Page 4 of 5 FirstFirst ... 2345 LastLast
Results 46 to 60 of 62
  1. #46
    Registered User
    Join Date
    Nov 2018
    Posts
    45
    1. Leverage the Cloud for Safe Storage
    Ensuring that vital data is safe during an emergency takes precedence in any disaster recovery plan. The cloud is the perfect DR backup solution for schools because it is often cheaper than emergency storage options.

    “Leveraging the cloud for DR saves costs compared with traditional methods because compute and network resources are consumed only during an actual event,” writes Neil Bright, a research scientist and chief high performance computing architect at Georgia Institute of Technology, on EdTech.

    Bright does caution that IT teams should consider the physical location of a cloud provider. If it’s located in a different geographic area from the school, it likely won’t be hit by the same weather.

    Acronis Backup to Cloud is one option for a DR software that is intuitive for IT staff. It’s also versatile, since it can capture pretty much anything a school needs from operating systems and applications to specific program data or other folders.

    2. Invest in Technology that Protects
    Some companies have taken disaster proofing so seriously that they have created storage servers that are nearly indestructible. For example, ioSafe, a resilient storage provider, recently released the Server 5, which includes systems that can withstand 30 minutes of direct flame and spend three days underwater.

    “Server 5 was designed to help organizations faced with increasing demands and limited resources to better protect their data, and can be used to build a complete disaster recovery and business continuity solution that ensures data is 100 percent protected and can be restored anywhere, anytime with or without an internet connection,” said Robb Moore, ioSafe CEO, in a DatacenterDynamics article.

    Other companies, such as Turtle, have created waterproof and fireproof storage cabinets perfect for data centers.

    3. Back Up More Than Your Data
    While data can be backed up efficiently on the cloud, other precautions in the physical data center space can boost operability during a natural disaster such as a hurricane or blizzard. Data Center Knowledge suggests that IT staff make sure their physical data center is connected to a backup generator.

    “Hurricanes or large storms don’t typically wipe out infrastructure, but they can cause widespread power outages for significant periods of time,” writes Clayton Costello, operations manager at CK Power, in the article.

    Costello also recommends that IT staff make sure the backup generator is serviced regularly so it will operate without a hitch.

    4. Think Outside of Tech for Recovery
    For Beaverton School District in Oregon, one of the most vital components of its DR plan has nothing to do with technology.

    As part of its holistic backup approach, the district created a big, red binder containing the backup plans for every department in the district. These binders, along with a flash drive of the same information are kept safely in the homes of school leaders.

  2. #47
    Senior Member
    Join Date
    Jan 2018
    Location
    India
    Posts
    779
    Detect advanced malware and close security gaps
    Get a multi-pronged approach with Adaptive Defense
    Respond to incidents in your data center faster

    1. Ability to create policies around all your information which enforces tighter security between applications running across data centers, segments applications between various business entities, and applies an overall white-list model to the entire data center.

    2. Automatically enforce a dynamically created policy in the hosts, no matter where they’re deployed – on premise, in the cloud, or a combination of the two.

    3. Monitor the system to make sure the policies that are in place are, in fact, enforced and more important, see who is trying to work around those policies to create security breaches within your data center.

    https://www.esds.co.in/our-datacenter

  3. #48
    Registered User
    Join Date
    Sep 2018
    Location
    United States
    Posts
    40
    Data center security is the set of policies, precautions and practices adopted to avoid ... Physical security is needed to protect the value of the hardware therein.

  4. #49
    Registered User
    Join Date
    Jun 2019
    Location
    New York, Seattle
    Posts
    6
    I would have to say some of the answers here are more set towards hardware specific and not data center specific.

    These are two totally different things.
    A Data center is a building so data protection minus security of physical access is the only data protection that should be needed.

    1. Building security is #1
    2. Access control, who is able to enter the area.
    3. Locking cages, and locking racks. This is something we typically provide such as our New York data center we have our own suites or cages inside of data centers which provide an extra layer of security and protection.
    4. Security cameras, this typically is recorder and stored on and offsite. Normally you will want at least 30-90 days of storage on this.
    5. biometrics and facial recognition should be deployed so that someone with a stolen keycard can't access the data center.
    6. Backup power with generators and UPS's along with redundant networks.

    Those and a few more I'm sure I've missed are great ways to protect the physical data center itself.

    If we are talking about data itself that's stored on servers this we could write a whole book on!

