<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>George Hillston, Author at Colocation America</title>
	<atom:link href="https://www.colocationamerica.com/blog/author/george-hillston/feed" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Dedicated Servers and Colocation Services &#124; Colocation America</description>
	<lastBuildDate>Thu, 24 Oct 2024 16:58:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Top 4 Data Center Predictions for 2014</title>
		<link>https://www.colocationamerica.com/blog/data-center-predictions-2014</link>
					<comments>https://www.colocationamerica.com/blog/data-center-predictions-2014#respond</comments>
		
		<dc:creator><![CDATA[George Hillston]]></dc:creator>
		<pubDate>Tue, 15 Oct 2013 05:33:00 +0000</pubDate>
				<category><![CDATA[Data Center News]]></category>
		<guid isPermaLink="false">http://cawp/?p=1022</guid>

					<description><![CDATA[<p>2013 is drawing to a close and industry experts are already forecasting what the new year holds for the data center market. Here are the top 4 data center predictions for 2014. Don’t look now, but 2014 is just around<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/data-center-predictions-2014">Top 4 Data Center Predictions for 2014</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>2013 is drawing to a close and industry experts are already forecasting what the new year holds for the data center market. Here are the top 4 data center predictions for 2014.</p>
<p>Don’t look now, but 2014 is just around the corner. As we rapidly approach the end of the year, it’s a good idea to start planning ahead for all the different things that could impact data centers in the year to come. Some of the trends that are developing aren&#8217;t new, but they will make a bigger impact in 2014 than they have to data.</p>
<p align="center"><a href="/blog/data-center-predictions-2014"><img fetchpriority="high" decoding="async" class="alignnone" style="text-align: -webkit-center; margin-top: 10px; margin-bottom: 10px;" src="https://www.colocationamerica.com/picts/blog/data-center-market-2014.jpg" alt="" width="600" height="215" align="middle" border="0" /></a></p>
<p>With that said, let’s now take a look at 4 of the emerging trends that we expect to impact data centers in 2014.</p>
<h2>Prediction 1: Green isn&#8217;t going anywhere</h2>
<p>“Going green” isn&#8217;t just a buzz-phrase anymore. Businesses will start to care more about how their data center environments are being powered. If their private data center or colocation sites aren&#8217;t being powered in an environmentally friendly manner, it’s going to become an issue that gets noticed in the Corporate Sustainability Report. The desire for a greener data center is something that will influence everything from how data centers are powered to their very construction and design.</p>
<h2>Prediction 2: There Will Be a Focus on Data Center Design</h2>
<p>Speaking of design, how data centers are built is going to change as we move forward. In the past, the design of a data center was usually about convenience and affordability. Maybe a company had some extra space in a building or they found some cheap property somewhere. However, because there are so many different risks threatening data centers, from fires to earthquakes to floods to human interaction, more importance will be placed on having a sound data center design strategy. Data center design will be about function, safety, and as mentioned earlier, energy efficiency.</p>
<h2>Prediction 3: The need for constant availability will continue to increase and drive “always available” options</h2>
<p>Because of an increased need for availability in numerous business applications, the need for data centers to be always available will be an emerging trend in 2014.  Note that there’s a difference between the “always on” data center and the “always available” data center. The always on data center is one that is constantly running, even when servers are idle. This can lead to a huge waste of energy. However, always available data centers use power control options to automatically power down idle servers, reducing wasted energy without affecting performance.</p>
<h2>Prediction 4: 2014 will be the year of data center mergers and acquisitions</h2>
<p>While 2013 has been a slow year for data center mergers and acquisitions, experts are already seeing signs that the number of transactions in 2014 will take off. Speaking at the 451 Research Hosting &amp; Cloud Transformation Summit, Peter Hopper, co-founder of DH Capital, explained that the simple reason for increased data center buyouts in 2014 is that “the buyer universe has never been better” and “multiples will remain stable, and the debt markets remain highly supportive.”</p>
<p>So, keep a lookout for both major and smaller data center deals over the next year or so.</p>
<p>As emerging technologies continue to drive change and foster new opportunities, it’s important for IT and data center professionals to keep up with these changes. From keeping up with the latest industry news on a consistent basis to <span class="seomoz-highlight seomoz-highlight-nofollow">taking technology training courses</span>, because there are many different ways you and your team can stay on the cutting edge of modern technologies.</p>
<p>Author bio: George Hillston is a freelance business and technology writer from Toronto, Ontario.  As a former IT consultant, he has helped many businesses better incorporate technologies with their existing infrastructure.  You can find more of his work on his Google+ profile.</p>
<p>The post <a href="https://www.colocationamerica.com/blog/data-center-predictions-2014">Top 4 Data Center Predictions for 2014</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/data-center-predictions-2014/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BYOD and DDoS Attacks: Evolving Threats and Solutions</title>
		<link>https://www.colocationamerica.com/blog/byod-ddos-evolving-threats-and-solutions</link>
					<comments>https://www.colocationamerica.com/blog/byod-ddos-evolving-threats-and-solutions#respond</comments>
		
