Data Foundry Blog

    Is Cyber Insurance a Necessity?

    malicious code, cyber insurance

    According to former NSA director Keith Alexander, cybercrime is the greatest transfer of wealth in history. With the rapid increase in the frequency of cyberattacks year after year, it’s no wonder many companies are turning to cyber insurance (also called cybercrime insurance or cyber coverage) to help mitigate losses from cyberattacks, fraud, espionage and other cyber threats. However, cybercrime insurance is still relatively new, making it risky for both the insurer and the insured. There are also several expenses related to cybercrime that insurance will not cover. Be sure to consider the following before making the decision to begin policy shopping.

    Read More ›

    Why We Offer Network Assessment

    network assessment diagram

    Companies often lack essential network documentation, and they don’t know where to begin with designing and optimizing their networks to align with business goals. That’s why our network engineers provided network assessments to colocation customers that expressed a need for it. Because of the improvements our network engineering team made for these first customers, the team saw the value in the contribution they could make to our customers’ IT strategies and achievement of business goals overall. As a result, we have launched network assessment as one of our official services. This is a service we offer to colocation customers and non-customers alike. Our network assessment service and network documentation provide a real transfer of knowledge through a consultative approach.

    Read More ›

    Ransomware & Ransom DoS: 4 Reasons You Shouldn’t Pay

    ransom money for RDoS or ransomware

    According to IDG Research, costs associated with ransomware totaled $209 million in the first quarter of this year alone. One factor contributing to the rapid increase in ransomware and DDoS threats for ransom (also known as ransom DoS or RDos) is that people and companies are paying these ransoms, allowing cyber criminals to establish a steady stream of income. What would your company do if faced with a DDoS or ransomware threat? Here are four good reasons paying up shouldn’t be an option.

    Read More ›

    We Are Building Texas 2: Our Next Purpose-Built Data Center

    texas 2 data center rendering

    We are excited to announce the construction of Texas 2, Data Foundry’s fifth Texas data center. Texas 2 will accompany Texas 1 on the Data Ranch at our headquarters in Austin, and will be 325,000 square feet upon completion of the final phase. Texas 2 will provide retail and wholesale colocation space, and it is designed to support high density deployments up to 50 kW per cabinet.

    Read More ›

    Cloud Services Are Integral to Modern IT Strategy

    Data Foundry cloud cog

    An article posted on Data Center Knowledge back in May states, “It’s clear that the cloud should be part of your IT strategy, even if your team has yet to determine how to leverage it.” Data Foundry recognizes the advantages cloud services offer, and as a result, we have added Cloud Services to our managed services offering.

    Read More ›

    The Data Center: Your New IT Partner


    Data centers that provide colocation, also known as multi-tenant data centers or MTDCs, have evolved to offer much more than just space for rent and installation assistance. As an Internet Service Provider and an operator-owned company, customer service has always been at the forefront of Data Foundry’s offering. We have always provided a consultative approach to guide our customers toward an infrastructure setup that is in their best interest. As organizations large and small shift to the cloud for storage and the use of applications, there is a greater need for interconnectivity, network management and security services on behalf of the data center. We have evolved to offer services in all of these areas, and we consider ourselves our customers’ IT partner.

    Read More ›

    Cyberattack Prevention: Getting the Board on Board

    boardroom cybersecurity

    In a 2015 survey by Raytheon and the Ponemon Institute, only 22% of participants said that their organization’s IT leadership briefs the board on cybersecurity strategy. Furthermore, only 14% say that their organization’s security leader has a direct reporting relationship with the CEO. In a separate poll by PwC, one-third of corporate board directors said they aren’t sufficiently or at all engaged in overseeing/understanding the company’s annual IT budget, which is an important component of cyberattack prevention. Here’s why it’s past time to get the board on board with cyberattack prevention and how to get started.

    Read More ›

    Airlines & Downtime: Causes, Costs & Lessons Learned

    airlines data center downtime costs millions

    This year has been hectic for the airline industry with three major airlines suffering computer outages since January: Delta, Southwest and JetBlue. Computer outages, or downtime, can cost major corporations several thousands of dollars by the minute. Southwest Airlines CEO Gary Kelly admitted their recent outage will cost the company between $28 and $54 million. As IT people, we at Data Foundry understand everything that can break will, at some point or another. However, we took a look (as good of a look as an outsider can take) into the costs and causes of these recent outages, and our experts had a few thoughts on how these catastrophic events may have been prevented.

    Read More ›

    Why You Should Pay Attention to Data Center Contamination Control

    The dangers of dust, data center contamination

    There are a number of best practices data center operators should follow to maintain the ideal environment for IT equipment, such as monitoring humidity levels and atmospheric corrosion, replacing dust filters in a timely manner, using chemical filtration systems, limiting foot traffic and using tak mats or sticky mats. In addition to following these best practices, data center operators should conduct an annual contamination assessment and do a thorough cleaning to ensure that data center clean room standards are met.

    Read More ›

    7 Reasons to Use Object Storage

    object file structure

    Unstructured data is growing exponentially year after year with the advanced capabilities of modern devices. These devices generate mass quantities of emails, images and audio and video files. Growing pools of unstructured data become difficult to organize, manage and search. This is where object storage comes in. Object storage is ideal for organizing, managing and searching through high volumes (200 TB+) of diverse and unstructured data. Object storage platforms also give companies the ability to start making sense of the big data they have at hand and extract insights that aid in the development of business goals.

    Read More ›
    Page 7 of 17« First...56789...Last »