• About Us
  • Partnership Opportunities
  • Privacy Policy

Data Center Frontier

Charting the future of data centers and cloud computing.

  • Cloud
    • Hyperscale
  • Colo
    • Site Selection
    • Interconnection
  • Energy
    • Sustainability
  • Cooling
  • Technology
    • Internet of Things
    • AI & Machine Learning
    • Edge Computing
    • Virtual Reality
    • Autonomous Cars
    • 5G Wireless
    • Satellites
  • Design
    • Servers
    • Storage
    • Network
  • Voices
  • Podcast
  • White Papers
  • Resources
    • COVID-19
    • Events
    • Newsletter
    • Companies
    • Data Center 101
  • Jobs
You are here: Home / Voices of the Industry / Why Continually Evaluating and Updating Your Data Center Security Strategy is Mission Critical

Why Continually Evaluating and Updating Your Data Center Security Strategy is Mission Critical

By Voices of the Industry - June 12, 2017

Why Continually Evaluating and Updating Your Data Center Security Strategy is Mission Critical

Having a sound data center security strategy that includes colocation can be the best way to mitigate your threat risk. (Photo: IO)

LinkedinTwitterFacebookSubscribe
Mail

In this week’s Voices of the Industry, David Mettler, Vice President of Sales and the Market Director for the US at IO, explains why continually evaluating and updating your data center security strategy is mission critical. 

David Mettler, IO

David Mettler, Vice President of Sales and the Market Director for the US, IO

When the epic and unprecedented malware attack WannaCry was discovered on May 12, it had already infected an estimated 57,000 computers in more than 150 countries. Its spread was tempered by the weekend, but more than 230,000 systems globally are believed to have been infected by Monday morning, May 15.

This particularly virulent form of malware holds infected computers hostage and attempts to extract a ransom to re-gain access to files—and it’s one of the most severe attacks we’ve seen. Hospitals in the UK health system, a Spanish telecommunications Telefonica, the Deutsche Bahn in Germany, the Russian interior ministry, and US-based FedEx were among the organizations impacted by WannaCry.

So how did we get from thrill hackers operating out of basements just a decade or so ago to global cyberattacks affecting financial, healthcare, manufacturing, government, and other sectors today?

Three trends are driving increases in the number and sophistication of data center security threats today:

  • We’re more globally connected – In 2005, 1 billion people had Internet access. Today, that number has risen to 3.2 billion people.[1]
  • Things are more connected – But the Internet is no longer about connecting just people. Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020.

[clickToTweet tweet=”Dave Mettler – The Internet is no longer about connecting just people. ” quote=”Dave Mettler – The Internet is no longer about connecting just people. “]

  • Bad actors are more connected – With more people and things connected, it’s much easier for bad actors to expand their “playing field” for economic, financial, political, or other gain.

These trends make it imperative for data centers to take a hard line on security—from the physical perimeter all the way to the data center core—by continually evaluating and updating corporate security policies.

According to the SANS Institute, three of the top five security concerns for enterprises are at least in part physical: access management, social engineering, and insider threats. 

  • Controlling and managing physical access to the IT equipment through secured racks, cabinets, cages, and other enclosures is paramount. When someone can physically access and touch the equipment, any logical security controls can be easily subverted.
  • Well-intentioned threats, also known as social engineering, carried out by employees or others who want to help. For example, an employee who lends a new employee his badge to access the data center or the cleaning person who holds the door open for someone carrying equipment.
  • Insider threats come from those within or affiliated with the organization who have inside information about and/or access to the data center—employees, former employees, contractors, vendors, even customers—and have malicious intent.

[clickToTweet tweet=”Three trends are driving increases in the number and sophistication of data center security threats today. ” quote=”Three trends are driving increases in the number and sophistication of data center security threats today. “]

An additional challenge for enterprise data centers is the potential lack of security awareness and cooperation between security or facility personnel and IT staff. Even though they may differ widely on priorities and approach, they must work together toward the same goal: securing the data center.

All of these physical security risks have one element in common: people.

Because it’s their core business, data center colocation providers—and their people—are uniquely qualified to better manage these risks since:

  • They’re experts at data center management and have invested heavily in ensuring that their customers have the most secure environment possible in which to house their infrastructures.
  • They hire security teams who are at the forefront of threat detection and mitigation strategies, and are continually reviewing and updating their security policies.
  • All employees fully understand the core business of providing data center colocation services and, therefore, work together to ensure unified security.

Threats will continue to escalate, both in number and sophistication. Having a sound data center security strategy that includes colocation can be the best way to mitigate your threat risk.

