Intelligent Data Centres Issue 20 | Page 30

NEARLY EVERY CYBERSECURITY SURVEY PUBLISHED IN THE LAST YEAR INDICATES THAT CYBERATTACKS ARE ON THE RISE IN TERMS OF FREQUENCY , IMPACT , DURATION AND SOPHISTICATION .
EDITOR ’ S QUESTION to overwhelm the provider defences , an appropriate data protection and recovery solution should be considered part of the cyberstrategy . This includes protecting the data via air-gapped backups . In this case , the cyber thief may have a copy of your data , but they will not be able to hold it for ransom . Air-gapped solutions restrict access to everyone but the provider .
In other cases , cybercriminals may be out to inflict maximum damage on the IT operation . In this situation , organisations would benefit from a dedicated disaster recovery solution leveraging a cloud provider that can accommodate a secondary production environment that ( also ) includes all the security and protection options above .
JUSTIN AUGAT , VP OF MARKETING FOR ILAND
In the world of cybersecurity , the best offence is a good ( proactive ) defence . Given the frequency and sophistication of attacks over the last few years , it is clear that implementing multiple layers of security and protection is the best method to reduce the ability to attack and to limit the financial damage associated with an attack . here is no question that cybersecurity is top of

T mind for organisations worldwide . Nearly every cybersecurity survey published in the last year indicates that cyberattacks are on the rise in terms of frequency , impact , duration and sophistication . Recent data from Accenture shows that , over the last five years , the number of security breaches has risen 67 %, the cost of cybercrime has gone up 72 % and the complexity and sophistication of the threats has also increased .

Unfortunately , there is no ‘ silver bullet ’ solution when it comes to cybersecurity . As a result , organisations must take a multi-layered approach to securing their data and proactively deploying solutions that enable the recovery of data if the security layers are defeated . Starting with security , our experience has shown that a combination of the following is best :
• Physical security : This includes monitoring , access security and ensuring environmental elements are protected such as power , cooling and power supplies
• Logical security : This includes network , storage and hypervisor security . In this case , virtual firewalls , encryption and logical segmentation should be standard
• Process : This includes role-based access , documentation and regular testing
• Certification : Finally , independent validation of the above by a reputable third party
With all of the above in place , the likelihood of a successful cybersecurity event is low . However , should the security fail , or the attack be so sophisticated as
NEARLY EVERY CYBERSECURITY SURVEY PUBLISHED IN THE LAST YEAR INDICATES THAT CYBERATTACKS ARE ON THE RISE IN TERMS OF FREQUENCY , IMPACT , DURATION AND SOPHISTICATION .
30 Issue 20 www . intelligentdatacentres . com