• About Us
  • Partnership Opportunities
  • Privacy Policy

Data Center Frontier

Charting the future of data centers and cloud computing.

  • Cloud
    • Hyperscale
  • Colo
    • Site Selection
    • Interconnection
  • Energy
    • Sustainability
  • Cooling
  • Technology
    • Internet of Things
    • AI & Machine Learning
    • Edge Computing
    • Virtual Reality
    • Autonomous Cars
    • 5G Wireless
    • Satellites
  • Design
    • Servers
    • Storage
    • Network
  • Voices
  • Podcast
  • White Papers
  • Resources
    • COVID-19
    • Events
    • Newsletter
    • Companies
    • Data Center 101
  • Jobs
You are here: Home / Voices of the Industry / Cybersecurity in the Data Center: New Political Developments Shape New Ways of Thinking in 2022—and Beyond

Cybersecurity in the Data Center: New Political Developments Shape New Ways of Thinking in 2022—and Beyond

By Voices of the Industry - March 25, 2022 Leave a Comment

Cybersecurity in the Data Center: New Political Developments Shape New Ways of Thinking in 2022—and Beyond

There are a few steps any data center operator can take to improve its overall cybersecurity defenses and posture. Source: iStock, courtesy of DataBank

LinkedinTwitterFacebookSubscribe
Mail

In this edition of Voices of the Industry, Mark Houpt, Chief Information Security Officer at DataBank, discusses cybersecurity in the context of the war in Eastern Europe. He highlights changing dynamics that could potentially increase risk to U.S.-based companies while also offering assurances in the soundness of data security frameworks in general. He also recommends a number of best practices any data center operator should consider to improve its cybersecurity posture.

Due to the constantly changing dynamics, this article reflects conditions in Eastern Europe as of the date of publication. These events could abruptly change and lead to new cybersecurity implications.

cybersecurity

Mark Houpt, Chief Information Security Officer, DataBank

I was recently interviewed by Forbes as part of an article on Crystal Ball Predictions About Cyberattacks in 2022. I predicted that we’d have to be more vigilant in defending against possible nation-state attacks, particularly as several countries and independent groups (“nonaligned entities” such as hacker groups) now have significant cyber capabilities. As we’ve seen in the past, these capabilities can be used as ransomware, Distributed Denial-of-Service (DDoS), or other cyberattacks against commercial systems or critical infrastructure.

Unfortunately, we’re seeing this play out now with the events unfolding in Eastern Europe. Tension has been building in this region for quite some time, so the conflict is not a complete surprise. Yet, a dynamic fast-moving scenario like this leads to real questions related to cybersecurity:

  • Is this what we expected?
  • Will there be new developments and surprises?
  • What implications does this have for data center operators and their customers?
  • What can we all do right now to maximize our cybersecurity posture?
  • What level of confidence can we have in our current cybersecurity position?

They’re all valid concerns. To address them, it may help to first take a step back to understand how we arrived here, and then, revisit cybersecurity best practices to improve your defenses for 2022—and beyond.

Social Media’s Impact

Technology constantly shapes the way we monitor and perceive wars and conflicts such as what we’re now seeing. For example, more than 30 years ago, Operation Desert Storm was regarded as the first war fought on live TV, with satellite communications providing accurate images, footage, and updates on a daily basis.

Similarly, the current Eastern European conflict could be considered the first war to be fought on social media. People are using social media platforms to share videos, distribute information, generate sympathy and support, and influence results. In many ways it’s succeeding, but it also may have unintentional cybersecurity results on a global level.

In this case, the public outcry—as voiced in millions of posts, comments, likes, and shares—has been heard by nonaligned entities and conglomerates of hackers sympathetic to Ukraine. In response, many are launching cyberattacks against the aggressor, which, in turn, has led to a temporary decrease in attacks against American companies and infrastructure.

For CISOs and cybersecurity teams, this may seem to be good news—but only at first. The fact remains that these events are truly dynamic, especially in the case of one or more nonaligned entities targeting a powerful nation-state. These nations are accustomed to responding to attacks from other nations, not hard-to-identify hacker groups. This conflict is changing from moment to moment, and it’s conceivable it could affect the U.S. down the road.

How Can Data Centers Improve Their Cybersecurity?

There are a few steps any data center operator can take to improve its overall cybersecurity defenses and posture.

Expand the Use of Intelligence Sources

One of the most valuable resources any cybersecurity professional should use is the right intelligence sources. Many companies tend to shy away from operational security intelligence and open-source intelligence (OSINT), perhaps because they consider it a government function, not business responsibility. Today’s climate calls for a change: re-evaluating this mindset and investing in effective OSINT tools can give you a valuable advantage.

Take Advantage of Government Resources at Your Disposal

Companies today should do all they can to make use of available government resources. In the U.S., it can be one of the best resources that we have that is not actual law enforcement. For example, the Cybersecurity and Infrastructure Agency (CISA) is an incredibly valuable resource and employs teams whose sole responsibility is to work with businesses in an intelligence capacity as well as an advisory role.

The Department of Homeland Security also has important resources to help U.S. businesses bolster their cybersecurity efforts. This has become more important when you consider the recent SolarWinds, Colonial Pipeline, and other successful cyberattacks.

Twitter Mining

There are companies and solutions that will mine Twitter and other social media platforms to consolidate data and use it to alert about possible threats. Users can even manage multiple Twitter feeds running at the same time to collect hashtags and monitor other trends and possible groundswells of threat activity.

This type of functionality could be used during a crowd event or riot. Cybersecurity teams can track crowd locations, and if they get too close to a facility or data center, they can notify staff and take preventative measures to assure the facilities stay safe.

Shields Up: Adhere to Security Best Practices

Now is not the time to relax your standards. If anything, it’s time for “shields up,” and this means increased scrutiny and discipline related to known cybersecurity best practices.