		<dc:creator><![CDATA[George Hillston]]></dc:creator>
		<pubDate>Mon, 03 Jun 2013 19:07:00 +0000</pubDate>
				<category><![CDATA[Technology News]]></category>
		<guid isPermaLink="false">http://cawp/?p=891</guid>

					<description><![CDATA[<p>The BYOD (bring your own device) trend has many worrying about security; and with good reason. Any size business may be subject to a distributed denial-of-service (DDoS) attack, which can negatively impact services on the server and ultimately deny the<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/byod-ddos-evolving-threats-and-solutions">BYOD and DDoS Attacks: Evolving Threats and Solutions</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The BYOD (bring your own device) trend has many worrying about security; and with good reason.</p>
<p class="p1"><a style="text-align: -webkit-center;" href="/blog/byod-ddos-evolving-threats-and-solutions.htm"><img decoding="async" style="margin-bottom: 10px; margin-left: 10px;" title="DDoS attacks" src="https://www.colocationamerica.com/picts/blog/DDoSAttacks.jpeg" alt="DDoS attacks" width="325" height="325" align="right" border="0" /></a>Any size business may be subject to a distributed denial-of-service (DDoS) attack, which can negatively impact services on the server and ultimately deny the availability of the system for legitimate users.</p>
<p class="p1">These events can deny regular employees to run computer networked machines or their own personal devices (BYOD), which may be laptops, tablets and smartphones.</p>
<h2 style="color: #336699; font-size: medium;">BYOD Security</h2>
<p class="p1">According to ABI Research, DDoS mobile threats are on the rise but authorities are fighting back.</p>
<p class="p1">Knowing what such a threat can do to a business, it seems as though not enough is being done to prepare and repsond to DDoS attacks.</p>
<p class="p1">DDoS is however, always high on most businesses’ agenda when it comes to security targeting BYOD and identifying DDoS mitigation solutions.</p>
<p style="color: #336699; font-size: medium;"><strong>Trend and challenge</strong></p>
<p class="p1"><a title="" href="/blog/bbc-reports-biggest-ddos-attack.htm" target="_blank" rel="noopener noreferrer">Companies that have reported being hit by a DDoS attack</a> cited BYOD as the largest contributing factor. The growing influx of mobile devices can make operations a lot easier and more efficient, by connecting employees that can do their jobs from anywhere at any time.</p>
<p class="p1">However, BYOD poses a high-level of risks and security concerns when adopted. It also presents new challenges regarding threats that can impact the entire enterprise network. Businesses should not to ignore DDoS attacks in the BYOD architecture, but know how to address the challenges and complexities of mobility-driven devices.</p>
<p style="color: #336699; font-size: medium;"><strong>Ways businesses can prevent, if not mitigate, DDoS</strong></p>
<p class="p1">Applying mobile security practices is paramount. The first step towards managing and protecting systems is to carry out an information security risk assessment, which addresses both internal and external threats. It can identify loopholes where security measures should be in place; in addition, it can evaluate the potential impact if a DDoS incident was to be discovered. Taking the necessary steps to secure mobile devices can be as simple and easy as overseeing PC security and associated management and data loss policies.</p>
<p style="color: #336699; font-size: medium;"><strong>The approach to take</strong></p>
<p class="p1">The IT department can consider using access control methods, using a software authentication solution, encrypting the file system, or else optimizing a workers’ use of mobile devices by having a management app that controls the physical device itself.</p>
<p class="p1">This strategy will help the organization get the most out of BYOD while ensuring more mobile security and, possibly, deter hacktivists from launching malicious attacks.</p>
<p style="color: #336699; font-size: medium;"><strong>The evolution of DDoS attacks &#8211; mobile driven</strong></p>
<p class="p1">Those in a BYOD environment are likely to be at risk in the future. A business should always understand the impact of mobile technology and their security requirements. As the BYOD trend evolves, organizations should make certain to use one of the strategies mentioned to be able to respond to such distributed attacks, which, in consequence of Murphy&#8217;s Law, have the tendency to occur at the worst possible times for the business.</p>
<p class="p1"><strong>About the Author</strong>: <a title="" href="https://plus.google.com/u/0/118248438463972093659" target="_blank" rel="author noopener noreferrer">George Hillston</a> is professional freelance writer and passionate information security blogger.</p>
<p>The post <a href="https://www.colocationamerica.com/blog/byod-ddos-evolving-threats-and-solutions">BYOD and DDoS Attacks: Evolving Threats and Solutions</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/byod-ddos-evolving-threats-and-solutions/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Using Data Security To Keep Business Information Safe</title>
		<link>https://www.colocationamerica.com/blog/using-data-security-to-keep-business-safe</link>
					<comments>https://www.colocationamerica.com/blog/using-data-security-to-keep-business-safe#respond</comments>
		
