Data Foundry Blog

Texas 1 Data Center Passes Third-Party PCI DSS Compliance Audit

Texas 1 Data Center Passes Third-Party PCI DSS Compliance Audit

As anyone who has toured our data centers knows, our purpose-built facilities are extremely secure, and security procedures are strictly enforced. Though we’ve met PCI DSS requirements since Texas 1 opened for business in 2011, we are now officially certified by a third party for meeting PCI DSS requirements. The Importance of Third-Party PCI DSS Compliance Understandably,...

Data Foundry Launches Technology Policy Microsite

Data Foundry Launches Technology Policy Microsite

We’re excited to announce the launch of our new microsite, Data Foundry’s Advocacy Hub. As a company, we’ve been involved in technology-related policy and legislation since our establishment. Because we started as one of the first 50 ISPs back in 1994, protecting the open Internet and online privacy is near and dear to us. Over the years, we’ve participated in conferences,...

Data Foundry Announces Microsoft Azure ExpressRoute Partnership

Data Foundry Announces Microsoft Azure ExpressRoute Partnership

Data Foundry is now an official Microsoft Azure ExpressRoute Partner. ExpressRoute is a private, dedicated network connection between Microsoft Azure data centers and our customers’ IT environments. Azure ExpressRoute is one of the multiple paths to the cloud included in Data Foundry’s CloudTap service. CloudTap™ provides secure, end-to-end private connections to top cloud...

Data Foundry Signs Coalition Letter in Support of the Email Privacy Act

Data Foundry Signs Coalition Letter in Support of the Email Privacy Act

Yesterday, Data Foundry signed a coalition letter addressed to the U.S. House of Representatives in support of the Email Privacy Act along with tech giants such as Facebook, Google, Amazon, IBM, Cisco Systems and other tech firms. Non-profit organizations also signed on, including the Electronic Frontier Foundation and the ACLU. The Email Privacy Act is a revision to ECPA,...

5 Things Your Business Can Do to Promote Data Privacy

5 Things Your Business Can Do to Promote Data Privacy

Data Privacy Day is an international effort focused on promoting data privacy awareness that takes place on January 28 every year. The National Cyber Security Alliance (NCSA) leads promotional efforts for the U.S. This non-profit organization is dedicated to promoting a safer, more secure and more trusted Internet. In addition to educating consumers on how to protect their...

Do You Know What’s Under Your Data Center?

Do You Know What’s Under Your Data Center?

You may have heard about data centers being built in 3-6 months from groundbreaking to commissioning. You’ve probably also seen buildings that are retrofitted to be data centers. There are advantages to these types of data center construction projects – they’re fast and cheap, and companies that need data center space ASAP can move in quickly. However, as you can imagine,...

How to Future-Proof Your Data Center Deployment

How to Future-Proof Your Data Center Deployment

Choosing a colocation provider is often a multi-year commitment. While colocation does provide greater flexibility and scalability than building a company data center, the level of scalability and flexibility will differ between colocation facilities. It’s essential to choose a data center that will allow for your expansion, not only in terms of space but also in terms of...

7 Reasons Why Fortune 5 Companies Utilize Colocation

7 Reasons Why Fortune 5 Companies Utilize Colocation

If building and operating enterprise data centers was always the best course of action, all the companies that had the cash flow to do so would do it. There are several reasons Fortune 5 companies continue to engage colocation providers rather than exclusively running their own data centers. These are seven reasons we hear repeatedly from large corporations that utilize...

What’s the Best Backup Strategy?

What’s the Best Backup Strategy?

Backup solutions have evolved significantly since the days when full and differential backup were the only options. The best backup strategy for your company largely depends on the size of your organization and your RTO (Recovery Time Objective) and RPO (Recovery Point Objective). RTO is the maximum period of time within which a business process must be...

Zero Rating Threatens the Open Internet

Zero Rating Threatens the Open Internet

At Data Foundry, we’re long-time advocates for open markets and the open Internet. Over the years we have worked on several efforts to protect the open Internet with rules such as those put forth in the FCC’s Open Internet Order. Free or open market systems usually flourish with minimal regulation. However, this isn’t always the case, and it hasn’t been the case with...

Data Foundry Speaks Up: Declares Need for Tech Committee in State Legislature

Data Foundry Speaks Up: Declares Need for Tech Committee in State Legislature

As a technology company whose founders, Ron and Carolyn Yokubaitis, were advocates before they were entrepreneurs, Data Foundry has always been involved in policy issues concerning technology and our fundamental rights. We’ve advocated and continue to advocate for reform on several pieces of legislation to address technology and privacy issues, including the reform of: ECPA...

What’s the Best Cloud Strategy?

What’s the Best Cloud Strategy?

These days, companies cannot grow successfully without planning an IT infrastructure strategy. If that infrastructure fails, the company fails. It seems that most organizations are coming to the conclusion that a hybrid cloud model is the best option. According to the 451 Alliance, around 70% of organizations are currently using a multi-cloud model....

5 Types of DDoS Attacks & How to Mitigate Them

5 Types of DDoS Attacks & How to Mitigate Them

A massive DDoS attack on DNS provider Dyn last Friday resulted in limited or no access for many users on major websites and platforms such as Twitter, Pardot, Spotify, New York Times, Netflix, SoundCloud and other popular websites. (Learn more about DNS in our ICANN article.) The attack was conducted using a self-replicating botnet called Mirai to infect devices connected to...

Shopping for Cyber Insurance? 10 Questions You Should Ask

Shopping for Cyber Insurance? 10 Questions You Should Ask

In a previous blog, we talked about assessing the need for cyber insurance. If your company has decided to seek coverage for cybercrime, these ten questions will help you through the rigorous process of finding the right policy based on your company’s needs and vulnerabilities. What types of cybercrime is your company most vulnerable to?Determining what types of cybercrime...

Is Cyber Insurance a Necessity?

Is Cyber Insurance a Necessity?

According to former NSA director Keith Alexander, cybercrime is the greatest transfer of wealth in history. With the rapid increase in the frequency of cyberattacks year after year, it’s no wonder many companies are turning to cyber insurance (also called cybercrime insurance or cyber coverage) to help mitigate losses from cyberattacks, fraud, espionage and other cyber...