Data center robbery leads to new thinking on security
Hosting firm's CEO says violent intrusion should be a warning to data center managers
Computerworld - Last October, a data center in Chicago owned by Web hosting and collocation vendor C I Host Inc. was robbed by two masked men, who pistol-whipped a lone IT staffer working the graveyard shift and then held him hostage for two hours while stealing computer equipment.
It's rare for data centers and their employees to be attacked in such a brutal way. Typically, IT facilities are designed with physical security in mind, featuring protections such as steel doors, security guards and electronically controlled access mechanisms.
But the armed robbery at the Chicago data center has changed how Christopher Faulkner, CEO of Irving, Texas-based C I Host, views security. Faulkner said this month that he no longer thinks data centers are as secure as IT managers believe they are, and that he sees what happened at his company as a warning of what may lie ahead for other organizations.
"The second someone crosses the line to armed robbery – [risking] a 25- to 50-year prison sentence – to steal some servers, we're in different realm of security now," he said.
When Faulkner tours other data centers, he looks at their security measures with a much different eye than he did before the robbery at his facility. He imagines someone – a robber, or a terrorist – who is determined to steal or destroy the equipment there.
Most data centers don't have metal detectors or bomb-detection systems, according to Faulkner, who also said that he has never been patted down by a security guard when entering a data center. "How do they know I don't have five handguns on me, strapped down with explosives?" he asked. "They don't know."
There have been a few scattered reports of robberies at other data centers, including one last year in London. But William DiBella, president of AFCOM, an Orange, Calif.-based professional association for data center managers, said that he sees little chance of robberies becoming a trend at IT facilities.
Data centers are far from a low-hanging fruit for robbers, DiBella contended. "Most data centers are very well-hidden and secure," he said. Moreover, he said, companies simply aren't going to risk intrusions, for an obvious reason: "Lose data and you can lose the business."
Nonetheless, Faulkner thinks that data center operators really haven't planned for the worst possible occurrences, such as terrorist attacks. "Data center security, in the past five years, has been about the show for the customer," he said. "If somebody is committed to dying, it's going to be very hard to stop them."
Since the robbery in Chicago, Faulkner has added new security measures, most of which he declined to specify. The hosting firm, which has two other data centers in Dallas and Los Angeles, also now trains its staffers on how to respond if a similar incident happens again. He said the training can be boiled down to this message: "fully cooperate" with any intruders.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts