DRASTIC NEWS – Drones Robotics Automation Security Technologies Information Communications
DRASTIC NEWS – Drones Robotics Automation Security Technologies Information Communications
DRASTIC News
First Japanese-Built F-35A Unveiled at Nagoya Production Facility
The first Japanese-assembled F-35A was unveiled out of the...
Lockheed Martin and the Royal Australian Navy’s First Aegis-equipped Hobart Class Destroyer Completes Sea Trials
This milestone represents a significant step towards Australia’s Hobart...
First F-22 Raptor Delivered from Lockheed Martin Speedline
Early delivery highlights effective Air Force-industry partnership Lockheed Martin...
Lockheed Martin Australia to export home grown radar technology to the US
Local Adelaide partner Schach RF Pty Ltd to benefit...
Hungry Jack’s Trials New Drive-Thru Technology At Tumbi Umbi
Hungry Jack’s has introduced a QSR-first aimed at changing...
SNIPER unmanned helicopter completes ATP for agricultural deployment
Alpha Unmanned Systems, a Spanish manufacturer of short range...
Executive Editor’s Show Review
Commercial UAV Asia Show and IOT Conference, Singapore Despite...
Sonardyne delivers collision avoidance sonar to MARSS Group for new private vessel
Maritime security company, Sonardyne International has announced that it...
Delta’s HD2055 Barrier Passes 1,000,000 Cycles Test
Delta Scientific has announced that its HD2055 barrier which will stop...
Tips for Pokemon Trainers to stay safe and still catch ‘em all
Pokémon Go, the latest new app seems to be...
Panasonic Commercializes Conductive Polymer Hybrid Aluminum Electrolytic Capacitors for Automotive Electronic Control Units
Panasonic Corporation announced that it has developed “Conductive Polymer...
BlueBird Presents ThunderB – A Tactical UAS with 24-Hour Endurance, Capable of Operating in GPS-Denied and COMJAM Environments
With extended control range, high-performance payloads, advanced communications and...
Artesyn Announces New Cost-Effective, Long Life DIN Rail Power Supplies for Industrial Applications
Artesyn Embedded Technologies has announced the ADNB series, a cost-effective...
CONTROP Presents New Generation T-STAMP EO/IR Miniature Payload
Ideal for small UAVs and VTOLs, the new generation...
Team Sentinel’s partner Deakin University to develop a Mobile Target System to support Land 400 testing in Australia
Deakin University in Geelong will provide a cost effective...
Anti-Terrorist HydraWedge Wins Innovation Award at ISC-West
HySecurity’s new anti-terrorist vehicle barrier HydraWedge SM50, won its...
Alpha Unmanned Systems maritime rescue operation in Guard Coast vessel
Friday 5th February, the Spanish company Alpha Unmanned Systems...
Avon Protection to continue to supply the US DOD with $42m order for CBRN respiratory protection
Avon Protection has received an order for 166,623 M50...
DRONE VOLT Launches its surveillance drone Capable of several days of autonomy At the Nüremberg IWA fair
DRONE VOLT makes a technological advancement with its original...
F-35 lightning II world-wide fleet exceeds 50,000 flying hours
F-35 Lightning II aircraft operating at 12 different locations...
Military Robots Market worth USD 21.11 Billion USD by 2020
The report “Military Robots Market by Platform (Airborne, Naval,...
BAE Systems supporting Australia’s next generation of cyber security professionals
With cyber security becoming a core concern for businesses...
Intel Security names Nicole Kidman, Jessica Mauboy and Dr Chris Brown as Most Dangerous Celebrities 2015
Intel Security has announced the results of its ninth...
ITS – Canon corner adaptor for safe custodial detention
SAFE CUSTODIAL DETENTION WITH MINI DOME CAMERA ADAPTOR ITS...
Cisco releases first Smart Region Report focused on digital opportunities for South East Queensland
Identifies the potential of $10 billion to the region’s...
Seven ways security can cost your business
Most organisations have a pretty good sense of the...
Cisco’s Recommendations to the Australian Prime Minister & Cabinet’s 2015 Cyber Security Review
Australia’s transition towards a more digitally-enabled economy will drive...
Next-generation security products steal the show at 30th annual Security Exhibition & Conference
Leading security product and service suppliers including Avigilon, Ness...
San Francisco Public Utilities Commission Adds Electro Scan Mobile Van for Advanced Pipe Condition Assessment
New Technology Helps Pinpoint Leaks and Increase Reuse of...
Oring launches new layer 3 rack mounted network switch
Oring has launched a new layer 3 high bandwidth...
UAVs civil market actual situation and future expectations
 UAVs are not something new as some people think,...
