iTnews

Most data centre thefts are inside jobs

By Clement James on Mar 15, 2007 1:56PM
Most data centre thefts are inside jobs

Beware the enemy within.

Acts of theft, fraud and vandalism in data centres are three times more likely to be inside jobs than perpetrated by external parties, according to data centre firm Migration Solutions.

Alex Rabbetts, managing director of Migration, said that around 65 per cent of data centre security incidents are driven by malicious intent rather than economic gain.

Of these, the top two categories of perpetrators are disgruntled current and former employees.

"Data is personal. We're talking about people's private information and quite often their money," said Rabbetts.

"Last year's data centre robberies in London were widely publicised. However, this kind of external breach is still relatively rare and the principal threat remains the enemy within."

Rabbetts added that physical security and logical security need to go hand in hand. Processes for managing staff access to the centre and to the data itself are as important to data centre integrity as reinforcing the doors and windows against a break in.

"Emerging security standards like ISO27001 [BS7799 or ISO17799] are helping to establish process and an audit trail in the data centre, but we need to push these harder if they are to become normal practice in our industry," he said.

"The truth is that for many organisations the price of not having the correct security processes in terms of corporate reputation and regulatory obligations, under SoX and FSA, will be far heavier than a burglary could ever be."
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
arecentredatainsidejobsmostnetworkingthefts

Partner Content

How a 'micro data centre' enables your business, your way
Promoted Content How a 'micro data centre' enables your business, your way
The case for postponing mainframe migration has eroded
Partner Content The case for postponing mainframe migration has eroded
Security through visibility: supporting Essential Eight cyber mitigation strategies
Promoted Content Security through visibility: supporting Essential Eight cyber mitigation strategies
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Clement James
Mar 15 2007
1:56PM
0 Comments

Related Articles

  • China outlines vision for four mega data centre clusters
  • Oracle opens underground Israel cloud data centre
  • Maintenance error caused Facebook's six-hour outage
  • Remote Siberian data centre reaps rewards of bitcoin rally
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Digital Nation

As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.