decrypting myths
their data security infrastructures in
geographies that are states away, rather
than streets away, from their primary
data centres.
Finding a colocation data centre platform
that has a number of geographic
locations and also has critical physical
protections, such as full UPS power,
back-up systems, N+1 (or greater)
redundancy and a proven, industry-
leading uptime record (>99.9999%),
is something you need to consider as
part of your data backup and recovery
strategy. For example, Platform Equinix
spans 200 facilities in more than 52
global metro locations, to replicate its
data in a more distributed, secure and
reliable fashion.
2. Is your ability to access and
share data really private?
Companies drawn to the public Internet’s
easy and low-cost accessibility have
been heavily relying on it to move data
and make that data more accessible
to its users. But that doesn’t happen
without businesses incurring a huge
amount of risk. According the latest
Symantec Internet Security Threat
Report, new digital technologies and
transactions that rely on the public
Internet have created a whole new
cyberattack entryway into many
organisations. For example, in 2017
there was a 600% increase in overall
Internet of Things (IoT) attacks, where
hackers gained access to critical
information via connected devices. Also,
software supply chain attacks increased
200% – one every month in 2017 as
compared to four attacks annually in
years prior.
With this increasing level of frequency
in digital cyberattacks over the public
Internet, companies need to seriously
consider how they are moving their
most critical and sensitive data around
and if the data exchange points they
have established are really safe. A
private way to exchange your valuable
digital assets and ensure that no one
78
outside of authorised users has access
to them is required. 3. Is your data being protected in
multiple clouds?
This requires direct and secure
interconnection that bypasses the
public Internet and enables security
control points and guardrails against any
possible cyberattacks. Though confidence in public cloud
security is generally increasing, there
are still vulnerabilities that businesses
cannot ignore. For example, according
to the Ponemon Institute, almost 40%
of cloud data at rest is unprotected by
encryption, identity keys or any other
data protection method.
Additionally, proximate, private
connectivity to multiple cloud
ecosystems ensures high performance
and low latency when performing
replication, backup and recovery
operations. This reduces the time
it takes to do these operations and
mitigates the risks involved in carrying
large amounts of data over long-haul,
multiple-hop networks.
This is why leveraging data encryption
and identity key management platforms
for multiple clouds is so vital to an
enterprise’s data protection plans. As
multiclouds are increasingly being
recommended and used for data
replication and backup and recovery
Issue 05
|
www.intelligentciso.com