Protect the backbone of your business

Issue 1 2022 Infrastructure

Data centres are the invisible but essential backbone of any modern business. Companies throughout the world have shifted to remote working, depending on cloud storage and cloud-based software-as-a-service (SaaS) solutions to ensure business continuity through the pandemic and beyond.

It’s anticipated that cloud solutions will account for more than 45% of IT spending by 2024 as corporations turn to these platforms to enjoy the benefits of lower costs, enhanced data analytics and ways to collaborate more effectively.

As much as these solutions are ‘cloud’-based, they’re hosted in massive terrestrial data centres, either owned by external providers, or by corporations themselves. They are vulnerable to various types of risks, including security threats such as a distributed denial-of-service (DDOS) and social engineering attacks, environmental risks such as fire, flooding and other natural hazards, equipment failure and loss of power.

“Loss of power is perhaps the biggest risk to data centres in South Africa, given the unpredictable nature of energy supply from the national energy provider,” says Jaco du Plooy, product manager for Africa at Eaton. “Power loss could lead to data loss or destruction, reductions in productivity and may result in significant financial repercussions for the data centre and the businesses that trust it to protect their assets.”

Managing power systems for uninterrupted uptime

With stakes this high, data centres must be supported by a power system that delivers the reliable, high quality power that such a strategic asset requires. Every link in the system should be measured and managed to offer insights into reliability, operating cost efficiencies, effective use of capital, safety and risk mitigation.

“South Africa is faced with a ‘double whammy’ when it comes to power: not only is the country’s power supply often unreliable, but power is expensive too,” Du Plooy adds.

The first can be addressed with solutions like micro-grids, which provide cost effective, reliable and environmentally-friendly solutions to electricity supply challenges. As localised, stand-alone, power generating, distribution and energy storage systems, micro-grids can be operated independently, or connected to the primary grid.

Another option is to install uninterrupted power supply (UPS) solutions that have been designed to offer scalable battery runtimes for data centres and other critical IT applications.

It’s also vital that there are strong communications between IT departments and data centre facilities management teams, which can be possible with integrated software solutions so that all stakeholders receive timely, actionable information to optimise data centre performance.

Protecting against DDOS and social engineering

South Africa, like many other countries, is facing a rise in cybersecurity threats, with the government going so far as implementing a new law to bring it up to international standards for fighting cybercrime.

In South Africa, 90% of organisations experienced cyber threats during the past 18 months of the Covid-19 pandemic, with 85% of them experiencing downtime due to cybersecurity risks during peak seasons. This is according to Pandemic World: The Impact of Covid-19 report, released by McAfee Enterprise and FireEye (now combined into one company called Trellix).

“Ransomware has grown in profile and impact within South African organisations. These types of crimes having evolved far beyond their origins, particularly as the country is connected as its counterparts elsewhere – and just as vulnerable to nationality-agnostic attacks,” says Carlo Bolzonello, country manager for McAfee Enterprise in South Africa.

“The cyber criminals behind these increasing attacks are introducing new threats and tactics to extract valuable data and millions in ransoms from prominent sectors, highlighting the ongoing importance for cybersecurity due diligence,” he adds.

Steps that organisations can take to combat the increase in ransomware attacks include introducing technical safeguards and extended detection and response (XDR) technical solutions, as well as conducting ongoing reminders at employee level to reduce unauthorised access to the organisation’s private data.

“Equipping employees with the basics in malware and social engineering attacks like ransomware will empower them to identify any malicious activity that could compromise the safety and integrity of a data centre,” Bolzonello adds.

Plan to protect

With data centres facing several risks in the course of their daily operations, it’s essential to have an effective risk management strategy in place, as well as a recovery plan, should anything go awry.

Turning to experts in the fields of power management, cybersecurity and data centre design will protect data centre integrity, whether it’s a business’s own smaller scale solution, or a massive data centre that provides support to countless businesses and their customers.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Understanding shared responsibility
Infrastructure
Data management is increasingly coming under the governance spotlight, yet a significant vulnerability often goes unnoticed. Many businesses operating on Microsoft 365 assume their data is comprehensively backed up.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.