David Mettler is IO’s Vice President of Sales and the Market Director for the US. Meter is an experienced and seasoned data center management executive, having held positions previously with CenturyLink Business for Enterprise and Sprint. Connect with David on LinkedIn. IO is uniquely positioned because it operates both traditional and modular colocation environments.

DISCLAIMER: This document is for reference purposes only. The information contained herein should not be relied on and neither IO Data Centers LLC nor any of its affiliates makes any warranties or representations as to its accuracy.

[1] International Telecommunication Union/ICT statistics

LinkedinTwitterFacebookSubscribe
Mail

Tagged With: Data Center Security, IO, Security

Newsletters

Stay informed: Get our weekly updates!

Are you a new reader? Follow Data Center Frontier on Twitter or Facebook.
voices@richmiller.biz'

About Voices of the Industry

Our Voice of the Industry feature showcases guest articles on thought leadership from sponsors of Data Center Frontier. For more information, see our Voices of the Industry description and guidelines..

  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter

Voices of the Industry

Understanding the Differences Between 5 Common Types of Data Centers

Understanding the Differences Between 5 Common Types of Data Centers No two are data centers are alike when it comes to design or the applications and data they support with their networking, compute and storage infrastructure. Shad Secrist of Belden outlines the differences between 5 of the most common types of data centers including edge, colocation and hyperscale.

White Papers

Geo diversity data center location

The Business Case for Data Center Geo Diversity

Geo diversity, or shortening the distance that your data travels, will allow you to reaching your user bases more effectively, and create better customer experiences. This white paper from Venyu explains the benefits of a geo-diverse data center partner.

Get this PDF emailed to you.

We always respect your privacy and we never sell or rent our list to third parties. By downloading this White Paper you are agreeing to our terms of service. You can opt out at any time.

DCF Spotlight

Data center modules on display at the recent Edge Congress conference in Austin, Texas. (Photo: Rich Miller)

Edge Computing is Poised to Remake the Data Center Landscape

Data center leaders are investing in edge computing and edge solutions and actively looking at new ways to deploy edge capacity to support evolving business and user requirements.

An aerial view of major facilities in Data Center Alley in Ashburn, Virginia. (Image: Loudoun County)

Northern Virginia Data Center Market: The Focal Point for Cloud Growth

The Northern Virginia data center market is seeing a surge in supply and an even bigger surge in demand. Data Center Frontier explores trends, stats and future expectations for the No. 1 data center market in the country.

See More Spotlight Features

Newsletters

Get the Latest News from Data Center Frontier

Job Listings

RSS Job Openings | Pkaza Critical Facilities Recruiting

  • Critical Power Energy Manager - Data Center Development - Ashburn, VA
  • Site Development Manager - Data Center - Ashburn, VA
  • Data Center Facility Operations Director - Chicago, IL
  • Electrical Engineer - Senior - Dallas, TX
  • Mechanical Commissioning Engineer - Calgary, Alberta

See More Jobs

Data Center 101

Data Center 101: Mastering the Basics of the Data Center Industry

Data Center 101: Mastering the Basics of the Data Center Industry

Data Center Frontier, in partnership with Open Spectrum, brings our readers a series that provides an introductory guidebook to the ins and outs of the data center and colocation industry. Think power systems, cooling, solutions, data center contracts and more. The Data Center 101 Special Report series is directed to those new to the industry, or those of our readers who need to brush up on the basics.

  • Data Center Power
  • Data Center Cooling
  • Strategies for Data Center Location
  • Data Center Pricing Negotiating
  • Cloud Computing

See More Data center 101 Topics

About Us

Charting the future of data centers and cloud computing. We write about what’s next for the Internet, and the innovations that will take us there. We tell the story of the digital economy through the data center facilities that power cloud computing and the people who build them. Read more ...
  • Facebook
  • LinkedIn
  • Pinterest
  • Twitter

About Our Founder

Data Center Frontier is edited by Rich Miller, the data center industry’s most experienced journalist. For more than 20 years, Rich has profiled the key role played by data centers in the Internet revolution. Meet the DCF team.

TOPICS

  • 5G Wireless
  • Cloud
  • Colo
  • Connected Cars
  • Cooling
  • Cornerstone
  • Coronavirus
  • Design
  • Edge Computing
  • Energy
  • Executive Roundtable
  • Featured
  • Finance
  • Hyperscale
  • Interconnection
  • Internet of Things
  • Machine Learning
  • Network
  • Podcast
  • Servers
  • Site Selection
  • Social Business
  • Special Reports
  • Storage
  • Sustainability
  • Videos
  • Virtual Reality
  • Voices of the Industry
  • Webinar
  • White Paper

Copyright Data Center Frontier LLC © 2022