Intelligent Data Centres Issue 50 | Page 37

FEATURE
unified security platform that takes into account user needs both inside and outside of the physical security function .
Compliance operations can be simplified and irregular activity detected more quickly by implementing a centralised security platform . Automation is required to ensure that these activities are carried out consistently . By combining resources and expertise from across the organisation , a common platform with greater capabilities than any one function could develop alone can be deployed . This simplifies day-to-day operations and prevents future issues caused by overlapping systems that create operational blind spots as a result of a failure to integrate .
Securing IoT devices
Nick Smith , Business Development Manager at Genetec
plan that discourages unwanted incursions is essential and can include a combination of technologies such as video surveillance , licence plate recognition , biometrics , LiDAR and fencing . However , relying too heavily on any one technology is not recommended and a layered approach ensures that if one method fails , other measures are in place .
Automated alerts and a structured process can help security operators to identify , investigate and resolve potential threats quickly and consistently . Depending on security operators to manually monitor incoming sensor data for potential security issues may not suffice as it can be overwhelming . A layered approach to data centre security that incorporates a combination of technology and well-defined processes can help to protect against unauthorised access and potential threats , ensuring that data remains secure .
Centralising security operations
Centralising security operations enables data centre operators to monitor activity across their physical site and networks , ensuring regulatory compliance and a smooth flow of people . Manual intervention in the access control system can lead to human error and make criminals vulnerable to social engineering techniques . A physical identity and access management solution , automating workflows and bridging physical and IT security , can be implemented to reduce these risks and improve cost efficiencies . It is critical to invest in a scalable and
Finally , it is critical to ensure that physical security systems do not pose any cybersecurity risks , as attackers can gain network access by exploiting vulnerabilities in IoT devices such as security cameras , access control readers and alarm panels . IoT attacks primarily target routers and connected cameras , accounting for more than 90 % of all such attacks . To reduce these risks , it is critical to take preventive measures such as running the most recent firmware version and avoiding default passwords .
Physical and cybersecurity responsibilities must be shared to avoid unplanned downtime . Security teams need to work to update core business systems and devices , while also maintaining current hardware . Automation can be used to reduce employee burden and more efficiently manage firmware and passwords . Organisations can ensure a robust cyber-physical security framework , prevent potential network entry points , eliminate cybersecurity vulnerabilities and avoid unplanned downtime by integrating physical and cybersecurity measures into a single plan . A comprehensive security approach is critical in protecting data centres from potential threats .
Conclusion
With the UK ’ s data centres supporting an Internet economy that accounts for www . intelligentdatacentres . com
37