Good ‘green’ practices and robust information security are doctrines that most consider to be polar opposites in social philosophies.
Talk of ‘green practices’ and ‘carbon neutrality‘ conjures up images of reduced product quality and ill-conceived environmental controls in order to utilise green resources or save on non-re-usable materials. This is not an image you want associated with your information security practices and regimen.
UKFast’s carbon neutrality however, is derived from the accurate ‘foot printing’ of our carbon emissions in tonnes of CO2e (Equivalent Green House Gas Emissions) in the process of providing our managed hosting services. Of interest is the fact that 91% of our emissions are produced by the consumption of power from the national grid.
At UKFast we have chosen to offset our carbon emissions by procuring Voluntary Carbon Standard (VCS) certified Carbon Credits. The money paid for carbon credits of this kind goes directly to maintaining and further developing renewable energy and carbon reduction projects worldwide.
At the same time, in order to be assessed as carbon neutral we have documented and implemented a Carbon Reduction Plan – seeking to achieve a number of documented carbon reduction objectives year on year.
The physical and logical security provided by UKFast services will in no way be affected detrimentally by our commitment to maintain a carbon neutral operation. In fact, by even more accurately monitoring, measuring and seeking to reduce our greatest carbon producing factor – power consumption; we will in fact be making UKFast operations even more secure.
Through the use of innovative technologies and better working practices, a reduction in relative power consumption will decrease the strain placed on the existing national grid infrastructure. This will also further mitigate and control the risk presented by a potential power outage – one of the greatest threats present to instigating a business continuity scenario.
So, carbon neutrality is not just great for the environment but is also a valuable tool to further secure our information assets and threats to their confidentiality, integrity and most notably; availability.