office? Do they have all the equipment they need at home?

After considering this, TechTarget asks administrators to consider the possibility of employees being displaced from their homes. In such situations, work is the last thing on an employees mind. While there’s nothing wrong with that, it’s up to you to figure out what the next step is. TechTarget recommends gaining access to trained psychological professionals in order to help workers mentally readjust.

What happens if your employees lose their homes? When an employee loses their home, they generally don’t worry about work.

3. Your workers are a major threat

Clearly, your employees are a valuable asset. That said, they’re also often the ones most responsible for disasters in the workplace. According to a 2014 report from IBM, 95 percent of data security disasters can be traced back to human error.

Although you trust your employees, this statistic shows that the best way to avoid a disaster may be to better train your employees. Exactly what that means depends on your industry and what employees have access to, but the point is that thinking about external factors like tornados and earthquakes while ignoring human error can have disastrous results.

Top things to consider in a colocation site

More data is being generated, collected and analyzed than ever before. Data storage options are also becoming major centerpieces for business continuity and disaster recovery strategies. As time progresses, it will be significantly more difficult for in-house IT to manage it all. Colocation has become an answer for organizations to achieve security, easy access and ample data storage alongside optimal uptime levels. Let's take a look at the top considerations in a colocation site:

1. Location

Where you decide to colocate is a major decision. Kansas City Business Journal contributor Dan Kurtz suggested choosing a facility close to your company's headquarters or near the majority of your employees. Having a colo facility in close proximity allows leaders to go check on their systems and manage them appropriately. It will also help provide the connectivity and latency that users require. The facility should also be in a place that is protected from severe weather events and disperses water away. Details like these will enable organizations to avoid disaster and drive continuous operations.

The facility's location could impact your decision.The facility's location could impact your decision.

2. Security

Your colocation site should give you peace of mind that your data is protected. Data Center Journal noted that there should be multiple levels of security externally as well as internally. This could include monitoring systems, physical barriers and layered security zones. Keycard access, staffed checkpoints and alarm systems should all be standard features. Guards can constantly monitor visitor access and ensure that no unauthorized personnel are able to access your hardware or data. Ask what types of safeguards are in place as well as what Tier compliance the site has. These considerations could make a big difference in where you decide to colocate and what vendor you choose.

"Compare vendor prices to quote comparable facilities and support services."

3. Pricing

The cost associated with colocation services can be a major factor in your decision. TechTarget contributor Julius Neudorfer noted that while this shouldn't be the crux of your choice, you should compare vendor prices to quote comparable facilities and support services. The amount of power and cooling required will play a big part in your price, and each provider will have its own formula for supplying these utilities. Carefully consider your options based on the solutions provided, history of success and industry costs. These factors will help narrow down your options to the best colocation facility for your requirements.

As data becomes more of a priority for businesses, it will be important to store, manage and protect this asset effectively. It's often time-consuming and expensive to build and manage a data center on your own, but with colocation, you can have a data center without all the cost. The facility itself is governed by the provider, while you maintain your hardware. It will be important to look at the facility's location, security capabilities and service pricing compared to other vendors to guide you to the best solution. For more information on choosing a colocation site, contact ISG today.