Saturday, 11 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Strategies for cyber resilience – Data Centre Review
Global Market

Strategies for cyber resilience – Data Centre Review

Last updated: February 5, 2024 9:35 am
Published February 5, 2024
Share
Data security
SHARE

James Smith, Customer Experience Director at CloudM, provides his insight for businesses concerned about falling victim to large scale cyberattacks and ransomware requests.

Cyberattacks have been particularly prominent in recent months with global enterprises such as NATO, MGM, Motel One, Lyca Mobile and Sony all reporting troubles with cyber security. Malicious attacks have increased to over 50% and the average cost of a data breach has surged nearly 30% to, approximately, £4m million per breach.

The threat is clear – but what causes these attacks and how can businesses, agencies, conglomerates and other organisations prevent these types of attacks from causing harm?

How are the attacks occurring?

The first step is to understand why and how these types of attacks are occurring. While there isn’t one definitive answer, there are various components that have led to this spike. Technology advances in AI and a general wider access to technology means that more people can become scammers, even if they don’t have programming skills or good language skills. Poor language and grammar used to be a telltale sign of a scam, but that’s not necessarily the case anymore. A lot of companies will also make the decision to move to the cloud without solid security in mind and as most data breaches are caused by employees, the threat often comes from within.

How can this be prevented?

An effective approach should help defend against both external attacks and common internal threats, such as accidental breaches and human error. The essential security accreditation that organisations should look for when choosing a provider is ISO 27001. This is the international standard that provides the specification for an information security management system. It is one of the most popular information security standards in the world, focusing on protecting information, confidentiality, integrity, and availability.

See also  Why an ‘All-of-the-Above’ Energy Strategy Is Essential for Data Center Growth

Another accreditation that should be met is the payment card industry data security standard (PCI DSS). It was created to allow the consistent and safe use of debit/credit cards globally, enabling people to use their cards without fear of having their bank accounts emptied. Companies should also check for GDPR and HIPAA, complying with personal data protection.

Prepare from the beginning

Cybersecurity begins the very moment someone starts writing the code, which is why it’s important for developers to practise secure coding. Secure coding is the habit of writing software with possible vulnerabilities in mind from the very beginning. Experienced developers know the risks and dangers out there, and can start to code against those threats at the earliest opportunity so that safety is quite literally built into systems.

Test for security

Penetration tests (or pen tests) are a way for companies to test out its cyber defences without causing any serious damage. New features, older systems and software updates are all susceptible to outside attacks and a pen test is an excellent way of uncovering any weak points in a company’s security processes. Systems are also checked with full access, ensuring that even with a username and password, no one can access anything they shouldn’t be able to.

Recovery plans

If a data breach or cyberattack occurs, it is vital that businesses have a robust disaster recovery plan in place that also covers the partial or full loss of business data. Today, more organisations are looking to the cloud for a solution. Backing up data to cloud storage springs to mind. With a solid backup plan in place,  data can easily and quickly be restored, ensuring almost seamless business continuity.

See also  Colocation Edge Data Centers: Tracking the Market Growth

There’s a fairly simple process that must be followed when building a backup plan: people, process and technology. For people, it’s important to consider the impact it will have on staff and how this message is delivered. Are people trained on what to do if an attack occurs? You must have a strategy in place to implement these plans – and, this is where technology links everything together. Technology will be the tool to keep staff up-to-date, register the risks and initiate the backup plan.

Backup, backup, backup

Another key tip would be to have multiple backups, especially for the most important data. This can be based on level of importance, so that the most important business data is highly unlikely to be lost. While the cloud is one of the best and most effective ways to backup data, it might also be worth considering backup systems and processes outside of the cloud.

Today, more businesses are requesting strategies for recovery. A disaster recovery plan will ensure business continuity. Backup plans can be more sophisticated than before: rather than backing up everything for everyone it’s more effective to create a ranked system of importance. While this seems technological, it is not an IT decision, but the responsibility of risk lies with the heads of the business. The complexities of a disaster recovery plan can take a considerable amount of time. Starting today will save the business tomorrow.

Source link

TAGGED: centre, Cyber, data, Resilience, Review, Strategies
Share This Article
Twitter Email Copy Link Print
Previous Article Athens and Abu Dhabi ink memorandum for data center investments in Greece Tornos News | Athens and Abu Dhabi ink memorandum for data center investments in Greece
Next Article BAE Systems BAE Systems Acquires Malloy Aeronautics
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

5 Top AI Stocks for Data Center Exposure

Synthetic intelligence (AI) is Wall Avenue’s new obsession, with firms discussing the expertise in a…

April 17, 2024

Data centres could heat towns rather than waste heat

Waste warmth is often handled as a nuisance, however with floor supply warmth pumps and…

January 2, 2026

Replacing coders with AI? Why Bill Gates, Sam Altman and experience say you shouldn’t

Within the race to automate all the things – from customer support to code –…

October 6, 2025

Can Intel cut its way to profit with factory layoffs?

Matt Kimball, principal analyst at Moor Insights & Technique, mentioned, “Whereas I’m positive tariffs have…

June 19, 2025

How can we improve public sector IT services?

With safety breaches, downtime and over-spending plaguing public sector IT companies, Mark Grindey, CEO at…

April 12, 2024

You Might Also Like

Large AWS sign. Amazon Web Services (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms - Las Vegas, Nevada, USA - December 3, 2019
Global Market

AI demand is so high, AWS customers are trying to buy out its entire capacity

By saad
Why sovereignty now shapes data centre planning in Europe
Global Market

Why sovereignty now shapes data centre planning in Europe

By saad
GCRE to develop renewable energy and data centre in South Wales
Infrastructure

GCRE to develop renewable energy and data centre in South Wales

By saad
Heat emission from the chimneys of a large data and server complex.
Global Market

OpenAI puts part of Stargate project on hold over runaway power costs

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.