Take care of data security at every level!
Poznań, Poland – 13 September 2017 – In order to ensure data security, we need to look at many interdependent areas. Effective IT resource security means comprehensive approach and focus on the basics.
Key IT security components are infrastructure security, backup, cyber security, as well as personal data and application security. Failure to take care of any of these may result in the loss of data or improper operation of infrastructure. Practically speaking, users are usually considered the weakest link, however, resource protection is in fact a complex system of interdependent actions and processes.
Security starts from the buttom, with an infrastructure defined as the right place for data storage and equipment quality. “Locating your resources in a specialist data center is a safeguard against problems caused by power or cooling failure,” says Maciej Madziała, IT Solutions Architect at Beyond.pl. On top of that, this also guarantees 24/7 monitoring and protection against unauthorised access. Beyond Data Center 2 is the only data center in central and eastern Europe to meet the highest certification requirement for data center security, confirmed by ANSI/TIA-942 Rated-4 Certification.
The next security level is backup. According to the “Veeam Availability Report 2017” report, organisations lose an average of $21.8 million due to unplanned downtime. “If you don’t want to lose your data, follow a simple 3-2-1 rule. Keep 3 duplicates of every copy, on 2 different storage devices, 1 of which should be outside your main office, e.g. in the cloud,” explains Tomasz Krajewski, Presales Manager – Eastern Europe at Veeam.
Recent ransomware attacks proved that ensuring cyber security is an enormous challenge. According PWC report, cyber attacks account for 29 % of all economic crimes. “One of the most common types of hacker attacks are DDoS attacks,” says Radosław Wesołowski, CEO at Grey Wizard. “Cyber attacks have evolved a lot over the recent years. Today these are multidimensional attacks and affecting both networks and applications, with greater reach and bandwidth, using e.g. open DNS servers,” he adds.
Data leakage is most often caused by people, not technical failures. “Security Trends 2015” shows that as much as 81% of users do not follow security procedures. “When we talk about IT security, the key measures are encrypting emails with personal data, changing your password frequently, and putting tape over webcams,” advised Agnieszka Stępień, PhD at the Institute of Data Protection.
Finally, we need to secure the tools themselves. “It doesn’t matter whether our product is a complete web application or an API transferring data directly to a customer’s system,” says Łukasz Gajos, CTO at Transparent Data, highlighting the application security issue. “Every web tool requires the creators to be careful assessing potential risks, continuously expanding their knowledge and regularly preparing appropriate preventive scenarios. Nowadays OWASP or Application Security Verification Standard are not so much a luxury, but a necessity for every company that’s serious about fulfilling its duty towards users,” he adds.
In order to educate users about how a secure data center operates in cooperation with various technology partners, Beyond.pl prepared an educational route at Data Center 2. Since January, we’ve had over 1000 visitors at our site, including Aziz Benmalek, Vice President at Microsoft, representatives from public institutions, corporations, as well as small and medium size businesses from various sectors or universities. The educational route and the possibility to visit our data center is a great opportunity to learn about the complexity of the IT security process. You can book a visit by filling in a form at security.beyond.pl.