How Secure is Your Datacenter?

May 22, 2014 at 10:00 AM

 

Let’s hope your data center isn’t this vulnerable.

 

If its security system is still in a diaper phase you could be in a lot of trouble, and most likely at risk of a security breach...

 

Why, you might ask, are we talking about babies and computers?

 

Because data centers are the nerve center of an organization. This means that security should be top priority, and your data center security should be as impenetrable as a fully grown, seven-foot bearded lumberjack.

 

And surely it’s not probable that a baby could hack into your data center, but the point is to assess who or what could interfere with the security of your data.

 

In a study done by the 2013 IBM Cyber Security Intelligence Index that encompassed 3,700 clients across 130 countries, it was estimated that the average number of cyber attacks on a single organization over the course of a week is 1,400. That’s two hundred per day!

 

The 2014 Data Breach Investigations Report (DBIR) also examined another 50 organizations and found that a collective 63,000 “security incidents”  occurred as well as 1,367 actual data breaches.

 

One security breach that happened recently at Iowa State University left about 30,000 students exposed. And we all remember what happened at Target; it was the largest retail breach in U.S history. Yikes.

 

 

Check it once, check it twice

 

 

Next-generation data centers will require ever-evolving solutions to keep sensitive business and client information secure, and this is the reality that businesses will have to face as they grow and build upon their server infrastructure.

 

But it doesn’t have to be a huge daunting task. There are different levels of security we can all utilize in order for our datacenters to have a robust security system.

 

Here are 3 different levels of security with examples to help you prepare in securing your datacenter:

 

Physical security: locked entry-way doors with HID key access only, retina scan or fingerprint entry, locking IT closets, security cameras, motion sensors, etc.

 

Software security: firewall protection, data encryption, implementing VLANs, using IP routing and access control lists, web filtering and security, malware protection.

 

Employee security:  First assess, who should have access to what? Set permissions, clear sensitive information from desks, monitor entries and requests for important material, and check your wireless network security- do you have CPE’s (access points) in place with high levels of data encryption for transferring info wirelessly?

 

IT managers and facility operations can also schedule routine audits to help find any type of security infiltration.

 

At L-com we carry a variety of products and technologies that support security and could be helpful with your system implementation:

 

  • ·         IP cameras: These can be used in a variety of areas including data closets, server rooms, warehouses, hallways, etc.
  • ·         Fiber optic cable: Since fiber transfers data with light this makes it very hard to tap and steal data.
  • ·         Physical Layer Isolation: Isolate and protect data by placing a physical barrier between your computer or other device and the network cables that are attached to it.
  • ·         Ethernet Switches that use VLANS:  Virtual Local Area Networks (VLANs) can be used to isolated select users to specified servers, routers and other network devices limiting access to sensitive information.
  • ·         Middle Atlantic cabinets and our NEMA enclosures are lockable for rugged protection.

 

By assessing and maximizing your security systems you can find peace of mind that your critical information is secure and protected at all times, with zero threat of unauthorized access or infiltration.

 

None of us want to be hacked. We don’t want to go down in history like any of these guys (20 infamous hacker break-ins).

 

So take precaution. Review your current security systems and ask yourself, how secure is my data center?

 

Pingbacks and trackbacks (1)+

© L-com, Inc. All Rights Reserved. L-com, Inc., 50 High Street, West Mill, Third Floor, Suite 30, North Andover, MA 01845