Data and Privacy: 2018-2019 Outlook: Data Centers and Security

Does your data center take security to the next level? In our latest e-Book, we address how you can best protect yourself from data breaches, the latest on privacy laws and more. To wrap up this particular e-Book blog series, we’re talking about common security measures you can find in secure data centers.

Hacking, malware and spyware are the most obvious threats to data privacy, and there is also the physical aspect of IT security to keep in mind. Data centers and carrier hotels, such as 165 Halsey Street, take security to a whole new level. Below are just a few examples of security measures that should be taken in a secure data center:

  • Top of the Line Surveillance Systems
  • Security Guards
  • Strategic Building Design
  • Access Control

There are many additional countermeasures employed by data centers. Check with your data center specifically on all security measures utilized.

Why choose 165 Halsey Street?

165 Halsey Street is a dedicated 1.2M sf data center/colocation/telecom carrier hotel with over 80 MW of power. The building has been operating a carrier neutral colocation business for more than 15 years,  and presently spans over 180,000 square feet with no MRC cross connect fees and direct access to over 60 networks.

Located just 13 miles from Manhattan, 165 Halsey Street is independently owned and operated and SSAE 16-certified. With 165 Halsey Colocation, there are no monthly recurring cross connect fees between customers, allowing safe, convenient and affordable interconnection.

Data and Privacy: 2018-2019 Outlook: How Companies Can Prevent Data Breaches

According to Gemalto Breach Level Index, data breaches compromised 4.5 billion records in the first half of 2018.If you guessed that the US comes in last place when it comes to these breaches, then you would be correct. The US is the most popular for attacks, “representing more than 57 percent of global breaches and accounting for 72 percent of all records stolen, though overall incidents are down 17 percent over the prior half. India accounts for 37 percent of the global breaches in terms of records compromised or stolen or revealed.”

Data breaches have a considerable, negative impact on a company’s customer base, particularly if the breach involves sensitive data. Not only do customers lose confidence in the brand and don’t feel that their data is secure, but data breaches put off new potential customers as well. How can companies best protect themselves against these data breaches? Below are just a few examples. To view the entire list, read our latest e-Book.

  1. Incorporate a cybersecurity specialist into the team.
  2. Keep all business and personal accounts separate, and encrypt all data.
  3. Continue to build awareness. Strengthen passwords and require both a two-step identification process and good antivirus programs.

Be sure to follow 165 Halsey Street on Twitter and LinkedIn as well for all company updates.

Data & Privacy: 2018-2019 Outlook – What’s Ahead for More Privacy Laws?

In our ongoing e-Book blog series, we’ve addressed GDPR, stats on the latest global data privacy and more. Today, we’re taking a peek into the future to learn what lies ahead for additional privacy laws.

As of March 2018, in response to the EU’s newly enacted GDPR, all U.S. states, as well as the District of Columbia, Guam, Puerto Rico and the U.S. Virgin Islands, have enacted breach notification laws requiring businesses to notify consumers if their personal information is compromised. These new and amended state data breach laws further define personal information and specifically mandate that certain information security requirements are implemented.

The expanding global privacy and security community will need to address the complicated data security issues in the coming year. The issues include GDPR implementation and related data transfer rules for the EU and globally, as well as practical and operational issues that involve putting best practices for new data and technology into place. Data professionals are strongly needed to become “effective stewards of company data, with appropriate consideration of individual privacy and appropriate business goals,” and companies must focus on the need to manage individual data, while dealing with the onslaught of legislative and regulatory overlaps and the need for effective integration of privacy and security controls.

If you’re ready to talk data security with a professional, reach out to 165 Halsey Street today.

165 Halsey Data & Privacy: 2018-2019 Outlook: Stats on Global Data Policy

With the intensity and frequency of ransomware attacks occurring in this day and age, it’s often challenging to keep up with the best ways to protect your business from these attacks and more. Ransomware, IoT and other  attacks are encroaching on businesses across the world and their threats continue to grow. Ransomware attacks are growing more than 350% annually and IoT are attacks skyrocketing, with attacks up 600% in 2017 alone. According to Gartner, it’s no wonder that information security spending is reaching well over $114b in 2018 with an expected growth rate of 8.7% in 2019.