  5. #50
    Registered User
    Join Date
    Sep 2018
    Location
    Mumbai
    Posts
    70
    10 Tips to Protect the Data Center.
    Identify and Quickly Address System Failures.
    Imbed Security Throughout the Data Center.
    Know Where Your Gates Are.
    KVM Switches Must Have Security Built In.
    Consider How Your Devices Communicate.
    Understand What You Have.
    Find and Close Your Open Ports.

  6. #51
    Senior Member
    Join Date
    Aug 2020
    Posts
    1,517
    Here are some of the critical components and their special security requirements.
    Physical Security of DC
    Restricting Access
    Securing your Data
    Network security
    Server security

  7. #52
    Registered User mikecowell's Avatar
    Join Date
    Apr 2019
    Location
    London
    Posts
    262

    MVNO Consulting

    Get physical — control physical access to the data center. ...
    Establish secure zones in the network. ...
    Lock down servers and hosts. ...
    Scan for application vulnerabilities. ...
    Coordinate communication between security devices for visibility into data flows.

  8. #53
    Registered User Ikaykel's Avatar
    Join Date
    Dec 2020
    Location
    Baie-D'Urfé
    Posts
    18
    The best way to protect your data is by using biometrics. Biometric technologies are rapidly becoming a part of the daily life of people around the world. Through integration with mobile devices, many of us interact with some form of biometric authentication daily. If you want to learn more about biometrics trends access https://recfaces.com/articles/biometric-trends.
    Last edited by Ikaykel; 03-05-2021 at 09:47 AM.

  9. #54
    Member
    Join Date
    Feb 2021
    Location
    Europe
    Posts
    80
    The physical characteristics of a secure data center first starts with the design and location. Secure data centers are usually built in an area that is limited in acess.

  10. #55
    Senior Member
    Join Date
    Aug 2020
    Posts
    1,517
    Intrusion detection systems, IP address monitoring, and firewalls are some of the most helpful tools to protect your data center from outside breaches and ensure its security.”

  11. #56
    Senior Member
    Join Date
    Jun 2020
    Posts
    180
    Yeah regular backups can help you in saving critical data.

  12. #57
    Registered User Сwiank's Avatar
    Join Date
    Nov 2018
    Posts
    43
    Guys, tell me how to recover data from a disk that has been formatted? Is it even real?

  13. #58
    Member
    Join Date
    Feb 2019
    Posts
    32
    Quote Originally Posted by Сwiank View Post
    Guys, tell me how to recover data from a disk that has been formatted? Is it even real?
    This is a difficult situation, but you can solve this problem. I had a situation where the hard drive with files was mistakenly formatted. This guide helped me a lot. Read this article https://www.diskinternals.com/partit...ed-hard-drive/ here you will find answers to your questions.

  14. #59
    Junior Member
    Join Date
    Oct 2021
    Posts
    25
    Quote Originally Posted by locke815 View Post
    I https://telegrambetting.club/telegra...ting-telegram/ think it'll be great if you go on a cloud environment and have multiple data music data analyticscenters. As a backup plan.
    That definitely sounds like a great idea! Having multiple data centers as a backup plan is a great way to ensure the safety and security of your data. Plus, with the cloud environment, you can access your data from anywhere with the right credentials!
    Last edited by Tyler1763Max; 07-11-2023 at 07:47 AM.

  15. #60
    Member
    Join Date
    Jun 2023
    Posts
    59
    To safeguard your data center, follow these key practices:

    Physical Security: Control access with biometric authentication, surveillance systems, and locked cabinets. Install fire suppression and environmental monitoring systems.

    Network Security: Use firewalls, intrusion detection systems, and VPNs. Update and patch devices regularly, and enforce strong authentication mechanisms.

    Data Encryption: Encrypt sensitive data at rest and in transit using robust algorithms and secure key management practices.

    Backup and Disaster Recovery: Regularly back up critical data, store backups off-site, and test restoration procedures. Develop a comprehensive disaster recovery plan.

    Employee Training: Educate employees on security best practices and conduct ongoing awareness programs to address social engineering and safe browsing.

    Monitoring and Auditing: Deploy monitoring systems, review logs, perform vulnerability assessments, and conduct audits to identify and address security vulnerabilities.

Page 4 of 5 FirstFirst ... 2345 LastLast

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

  Find Web Hosting      
  Shared Web Hosting UNIX & Linux Web Hosting Windows Web Hosting Adult Web Hosting
  ASP ASP.NET Web Hosting Reseller Web Hosting VPS Web Hosting Managed Web Hosting
  Cloud Web Hosting Dedicated Server E-commerce Web Hosting Cheap Web Hosting


Premium Partners:


Visit forums.thewebhostbiz.com: to discuss the web hosting business, buy and sell websites and domain names, and discuss current web hosting tools and software.