		<dc:creator><![CDATA[George Hillston]]></dc:creator>
		<pubDate>Mon, 29 Apr 2013 16:46:00 +0000</pubDate>
				<category><![CDATA[Hosting News]]></category>
		<guid isPermaLink="false">http://cawp/?p=869</guid>

					<description><![CDATA[<p>If personal employee data or company records fall into the wrong hands, the affects can be far-reaching. Whether a company maintains a prevalent online presence or is simply storing information digitally, understanding the need to keep data secure and taking<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/using-data-security-to-keep-business-safe">Using Data Security To Keep Business Information Safe</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If personal employee data or company records fall into the wrong hands, the affects can be far-reaching.</p>
<p class="p1"><a href="/blog/using-data-security-to-keep-business-safe"><img decoding="async" class="alignnone" style="margin-bottom: 10px; margin-left: 10px;" title="data loss" src="https://www.colocationamerica.com/picts/blog/data-loss.jpg" alt="data loss" width="350" height="263" align="right" border="0" /></a>Whether a company maintains a prevalent online presence or is simply storing information digitally, understanding the need to keep data secure and taking steps to do so is a must.</p>
<h2 style="color: #336699; font-size: medium;">Data Security</h2>
<p class="p1">Data security is a phrase that relates to ensuring that unauthorized individuals do not gain access to sensitive information that could be used maliciously. Examples of data related to businesses that should be kept secure include: stored credit card information, personal information of employees or plans for future marketing campaigns.</p>
<p style="color: #336699; font-size: medium;"><strong>Importance of Data Security for Businesses</strong></p>
<p class="p1">Data may be compromised by identity thieves or competitors who use unsavory business practices. When security is not made a priority, businesses often find themselves struggling to survive.</p>
<p class="p1">A failure to keep customer information safe can result in the theft of personal information including names, addresses and credit card information. Depending on the nature of the business, thieves may even get their hands on social security numbers. If a business does not keep the personal information of their customers safe, they may have trouble retaining and gaining customers due to a lack of confidence.</p>
<p class="p1">Information about the company itself could potentially be accessed by competitors and used to keep the business from filing a patent for a certain product, launching a marketing campaign that could significantly boost business or implementing an idea intended to encourage customers to stay loyal.</p>
<p style="color: #336699; font-size: medium;"><strong>Inside threats</strong></p>
<p class="p1">Finally, businesses may be vulnerable to security breaches within their own company. Employees who have access to too much information or too wide a variety of information may be able to steal from the company. While most businesses do not want to think about the possibility that their own employees may be acting unscrupulously in a way that hurts the company, there is a real risk that theft of funds or company secrets could happen.</p>
<p style="color: #336699; font-size: medium;"><a style="text-align: -webkit-center;" href="/blog/using-data-security-to-keep-business-safe"><img decoding="async" class="alignnone" style="margin-bottom: 10px; margin-left: 10px;" title="data security" src="https://www.colocationamerica.com/picts/blog/data-security.jpg" alt="data security" width="350" height="280" align="right" border="0" /></a><strong>Improving Security</strong></p>
<p class="p1">
<p style="padding-left: 30px;">&#8211;IT audits &#8212; One technique for identifying areas of weakness is to allow a professional to perform an IT audit.</p>
<p style="padding-left: 30px;">&#8211;Strong passwords -Strong passwords should be used for every different access point that requires one.</p>
<p style="padding-left: 30px;">&#8211;If there is even a suspicion that a password has been compromised, err on the side of caution and change it.</p>
<p style="padding-left: 30px;">&#8211;Data Encryption &#8211; Data that is sent online can be protected through encryption, and it is also possible to encrypt the data found on a hard drive or USB drive.</p>
<p style="color: #336699; font-size: medium;"><strong>Keep employees informed about data safety</strong></p>
<p class="p1">Employees who may have work laptops or mobile devices often fail to use these devices securely because they do not think of the possibility of a security breach. Educate employees about the proper use of devices used for work, and remind them that safety must continue beyond the workplace if these devices are taken home.</p>
<p class="p1">Keeping data secure in the workplace is a must to avoid dangerous breaches that could result in financial losses to the company. Involve employees in efforts to boost security, and use data destruction services to properly dispose of unneeded digital information related to the business.</p>
<p class="p1"><strong>About The Author</strong>: George Hillston is professional freelance writer and passionate information security blogger. Visit his Google G+ to see more of his work.</p>
<p>The post <a href="https://www.colocationamerica.com/blog/using-data-security-to-keep-business-safe">Using Data Security To Keep Business Information Safe</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/using-data-security-to-keep-business-safe/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Object Caching 38/61 objects using Redis
Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk

Served from: colocationamerica.com @ 2026-04-04 13:47:57 by W3 Total Cache
-->