“With information security spending expected to reach upwards towards $124b in 2019, the topic of cybersecurity remains one of the hottest in the tech and telecom industries today. A critical issue that spans the world, there remain several challenges, including a shortage of skills and lack of total control. Fortunately, with the focus so strongly on cybersecurity, leaders continue to take the reins in exploring the technologies and techniques needed to successfully confront cyberattacks.”

–Joseph Simone, President at Tishman Real Estate Services for 165 Halsey Street.

Below are more stats regarding predictions for security spending and risk management:

  • At least 30% of organizations will spend on GDPR-related consulting and implementation services through 2019.
  • Risk management and privacy concerns as part of digital transformation initiatives will drive additional security service spending through 2020 for over 40% of organizations.
  • Cloud-delivered security is becoming the top preferred delivery model for an array of technologies

165 Halsey Street’s new e-book will review the latest stats on global data privacy, what’s ahead for new laws and regulations, how companies can prevent data breaches and more.  Download today.

Data and Privacy: 2018-2019 Outlook

Has there been a bigger topic in 2018 than data protection and privacy? From the beginning murmurs of GDPR to overall global data security concerns, 2018 has been a landmark year for data protection. In 2019, data privacy concerns along with global information security spending will continue to rise in excess of $124B, according to Gartner. Security leaders continue to assist organizations in utilizing technology platforms securely, with an aim to stay competitive and drive business growth.

As your business keeps pace with technology and data protection policies, make sure that you have the right colocation / data center provider on your side. 165 Halsey Street offers enterprises increased security, reliability, scalability and cost savings. The 165 Halsey Street facility is designed for continuous IT equipment operation.

This e-book will review the latest stats on global data privacy, what’s ahead for new laws and regulations, how companies can prevent data breaches and more. 

Be sure to follow 165 Halsey Street on Twitter and LinkedIn as well for all company updates.

Happy reading!

 

The Transformative Impacts of AI

In previous blogs we’ve uncovered the importance and impact of our data driven society. Today, we are ushering in Artificial Intelligence (AI) and machine learning and how both will have roles in engulfing our data driven future.

The textbook description, according to Encyclopedia Britannica, defines AI as, “the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience.” Furthermore, a Spiceworks survey reported that 29% of the companies have adopted IoT, 18% adopted VR and 13% have adopted AI. It is expected that adoption rates will jump to 48%, 32% and 30% for IoT, VR and AI in the coming year. As AI becomes more widely accepted and used, it will bring an increase for cloud computing and data center capacity. Let’s take a look at the various use cases of AI below.

Cybersecurity

Machine learning is poised to greatly affect the rate at which attacks can be addressed more rapidly than that capable of a human. With the amount of data that’s spiraling around us everyday and the constant growth of data center networks, human hands will not always be able to keep up with security threats.

Smart Homes

Everything from having your coffee perfectly brewed to a stocked fridge and heating and cooling at the perfect temperature, AI and machine learning will become the backbone to your household. As smart devices become more of the norm, there will be a new era of comfort, all powered by artificial intelligence.

Autonomous Vehicles

According to MarketsandMarkets, “the automotive artificial intelligence (AI) market is expected to be valued at USD 782.9 Million in 2017 and is expected to reach USD 10,573.3 Million by 2025, at a CAGR of 38.46% between 2017 and 2025.” Furthermore, an IHS Automotive Electronics Roadmap Report, points out that there will be two main growth categories:

  1. Infotainment human-machine interface, including speech recognition, gesture recognition (including handwriting recognition), eye tracking and driver monitoring, virtual assistance and natural language interfaces.
  2. ADAS and autonomous vehicles, including camera-based machine vision systems, radar-based detection units, driver condition evaluation, and sensor fusion engine control units (ECU).

It’s clear that AI is leading the way when it comes to autonomous driving. We may be close to a future where there is no need for a steering wheel, brakes and more.

165 Halsey Street is excited to see where AI will end up, both in business and in our everyday lives.

Make sure you’re following 165 Halsey Street on Twitter and LinkedIn for all company updates, including when new blogs are posted.

Network Security in 2018: Establishing Leadership

Thank you for reading our blog series on Network Security! This is the final of the series, and today we focus on a network security opportunity, which is establishing security leadership.