Wireless Network the Weakest Security Link in Enterprise IT Infrastructure, According to Fortinet Global Survey of IT Leaders
9 in 10 CIOs Report Concerns Over Insufficient Wireless...
Night Vision Australia – What’s the perfect tool for Security & Law Enforcement in Australia?
FLIR Thermal Imaging Camera’s Thermal imaging cameras produce a...
BAE Systems Applied Intelligence: Why intelligence-led penetration testing needs to be the proactive defence in every business
As the cyber threat landscape evolves, so too does...
Everyone has a role to play in securing Asia’s digital future
Asia is in the middle of a digital revolution,...
FLIR and Night Vision Australia continue Australian expansion with launch of New Thermal Monoculars for Law Enforcement
Editor’s Product Review FLIR SCOUT II Night Vision Viewer “These...
Relationship between CPTED principles and people’s feeling of safety
The 2015 Safe Cities Conference looks forward to welcoming...
Akamai Releases Fourth Quarter 2014 State of the Internet Report
Akamai Technologies, the global leader in content delivery network...
Universal Robots launches UR3 – the world’s most flexible, lightweight tabletop robot to work alongside humans
Universal Robots (UR), a global developer and manufacturer of...
New DVTEL Video Showcases ioi Analytics Solutions
DVTEL, INC, the video surveillance solutions provider, has released...
FLIR and Night Vision Australia launch new Scout II Thermal Cameras in Australia
Released at the recent SHOT Show, held in Las...
DDLS introduces more live hacking challenge Labs
DDLS, Australia’s leading IT Training provider, has introduced even...
Fortinet Launches New Rugged, Industrial-grade Devices to Connect and Secure Critical Infrastructure
Fortinet, a global leader in high-performance network security –...
2015 CIO Leaders Summit Australia
Media Corp International was proud to conclude the 2015...
Security Threat Landscape Still Plagued by Known Issues, says HP
HP have published the 2015 edition of its annual Cyber...
Gallagher introduces new technology to the security market
The latest product developments from leading security technology manufacturer,...
Talking drone offers aviation safety boost
In a world first, RMIT University researchers have developed...
DDoS-for-Hire Preys Upon SaaS Apps such as Joomla
Akamai Technologies, the leading provider of cloud services for...
The world’s first 3D printed jet engine made in Melbourne
Monash University researchers along with collaborators from CSIRO and...
Minister for Defence opens new Lockheed Martin Facilities in Newcastle
Minister for Defence Kevin Andrews MP has formally opened Lockheed...
Micron, Seagate Announce Strategic Alliance
Micron Technology, and Seagate Technology have announced a strategic agreement that...
Fluke Networks makes dynamic responses to wireless threats and true “no-wireless” zones realities with new capabilities in AirMagnet Enterprise
Last year, hackers stole roughly 81.5 million records while...
RiskMap 2015: The New World Disorder
Control Risks, the global business risk consultancy, has published...
MASA releases Sword V6.0 to provide unique capability for enhanced training and analysis
The market leading automated wargame solution for training or...
Valentine’s Day: Avoid the heartbreak of Cyber Crime
After analysing a wave of scams spreading worldwide before...
Call for launch of South Pacific airspace safety initiative to aid integration of unmanned aircraft systems as part of Defence regional aid
The association of Australian Certified UAV Operators (ACUO) is...
An Australian Counter Unmanned Aircraft System – ‘Drone’ – Security Initiative
The association of Australian Certified UAV Operators Inc. (ACUO)...
Safer Internet Day brings reminder to protect your privacy online
“Today is Safer Internet Day and it reminds us...
New Cyber Security Campaign Focuses on Everyday Australians
The Australian Cyber Security Centre (ACSC) has released a video...
WatchGuard and Frost & Sullivan Offer Three Simple Steps to Help Future-Proof Network
Combatting enterprise-grade threats, without the resources to deploy enterprise-grade...
Submission for Senate Inquiry into Aviation and Airport Security
2015 Senate Rural and Regional Affairs and Transport References...
Trend Micro Researchers Discover New Adobe Zero Day Attacks
Security software vendor Trend Micro has identified yet another...
Akamai PLXsert’s Q4 2014 State of the Internet – Security Report Released
Akamai Technologies, the leading provider of cloud services for...
New lockers allow round the clock access for Hills’ customers
Hills Limited will trial new secure lockers to allow...
Lockheed Martin Australia announced as major sponsor of National Youth Science Forum
The National Youth Science Forum (NYSF) held a launch...
Akamai Assists Bangkok Bank in Strengthening Global Reach
Akamai Technologies, the leading provider of cloud services for...
