Securing Your Data Center with Key Control Systems

Read More
All Posts

Securing Your Data Center with Key Control Systems

MW data center(1)At the time, it was the largest data breach in history.

In 2009, Heartland Payment Systems, a Princeton, N.J.-based provider of credit and debit processing, payment, and check management services, announced that it had suffered a massive data breach. Criminals installed spying software on the company’s computer network and stole the numbers of as many as 100 million credit and debit cards.

Learn more about Key Control for Data Centers

Since then, more than 7,524 data breaches across all types of industries have been made public, according to Privacy Rights Clearinghouse data.

Data breaches occur for many reasons, and not always from state-sponsored actors who breach a company’s network. Tossing paperwork into a dumpster as opposed to destroying it, losing a USB drive loaded with data, leaving a PC on a train, or having your office broken into – all of those actions can lead to a data breach.

According to a report from ForgerRock, personally identifiable information (PII) was by far the most common type of breach in 2018, representing 97% of all breaches. Date of birth (DOB) and/or Social Security Numbers (SSN) were the most frequently compromised type of PII in 2018, with 54% of breaches exposing this data. Unauthorized access was the most popular type of attack in 2018 by a significant margin, comprising 34% of all attacks.

There are approximately three million data centers across the United States. Data centers house millions of organizations’ networked computer servers that collect, store and process large amounts of data each day. Data centers are essential for financial institutions, large enterprises, and other corporations to function. Yet, because of the information that data centers house, they often offer the biggest bang for a criminal’s buck. Security on the outside of a data center usually consists of gates, bollards, video surveillance, perimeter detection systems, and alarms. Yet, it is critical to secure data centers within the inside as well, not only from cybersecurity breaches, but physical breaches, too. Physical breaches at data centers can result in costly consequences, to include fines, downtime, loss of reputation and business, and more.

In addition to a data center’s network, there are multiple physical areas of a data center that need to be secured. Those include server rooms and cages, video surveillance and video storage centers, backup power areas, security control centers, biometric security systems, and power and cooling device areas for air conditioners or generators.

The most effective way to control access to all of those areas is by controlling the access and use of physical keys with a key management system. Using a PIN, biometric scan, or ID card will give chosen employees access to their designated keys, and tell you what key was accessed, what time, and by whom. A key control system can send alerts to your security team if an unauthorized attempt is made to access a key or to forcefully open the key cabinet. The system will even alert security if a key is not returned at a designated time. Key control systems can also be designed with card readers or biometric readers, and they can be networked for centralized control.

In a data center, a physical or cybersecurity breach can be catastrophic and cause damage for years to come. A key control system is the most effective way to control access to all parts of a data center and prevent physical and cyber breaches.

Download our recent whitepaper, Understanding key control systems and best practices to discover how you can bring increased security, efficiency, and accountability to your company with comprehensive key control.

Tim Purpura
Tim Purpura
VP Global Sales & Marketing

Related Posts

5 Benefits of Key Control For Small Municipalities and Medium Size Cities

Securing smart cities with smart locks might be the next big thing – but what about securing small and mid-sized municipalities and cities that still rely on traditional locks and keys? With so much talk about the use of keyless entry, it seems as though the reliance on physical keys that persists throughout all municipalities has been largely overlooked.

Enforcing Zero Trust Security at Hotels Using Key Control

Hotels play host to priceless experiences: family vacations, million-dollar views, and once-in-a-lifetime adventures. But as every hotel executive knows, it is the assets inside that are even more valuable: people, property, and sense of safety. Protecting hotel assets therefore requires an iron-clad approach to security, also known as zero trust. With the help of key control solutions, hotels can easily begin implementing zero trust security policies that start working on day one.

Filling the Security Gap in Proptech for Property Management

Proptech is one of the biggest trends for security in 2022, according to the Security Industry Association’s 2022 Megatrends Report1. Proptech, or property technology – also known as real estate technology – is technology, software platforms or applications designed for the management, sale and rental of buildings. Within proptech, security technology is a fast-growing segment as building owners and managers seek the best ways to keep tenants, employees and visitors safe and secure.