Intelligent CISO Issue 05 | Page 78

decrypting myths their data security infrastructures in geographies that are states away, rather than streets away, from their primary data centres. Finding a colocation data centre platform that has a number of geographic locations and also has critical physical protections, such as full UPS power, back-up systems, N+1 (or greater) redundancy and a proven, industry- leading uptime record (>99.9999%), is something you need to consider as part of your data backup and recovery strategy. For example, Platform Equinix spans 200 facilities in more than 52 global metro locations, to replicate its data in a more distributed, secure and reliable fashion. 2. Is your ability to access and share data really private? Companies drawn to the public Internet’s easy and low-cost accessibility have been heavily relying on it to move data and make that data more accessible to its users. But that doesn’t happen without businesses incurring a huge amount of risk. According the latest Symantec Internet Security Threat Report, new digital technologies and transactions that rely on the public Internet have created a whole new cyberattack entryway into many organisations. For example, in 2017 there was a 600% increase in overall Internet of Things (IoT) attacks, where hackers gained access to critical information via connected devices. Also, software supply chain attacks increased 200% – one every month in 2017 as compared to four attacks annually in years prior. With this increasing level of frequency in digital cyberattacks over the public Internet, companies need to seriously consider how they are moving their most critical and sensitive data around and if the data exchange points they have established are really safe. A private way to exchange your valuable digital assets and ensure that no one 78 outside of authorised users has access to them is required. 3. Is your data being protected in multiple clouds? This requires direct and secure interconnection that bypasses the public Internet and enables security control points and guardrails against any possible cyberattacks. Though confidence in public cloud security is generally increasing, there are still vulnerabilities that businesses cannot ignore. For example, according to the Ponemon Institute, almost 40% of cloud data at rest is unprotected by encryption, identity keys or any other data protection method. Additionally, proximate, private connectivity to multiple cloud ecosystems ensures high performance and low latency when performing replication, backup and recovery operations. This reduces the time it takes to do these operations and mitigates the risks involved in carrying large amounts of data over long-haul, multiple-hop networks. This is why leveraging data encryption and identity key management platforms for multiple clouds is so vital to an enterprise’s data protection plans. As multiclouds are increasingly being recommended and used for data replication and backup and recovery Issue 05 | www.intelligentciso.com