For example, every company should be up to date when it comes to patching, data hygiene, and physical elements of security. This can include everything from making sure fuel contracts are current and backup generators are filled, to visitors wearing badges at all times.

This is also a great time to revisit various policies and escalation paths, including running business continuity drills, disaster recovery drills, and tabletop exercises. Cybersecurity professionals simply can’t afford to take their eye off the ball.

Be Confident While Remaining Vigilant

As we examine the overall situation, there are many reasons for data centers to be confident in the security strength of the U.S.-based infrastructure, especially as they continue to be vigilant. As I write this, we are nearly a month into the conflict in Eastern Europe and U.S.-based infrastructure is still intact. Generally speaking, this seems to show that the majority of cyberattacks have been contained to that region. However, the situation will be constantly changing, with new dynamics occurring each day that could lead to cybersecurity concerns directly in the U.S.

Knowing this is half the battle, data center providers should use this time to take a closer look at their overall cybersecurity programs and take all the steps they can take to be even more vigilant now to enhance their cybersecurity preparations and posture. Whether investing in new resources, partnering with new cybersecurity partners and service providers, adhering to known best practices, (or all of the above), data center operators can stay a step ahead of potential cyberattacks no matter how the geopolitical situation develops.

Mark Houpt brings over 30 years of extensive information security and information technology experience in a wide range of industries and institutions. He is Chief Information Security Officer at DataBank.

LinkedinTwitterFacebookSubscribe
Mail

Tagged With: cybersecurity, Data Center Security, DataBank

Newsletters

Stay informed: Get our weekly updates!

Are you a new reader? Follow Data Center Frontier on Twitter or Facebook.
voices@richmiller.biz'

About Voices of the Industry

Our Voice of the Industry feature showcases guest articles on thought leadership from sponsors of Data Center Frontier. For more information, see our Voices of the Industry description and guidelines..

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter

Voices of the Industry

Understanding the Differences Between 5 Common Types of Data Centers

Understanding the Differences Between 5 Common Types of Data Centers No two are data centers are alike when it comes to design or the applications and data they support with their networking, compute and storage infrastructure. Shad Secrist of Belden outlines the differences between 5 of the most common types of data centers including edge, colocation and hyperscale.

White Papers

data center services

Data Center Services: A Story of Build Versus Buy

Waffle House opted to implement a disaster recovery solution in QTS’ 385,000 square foot facility in Suwanee, Georgia, replicating its financial, inventory management and supply chain management services to the site. Download the new report that explores how choosing a colocation provider helped Waffle House reduce its risk and provide a higher level of performance.

Get this PDF emailed to you.

We always respect your privacy and we never sell or rent our list to third parties. By downloading this White Paper you are agreeing to our terms of service. You can opt out at any time.

DCF Spotlight

Data center modules on display at the recent Edge Congress conference in Austin, Texas. (Photo: Rich Miller)

Edge Computing is Poised to Remake the Data Center Landscape

Data center leaders are investing in edge computing and edge solutions and actively looking at new ways to deploy edge capacity to support evolving business and user requirements.

An aerial view of major facilities in Data Center Alley in Ashburn, Virginia. (Image: Loudoun County)

Northern Virginia Data Center Market: The Focal Point for Cloud Growth

The Northern Virginia data center market is seeing a surge in supply and an even bigger surge in demand. Data Center Frontier explores trends, stats and future expectations for the No. 1 data center market in the country.

See More Spotlight Features

Newsletters

Get the Latest News from Data Center Frontier

Job Listings

RSS Job Openings | Pkaza Critical Facilities Recruiting

  • Critical Power Energy Manager - Data Center Development - Ashburn, VA
  • Site Development Manager - Data Center - Ashburn, VA
  • Data Center Facility Operations Director - Chicago, IL
  • Electrical Engineer - Senior - Dallas, TX
  • Mechanical Commissioning Engineer - Calgary, Alberta

See More Jobs

Data Center 101

Data Center 101: Mastering the Basics of the Data Center Industry

Data Center 101: Mastering the Basics of the Data Center Industry

Data Center Frontier, in partnership with Open Spectrum, brings our readers a series that provides an introductory guidebook to the ins and outs of the data center and colocation industry. Think power systems, cooling, solutions, data center contracts and more. The Data Center 101 Special Report series is directed to those new to the industry, or those of our readers who need to brush up on the basics.

  • Data Center Power
  • Data Center Cooling
  • Strategies for Data Center Location
  • Data Center Pricing Negotiating
  • Cloud Computing

See More Data center 101 Topics

About Us

Charting the future of data centers and cloud computing. We write about what’s next for the Internet, and the innovations that will take us there. We tell the story of the digital economy through the data center facilities that power cloud computing and the people who build them. Read more ...
  • Facebook
  • LinkedIn
  • Pinterest
  • Twitter

About Our Founder

Data Center Frontier is edited by Rich Miller, the data center industry’s most experienced journalist. For more than 20 years, Rich has profiled the key role played by data centers in the Internet revolution. Meet the DCF team.

TOPICS

  • 5G Wireless
  • Cloud
  • Colo
  • Connected Cars
  • Cooling
  • Cornerstone
  • Coronavirus
  • Design
  • Edge Computing
  • Energy
  • Executive Roundtable
  • Featured
  • Finance
  • Hyperscale
  • Interconnection
  • Internet of Things
  • Machine Learning
  • Network
  • Podcast
  • Servers
  • Site Selection
  • Social Business
  • Special Reports
  • Storage
  • Sustainability
  • Videos
  • Virtual Reality
  • Voices of the Industry
  • Webinar
  • White Paper

Copyright Data Center Frontier LLC © 2022