Confidently erase data in active environments and from used IT assets.
Boost services throughout the device lifecycle—from first sale to end-of-life.
Expedite processes, recover more marketable product, and increase services.
Home » Resources » 4 ‘Hidden’ Data Center Security Challenges & How to Solve Them
Learn about four data center security challenges you may have overlooked, including your people, your physical security, your IT assets and the Internet of Things (IoT).
Katie Moss Jefcoat
Katie has launched and supported marketing campaigns for B2B technology companies since 2011. From 2016 to 2021, Katie served Blancco in the roles of content manager and senior product marketing manager, communicating the features and benefits of Blancco products, evaluating market and competitive trends, supporting sales enablement, and representing the voice of the customer.
Achieving true, across-the-board security for your enterprise data center can be a major challenge. Many of the same elements that make your data center so vital to your business, including data storage, highly-connected networks and cloud infrastructure support—also increase your organization’s potential security threats. And while hackers will always target your enterprise’s data for profit, you also need to remember other potential threats, like physical security, the internet of things and your own internal people, must also be managed carefully. Here are four data center security challenges that aren’t always obvious— but must be managed effectively.
There’s no denying it; people are your greatest risk to data center security. Even if you have the best technology in place, if your people aren’t of the highest caliber (and many times, even if they are), your data center will still be at risk. Employees are an important part of keeping your data center up and running, so insider threats must be considered, no matter how strict your hiring processes.
A recent study from Vometric found that 50 percent of IT security managers are concerned about security threats instigated by employees, while 43 percent worry about third-party access to company networks and data and 38 percent see privileged users, such as IT admins, as risks. Renowned former hacker Kevin Mitnick further explains why people are your greatest risk to enterprise security. He writes, “All of the firewalls and encryption in the world can’t stop a gifted social engineer from rifling through a corporate database. If an attacker wants to break into a system, the most effective approach is to try to exploit the weakest link—not operating systems, firewalls or encryption algorithms—but people. You can’t go and download a Windows update for stupidity… or gullibility.”
To mitigate these risks, hold continuous data security trainings for employees across your organization—not only in the IT department but in HR, finance, etc. Teach employees never to rely on someone’s word alone to get past security procedures or secure checkpoints. (i.e. “I forgot my badge,” or “I’ve been working closely with [Name].” Conduct thorough background checks, and put fail-proof physical security in place throughout your facilities. You may even consider sending “practice” phishing emails to see how employees respond, or other such situational awareness training tactics.
Speaking of physical security, many organizations gloss over this element when planning their data security strategy, focusing more on cybersecurity threats. But physical security shouldn’t be an afterthought. As Jason Destein, a technology consultant for Ingram Micro’s Physical Security business unit, explains, “[Organizations] put one access control reader at the front door and think they’re safe, failing to recognize that the people working inside the data center could be a threat.” Even if you have the best cybersecurity plans in place, it’s still possible for individuals to physically threaten your data center(s). The best way to avoid risk is to have a good combination of both.
Here are a few physical solutions you can put in place to prioritize physical security in your data center(s):
The physical security of IT assets is also often overlooked. Many data centers have loose drives or outdated servers in storage closets or in other areas of your enterprise location(s). These IT assets present a risk of being lost or stolen if not sanitized in an efficient manner; they also take up space you could be using otherwise. If a company cannot account for a data-bearing device, it can’t sure if it’s been lost or stolen. These situations often come to light with equipment inventory reports. The enterprise must determine if a data breach has occurred and if their data has been compromised.
Of course, none of these situations is ideal. It’s best that you don’t have IT assets sitting around waiting for the decommissioning process. Whether you’re using physical destruction, software-based data erasure or a mix of both, you need to make sure your IT assets are cleared of data before they ever even leave your facility—even if they’re on the way to an ITAD for physical destruction. Security issues can happen in-transit. It’s always best to erase first, just in case. In addition, sometimes physical assets are also redeployed inside the data center for new user groups or end customer data; these assets must be erased before reconfiguration and redeployment.
If you have any concerns about your data sanitization and decommissioning process, download our Data Center Gap Analysis for IT Asset Decommissioning to benchmark your data center against industry best practices.
Both a threat and an opportunity, the Internet of Things is predicted to grow to 26 billion units globally by 2020, according to Gartner. With more devices and connections comes more unknown variables, bringing new and unforeseen challenges in the enterprise data center.
Recent server vulnerability events, such as Heartbleed indicate these potential dangers. Malware and other cyber security threats can quickly spread, but many IT pros aren’t making IoT security a priority. As technology pro Jaikumar Vjayan explains, “The challenge for IT is less about technology and more about getting ahead of the security curve. Many of the technology controls needed to secure a highly connected world already exist. What CISOs and other IT managers need to focus on are policy and process – specifically, developing secure deployment practices and policies and putting in place architectural foundations for accommodating new IP-enabled devices.”
Learn how Blancco can help you meet your data center security, compliance and efficiency goals —without compromise–then schedule your free data center erasure trial.
Governments, industry organizations, and standards bodies around the world have created a range of guidelines for securely eliminating data from data storage assets like drives and computers. Here’s a summary of them, including NIST Clear…