Call us on 0330 332 7933

Preventing data disasters with Matt Johnson (Chief Technology Officer)

A data centre can be the difference between a complete data disaster, and effective data recovery. By entrusting your valuable customer data in one of Intercity’s UK-based secure data centres, you can be assured that your business’ vital customer information will never be without a lifeline.

What are the benefits of a data centre owned and monitored by Intercity’s ISOC?

With a core set of hosting service levels designed to meet every requirement, and with dedicated facilities located in the North and South of the UK, Intercity’s hosting services can be delivered around specific locations to suit the specific needs of individual businesses.

By taking away the burden of compliance, availability and security, Intercity’s Hosting Services save you time and money, reduce carbon emissions, and help your business work more efficiently.

What can we expect from the new Birmingham data centre?

The hosting floor is 300 square metres providing space for 100 racks. The centre is built to Tier III specification with N + N power provision (0.5MW power capacity), N + 1 HVAC with Hot Aisle containment and full carrier redundancy.
What are the key ‘need to know’ specifications of Intercity’s data centres?

Intercity’s hosting facilities are built to Tier III specification and ISO9001, ISO14001 and ISO27001 certified and approved for N3 Aggregator status. They’re also built to CoCo and PCI standards, offering customers peace of mind that their data
is held securely and in line with key compliance requirements.

How secure are the premises that are home to your data centres?

The purpose-built facilities are protected by advanced physical security measures which include external and internal CCTV systems monitoring the perimeter of the buildings and key locations within each office environment. All CCTV is visible to Intercity Security Operations Centre (‘ISOC’) engineers 24×7 and recorded in digital format.

All access to the buildings and Intercity offices is via an electronic access control system, protected by an alarm and monitored by CCTV. Events from the alarm, CCTV footage and access control systems are archived for a minimum of six months.

How do customers know they’ll get the level of service that’s right for them?

Redundancy has been built into all environmental controls, providing confidence that you will get the best performance from your hosted equipment. Service continuity is guaranteed through resilient power and high bandwidth internet connectivity, meaning business critical systems will continue to operate normally even in a disaster situation.

The service is underpinned by Intercity’s own ServiceAlert™ management solution which delivers an SLA-backed response to alerts. Being located within our own premises, the 24×7 Help Desk provides further confidence that there will always be someone available to assist if needed.

Bespoke requirements that go beyond our standard co-location and complex service offerings can also be provided, with tailor made solutions designed to meet the specific needs of your business.

To learn more about our hosting services and the new Birmingham DC get in touch with us here today

Up next

Cyber security: the biggest challenges and how to overcome them

As an IT manager, does cyber security cause you technological headaches and workplace frustration?

According to reports, there’s yet another predicted spike in malicious cyber activity on the horizon. To get prepared, businesses are investing considerable cash in hiring security professionals, maintaining business privacy and avoiding cyber attacks. I’ve read that, in 2017 alone, these protection efforts cost businesses $86.4 billion worldwide.

But what are your most common online security challenges? Often, it’s not just deploying the right security technology. Getting buy-in from your Board and educating your staff on the importance of vigilance can be just as challenging, yet the solutions to these are far less costly:

Getting your Board onboard

You may find that your online security processes are left to you and your IT department to manage and disseminate.

Indeed, our latest research on cyber security shows that only 30% of senior business leaders have an in-depth understanding of online security threats. A further 7% have very little or no understanding whatsoever.

This is a reason for serious concern — your senior leaders are just as, if not more than, likely to be targeted by cyber criminals as they have the easiest access to the most sensitive business information.

Your Board needn’t be online security experts, but they do need to keep on top of your security policies, your latest online threats, how you mitigated them, and what they should be on the lookout for.

This could take the form of monthly meetings, a quarterly board presentation or even just a regular newsletter to keep them involved in your cyber security processes.

Educating staff on your security policies

According to The Telegraph, last year saw a rise in Business Email Compromise (BEC) scams, as well as phishing attempts impersonating board level executives, using phishing PDFs and phishing sites.

Every staff member in your business has a role to play to ensure your company remains secure.

Worryingly, a significant number of these threats begin with a single staff member opening a malicious attachment or clicking on a phishing email. Every staff member in your business, therefore, has a role to play to ensure your company remains secure.

Your role, as an IT manager, is to deliver educational training to help workers understand your company’s security posture. Explain where your company is strong and weak, and where you’re actively plugging the security gaps. This training should highlight your workers’ responsibilities in your company’s security policy.

This training should include:

  • What to look for in a malicious email
  • What to do (and not do) with an email they’re not expecting
  • How to recognise suspicious content

The responsibility of security technology

Ransomware is still one of the leading cyber compromises today. It has been out in the wild for many years, but reared its head in the last couple of years. The scary thing? It’s totally indiscriminate.

Today, no business — whether you have hugely complex operations, process highly sensitive data, or simply run as a normal SME — can afford to be without a cyber security strategy. As well as educating your staff and engaging your Board, deploying robust security technology is an essential step.

Subscribe to our thinking

At Intercity, our wealth of industry experience means we understand the biggest online security challenges for businesses. In turn, we developed Touch Secure, our Security as a Service (SECaaS) — an end-to-end service that provides both application control and an intrusion protection system, as well as traditional firewall features. The concept of Touch Secure was to take an organisation’s perimeter security, firewall antivirus, and remote access systems, and to put them into the cloud.

The best bit? It removes your burden or responsibility as IT manager, takes your security off premise and delivers it back as a service. That means you avoid the frustration, unexpected costs and inflexibility of standard online security.

Online security should, therefore, be a collaborative effort across all business units and departments. Once everyone is familiar with the process of protecting your business, your first line of defense becomes far more secure. Find out how Touch Secure could protect your business in the cloud, whilst you ensure your company has a thorough and transparent security policy.