Tuesday, 14 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Colocation > Cybersecurity Risks Threaten the Physical Infrastructure of Data Centers
Colocation

Cybersecurity Risks Threaten the Physical Infrastructure of Data Centers

Last updated: September 2, 2024 1:46 pm
Published September 2, 2024
Share
Cybersecurity Risks Threaten the Physical Infrastructure of Data Centers
SHARE

Defending the bodily infrastructure of a knowledge middle is a central concern for securing the power’s servers, networks, and hosted information and purposes.

In spite of everything, information facilities are bodily buildings with real-world vulnerabilities based mostly on all their connections for good HVAC techniques, hearth suppression controls, electrical gadgets, and even safety cameras.

Any digital machine inside a knowledge middle that’s linked to a community may develop into a pathway for cyber-attacks, other than the central racks of pc gear and community gear itself.

Knowledge middle infrastructure administration (DCIM) platforms present facility managers with a capability to observe and management the bodily infrastructure inside a knowledge middle.

Nonetheless, these similar software program platforms may present unauthorized entry factors for hackers to provoke unconventional cyber-attacks, equivalent to importing malicious backup recordsdata through payloads which can be put in via bodily gadgets.

In different circumstances, attackers could attempt to achieve entry and disrupt the cooling techniques in a knowledge middle, inflicting servers to overheat and fail.

One other ongoing menace for information facilities includes their want for an uninterruptible energy provide (UPS). CISA has warned that dangerous actors are identified to realize entry to internet-connected UPS gadgets stemming from lax safety measures that enable unchanged default usernames and passwords.

Associated:5 Methods Knowledge Facilities Can Assist Forestall Knowledge Breaches

Greater than 20,000 cases of DCIM software program, clever monitoring gadgets, thermal cooling administration management techniques, and rack energy displays have been public-facing and susceptible to cyberattacks in 2022, in line with Cyble Research Labs.

Since then, greater than half of knowledge middle operators (55%) have reported some sort of outage, in line with the Uptime Institute’s Global Data Center Survey 2023.

See also  Telehouse runs London 10k, raising money for local Tower Hamlets charities

Taking Steps to Defend Continuous Knowledge Middle Uptime

Avoiding a cyber-attack on a bodily information middle requires operators to be exhaustive when mapping out the power’s operational know-how (OT), together with its many linked gadgets and factors of entry.

To make sure continuous uptime, facility managers ought to evaluation their safety protocols for essential techniques involving infrastructure administration, electrical administration, constructing administration, and safety administration.

DCIM software program takes a holistic view to observe, analyze, and handle a facility’s general energy and cooling techniques, together with its server utilization, asset monitoring, and different very important capabilities. OT networks make use of devoted communications protocols and redundant techniques to take care of reliability and resilience.

Associated:Unfixed Microsoft Entra ID Authentication Bypass Threatens Hybrid IDs

Normal safety procedures embody commonly updating and patching software program purposes. One other efficient measure is community segmentation: information middle OT networks must also be segmented other than IT networks to additional enhance safety.

Newer instruments for information middle OT safety embody unidirectional gateway know-how options encased in {hardware} to take care of a singular one-way switch of knowledge between two networks, not forwards and backwards. The software program shops copies of lively servers and gadgets from the OT community to share with the enterprise community in actual time.

As a result of the {hardware} can solely ship information in a single path, newer assault vectors can by no means attain again into the community via the gateway server.

Electrical administration techniques are mission-critical for sustaining continuous uptime in any information middle. Assaults on electrical energy era and distribution techniques can result in disruptions or outright energy failures. Knowledge facilities that get taken offline face pricey service interruptions, {hardware} damages, buyer information losses, and even potential lawsuits.

See also  Legrand finalizes ZPE Systems acquisition to boost services from data center to the edge

One other safety concern for a knowledge middle includes constructing administration techniques that management constructing environments for temperature, humidity, airflow, and hearth suppression. Every machine and level of entry can introduce alternatives for unauthorized entry.

Associated:A CISO’s Observations on As we speak’s Quickly Evolving Cybersecurity Panorama

Likewise, if safety administration techniques for video surveillance, entry controls, and menace detection are compromised, unauthorized people may achieve entry to information middle controls and operations.

Mitigating a Threat First Requires Understanding Its Penalties

To guard the essential bodily infrastructure of a knowledge middle from cyber-attacks, facility managers first have to undertake a robust cyber danger framework as a part of their general safety posture.

Good cyber danger governance begins by translating potential dangers into financial phrases after which prioritizing the worst dangers for remediation.

New methods for danger mitigation embody cyber danger quantification and administration (CRQM) instruments that may assist information middle operators assess the complete vary of enterprise damages ensuing from OT vulnerabilities.

CRQM instruments totally analyze the impacts of any potential cyber incidents after which prioritize the highest sources of danger for mitigation.

Cyber danger assessments may also improve cybersecurity assessments by including deeper contextual data to the analysis. On this method, information middle operators can proactively handle their cyber danger portfolio to prioritize danger mitigation tasks and make extra knowledgeable cybersecurity funding choices.

Jose Seara is CEO of DeNexus.



Source link

Contents
Taking Steps to Defend Continuous Knowledge Middle UptimeMitigating a Threat First Requires Understanding Its Penalties
TAGGED: Centers, Cybersecurity, data, infrastructure, physical, risks, threaten
Share This Article
Twitter Email Copy Link Print
Previous Article Blackstone Is Said to Near $13B Deal to Acquire AirTrunk Blackstone Is Said to Near $13B Deal to Acquire AirTrunk
Next Article Image of digital globe, with connected data points Fortinet expands security lineup with sovereign SASE
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Microsoft Q4 Boosted by Azure, AI Growth; Cloud Revenue Tops $75B

Microsoft ended its fiscal 12 months 2025 with robust fourth-quarter outcomes, underscoring the corporate’s continued…

August 1, 2025

EcoDataCenter secures EUR 600 million for digital infrastructure expansion

EcoDataCenter has efficiently secured EUR 600 million in debt financing from Deutsche Financial institution Non-public…

September 9, 2025

Hyperion Closes Funding Round

Hyperion, a Hong Kong-based decentralized alternate (DEX) on the Aptos blockchain, closed a strategic funding spherical…

June 12, 2025

Making cloud infrastructure programmable for developers

Most builders don’t use infrastructure as code (IaC), argues AWS tech lead Chris Munns. However…

February 22, 2024

RyboDyn Raises $4M in Pre-Seed Funding

RyboDyn, a San Diego, CA-based biotechnology firm growing immunotherapies focusing on the darkish genome, raised…

January 12, 2025

You Might Also Like

Leaseweb expands work on European sovereign cloud initiatives
Colocation

Leaseweb expands work on European sovereign cloud initiatives

By saad
StorMagic and HiveRadar target off-grid compute with mobile edge data centers
Edge Computing

StorMagic and HiveRadar target off-grid compute with mobile edge data centers

By saad
Helping to de-risk data centre air and liquid cooling
Power & Cooling

Helping to de-risk data centre air and liquid cooling

By saad
Switch Datacenters expands sustainability and capacity plans in Europe
Colocation

Switch Datacenters expands sustainability and capacity plans in Europe

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.