Enhancing cybersecurity is a critical move for every organization. Moreover, increasing employees’ security “IQ” is another step toward securing key corporate assets. Each organization should work together to assemble a key cybersecurity team that consists of executives who will have a cybersecurity response plan ready to go in seconds.

Being proactive versus reactive is highly important when it comes to security matters. According to the “2015 Cost of Data Breach Study,” U.S. companies were the biggest victims of data breaches worldwide.

While many organizations spend capital and extend resources upfront on security measures, they must be sure that they are investing in a response team, who will oversee response procedures in the event of a breach. This response team should consist of IT personnel, legal, human resources, management, the C-Suite and an outside cybersecurity partner (if available). This team of combined executives is essential to responding to all types of cyberattacks.

Read on this and much more in our Network Security: Challenges and Opportunities eBook here.

Having issues assembling the right cybersecurity team? Check out our “Challenge: Shortage of Skills” section of this eBook for more tips!

Network Security in 2018 – Control Via the Cloud

Happy New Year! As we enter 2018, there has never been a time more critical to focus on the latest challenges and opportunities for network security. In late 2017, we featured a blog series on network security, and continue with another post today on “Control via the Cloud.”

With the cost of a single ransomware occurrence at $713,000 on average, companies today cannot afford to NOT have cybersecurity protection. And with the technological advances made by the cloud, these businesses should also be taking advantage of the cloud.

Why? Explore these benefits of using the cloud for security:

  • Software is managed and upgraded offsite (automatic updates)
  • Lower hardware costs due to the only requirements being an internet connection and browser. Buying and constantly upgrading servers and other hardware is unnecessary.
  • Need for a large IT staff is reduced
  • Many cloud service providers claim to provide higher levels of security and uptime than typical networks

Read more about the benefit of the cloud for your network security, and download the full eBook here.

Make 2018 the year your business is more than ready than ever to tackle network security challenges.

Network Security Challenge: IT Budgets

As part of our six-part blog series on network security, here is the next challenge: IT Budgets.

Budgeting for cybersecurity expenses is a concern as organizations and officials push to expand these budgets as well as capabilities of existing security teams. When it comes to cybersecurity spending, there is no “magic number.” It’s best to first consider the following:

  • Updating Legacy Systems. Many business systems remain woefully outdated. Because modernization projects are a huge undertaking cost- and time commitment, IT teams should find ways to provide additional security for the legacy systems, such as through intrusion detection systems (IDS) or security information and event management (SIEM). IT management should decide whether a partial or full upgrade to the systems are needed, weighing risks.
  • Network Security Appliances. Assess the different security appliances available, factoring in capital costs, employee skill and time needed to research solutions and install them.
  • Lower Cost Solutions. Active Directory® password requirements, differentiating reused passwords and service accounts, segmenting internal networks, reviewing group memberships, and restricting share permissions can all have a positive impact on security, but what must be considered is that these lower cost options can take long hours to complete.

Read the full list and more about the challenges and opportunities surrounding keeping networks as secure as possible and thwarting cyberattacks — download the full eBook here.

We will continue our mini blog series on network security – challenges and opportunities, so please stay tuned for more.

Thanks for reading!

Network Security Challenge: Shortage of Skills

Download Our New eBook

As part of our six-part blog series on network security, we now focus on the next challenge: Shortage of Skills.

The cybersecurity industry is a rapidly growing, multi-billion-dollar-plus market, but it’s facing a serious talent shortage. Recent reports from Frost & Sullivan,  (ISC)2 , and Foote Partners highlight  the lack of cybersecurity talent and shortage of skilled technology workers. The reports project that the global cybersecurity workforce will grow to six million by 2019, but there will be more than 1.5 million of the positions unfilled by 2020.

So, what can companies do? Here’s a quick list – and for more on the challenges and opportunities surrounding keeping networks as secure as possible and thwarting cyberattacks, download the full eBook here.

 

  •  Assess workforce strategy
  • Improve outreach and engagement.
  • Build an ecosystem of professionals focused on cybersecurity.
  • Provide an amazing support program for the new hires.
  • Support ongoing learning and skill building.

We will continue our mini blog series on network security – challenges and opportunities, so please stay tuned each week for more!

Be sure to follow 165 Halsey Street on Twitter and LinkedIn as well for all company updates, including when new blogs are posted.

Thanks for reading!