Monday, 15 Dec 2025
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Colocation > Cybersecurity Risks Threaten the Physical Infrastructure of Data Centers
Colocation

Cybersecurity Risks Threaten the Physical Infrastructure of Data Centers

Last updated: September 2, 2024 1:46 pm
Published September 2, 2024
Share
Cybersecurity Risks Threaten the Physical Infrastructure of Data Centers
SHARE

Defending the bodily infrastructure of a knowledge middle is a central concern for securing the power’s servers, networks, and hosted information and purposes.

In spite of everything, information facilities are bodily buildings with real-world vulnerabilities based mostly on all their connections for good HVAC techniques, hearth suppression controls, electrical gadgets, and even safety cameras.

Any digital machine inside a knowledge middle that’s linked to a community may develop into a pathway for cyber-attacks, other than the central racks of pc gear and community gear itself.

Knowledge middle infrastructure administration (DCIM) platforms present facility managers with a capability to observe and management the bodily infrastructure inside a knowledge middle.

Nonetheless, these similar software program platforms may present unauthorized entry factors for hackers to provoke unconventional cyber-attacks, equivalent to importing malicious backup recordsdata through payloads which can be put in via bodily gadgets.

In different circumstances, attackers could attempt to achieve entry and disrupt the cooling techniques in a knowledge middle, inflicting servers to overheat and fail.

One other ongoing menace for information facilities includes their want for an uninterruptible energy provide (UPS). CISA has warned that dangerous actors are identified to realize entry to internet-connected UPS gadgets stemming from lax safety measures that enable unchanged default usernames and passwords.

Associated:5 Methods Knowledge Facilities Can Assist Forestall Knowledge Breaches

Greater than 20,000 cases of DCIM software program, clever monitoring gadgets, thermal cooling administration management techniques, and rack energy displays have been public-facing and susceptible to cyberattacks in 2022, in line with Cyble Research Labs.

Since then, greater than half of knowledge middle operators (55%) have reported some sort of outage, in line with the Uptime Institute’s Global Data Center Survey 2023.

See also  How the MCP spec update boosts security as infrastructure scales

Taking Steps to Defend Continuous Knowledge Middle Uptime

Avoiding a cyber-attack on a bodily information middle requires operators to be exhaustive when mapping out the power’s operational know-how (OT), together with its many linked gadgets and factors of entry.

To make sure continuous uptime, facility managers ought to evaluation their safety protocols for essential techniques involving infrastructure administration, electrical administration, constructing administration, and safety administration.

DCIM software program takes a holistic view to observe, analyze, and handle a facility’s general energy and cooling techniques, together with its server utilization, asset monitoring, and different very important capabilities. OT networks make use of devoted communications protocols and redundant techniques to take care of reliability and resilience.

Associated:Unfixed Microsoft Entra ID Authentication Bypass Threatens Hybrid IDs

Normal safety procedures embody commonly updating and patching software program purposes. One other efficient measure is community segmentation: information middle OT networks must also be segmented other than IT networks to additional enhance safety.

Newer instruments for information middle OT safety embody unidirectional gateway know-how options encased in {hardware} to take care of a singular one-way switch of knowledge between two networks, not forwards and backwards. The software program shops copies of lively servers and gadgets from the OT community to share with the enterprise community in actual time.

As a result of the {hardware} can solely ship information in a single path, newer assault vectors can by no means attain again into the community via the gateway server.

Electrical administration techniques are mission-critical for sustaining continuous uptime in any information middle. Assaults on electrical energy era and distribution techniques can result in disruptions or outright energy failures. Knowledge facilities that get taken offline face pricey service interruptions, {hardware} damages, buyer information losses, and even potential lawsuits.

See also  Where is the power? - Data Centre Review

One other safety concern for a knowledge middle includes constructing administration techniques that management constructing environments for temperature, humidity, airflow, and hearth suppression. Every machine and level of entry can introduce alternatives for unauthorized entry.

Associated:A CISO’s Observations on As we speak’s Quickly Evolving Cybersecurity Panorama

Likewise, if safety administration techniques for video surveillance, entry controls, and menace detection are compromised, unauthorized people may achieve entry to information middle controls and operations.

Mitigating a Threat First Requires Understanding Its Penalties

To guard the essential bodily infrastructure of a knowledge middle from cyber-attacks, facility managers first have to undertake a robust cyber danger framework as a part of their general safety posture.

Good cyber danger governance begins by translating potential dangers into financial phrases after which prioritizing the worst dangers for remediation.

New methods for danger mitigation embody cyber danger quantification and administration (CRQM) instruments that may assist information middle operators assess the complete vary of enterprise damages ensuing from OT vulnerabilities.

CRQM instruments totally analyze the impacts of any potential cyber incidents after which prioritize the highest sources of danger for mitigation.

Cyber danger assessments may also improve cybersecurity assessments by including deeper contextual data to the analysis. On this method, information middle operators can proactively handle their cyber danger portfolio to prioritize danger mitigation tasks and make extra knowledgeable cybersecurity funding choices.

Jose Seara is CEO of DeNexus.



Source link

Contents
Taking Steps to Defend Continuous Knowledge Middle UptimeMitigating a Threat First Requires Understanding Its Penalties
TAGGED: Centers, Cybersecurity, data, infrastructure, physical, risks, threaten
Share This Article
Twitter Email Copy Link Print
Previous Article Blackstone Is Said to Near $13B Deal to Acquire AirTrunk Blackstone Is Said to Near $13B Deal to Acquire AirTrunk
Next Article Image of digital globe, with connected data points Fortinet expands security lineup with sovereign SASE
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Cytactic Raises $16M in Seed Funding

Cytactic, a Tel Aviv, Israel-based supplier of a platform pioneering cyber disaster readiness and administration,…

July 10, 2024

SuperX Unveils XN9160-B200 AI Server Powered by NVIDIA B200 GPUs

SuperX has introduced the discharge of the SuperX XN9160-B200 AI Server, its latest flagship product.…

August 3, 2025

Cache Raises $12.5M in Series A Funding

Cache, a San Francisco, CA-based fintech firm that provides merchandise for inventory positions, raised $12.5M…

August 14, 2025

Revolutionising technology operations with IBM Concert

In an interview forward of the Intelligent Automation Conference, Ben Ball, Senior Director of Product…

May 29, 2024

Getting ready for World Backup Day 2024

Carl D’Halluin, CTO of Datadobi, shared a reminder that “defending your knowledge with backups isn’t…

March 30, 2024

You Might Also Like

Tokenization takes the lead in the fight for data security
AI

Tokenization takes the lead in the fight for data security

By saad
Siemens and nVent: pioneering liquid cooling solutions for AI data centres
Power & Cooling

Siemens and nVent: pioneering liquid cooling solutions for AI data centres

By saad
nVent electric unveils advanced liquid cooling solutions for data centres
Infrastructure

nVent electric unveils advanced liquid cooling solutions for data centres

By saad
Drax outlines 100MW data centre plan at Selby power station
Global Market

Drax outlines 100MW data centre plan at Selby power station

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.