DVTEL Appoints Rony Atoun as Vic President of Research & Development
DVTEL, INC., the video surveillance solutions provider, announced today...
Intel Security appoints industry leader Matthew Drake to head up ANZ Consumer Operations and announces additional appointments
McAfee, part of Intel Security, has announced a host...
Applied Intelligence appoints Dr Malcolm Shore as Technical Director for Australia
BAE Systems Applied Intelligence has appointed Dr Malcolm Shore...
Strive to Succeed – ASIS International Dan Grove Scholarship Award
By Pascal Engler Wilson Security, Southern Cross Station Since...
Horror in Martin Place – Australasian Council of Security Professionals Comments
The Australian community has witnessed a hostage situation take...
WatchGuard Predicts Five Security Trends You Should NOT Worry About in 2015 and Five You Should
From passwords and the IoT to nation state cyber...
Corporate sector targets double in 2014
Kaspersky Lab has undertaken a review of the key...
McAfee Labs Threat Predictions outlines Top Security Issues for 2015
Intel Security has released its McAfee Labs 2015 Threat...
Seagate Launches Data Recovery Services in Australia
Seagate Technology, a world leader in storage solutions, has announced...
Australian Businesses Lose Over US$55 Billion from Data Loss and Downtime Per Year, According to Global IT Study
EMC Corporation has announced the Australian findings of a new...
Internet of Things Drives Measurable Business Outcomes
The majority of organisations that have adopted Internet of...
Cyber Threats to Increase in Scope and Complexity in the New Year as Black Hat Hackers Become More Sophisticated, According to Fortinet 2015 Threat Predictions
As the 2015 New Year looms, Fortinet, a global...
New Seagate NAS HDD Delivers Enterprise-Class Solutions for Small and Medium Businesses
Seagate Technology has announced its new Enterprise NAS HDD...
SNP Wins NSW Business Chamber Award
SNP has been recognised, winning the state award for...
Kaspersky Lab’s 2015 short-range predictions
With cybercriminals growing in confidence, Kaspersky Lab anticipates that...
CASA RPAS Certification New pilot training program
A Canberra-based businessman with a reputation as one of...
Gallagher Team Takes Top Engineering Award
Gallagher has added another esteemed award to its growing...
Special Event Canalys APSM E-Mag – Read it Now!!
Fortinet Joins Equinix Cloud Exchange to Offer Large Organizations Fast and Flexible Access to the Most Advanced Solutions for Securing Critical Data
Fortinet, a world leader in high-performance network security, announced...
Omlis Computer Security Day 2014: Mobile payment security and tokenization
In light of Computer Security Day on 30 November,...
Seagate Appoints New Managing Director of Sales & Marketing for Asia
Seagate has announced that it has appointed Rex Dong as...
Retired RNZAF Air Vice-Marshall Graham Lintott to head Lockheed Martin New Zealand
Lockheed Martin has announced that retired Royal New Zealand...
New Generation of WatchGuard Firewalls Enable Mid-Size Enterprises to Keep Pace with Explosive Growth in Encrypted Traffic
WatchGuard® Technologies, a leader in multi-function firewalls, has announced next-generation...
Telstra Cyber Security Report 2014 – Join the conversation now!
Join Telstra specialists as they discuss findings from the recently...
Louis Tetu to Keynote GovInnovate Summit
Coveo announced that Chairman & CEO Louis Tetu will...
Akamai Warns of Yummba Webinject Tools and Banking Fraud
Akamai Technologies, Inc, the leading provider of cloud services...
Drone crashes into Perth house
A Perth couple have discovered a drone in their...
Tenable Network Security’s Nessus v6 Enhances Advanced System Hardening, Malware Detection and Mobility Support to Reduce the Attack Surface
Tenable Network Security®, Inc., the leader in continuous network...
Imperva Introduces Bot Protection Services for the SecureSphere Web Application Firewall
Imperva Inc, pioneering the third pillar of enterprise security...
Former GCHQ Deputy Director Cyber Defence joins Wynyard Group
Wynyard Group a market leader in crime fighting software...
First Australian made vertical tails by Marand installed on F-35 Lightning II
The first vertical tails manufactured by Australian company, Marand, have...
Cubic Announces Partnership with Unreal Government Network to Create Next Generation Live, Virtual, Constructive, Gaming Training Solutions
Cubic Advanced Learning Solutions (CALS), a subsidiary of Cubic...
Palo Alto Networks Latest PAN-OS Release Expands Cloud Security Support for AWS and KVM
Palo Alto Networks, the leader in enterprise security, has...
Ovum and F5 Networks Complimentary webinar invitation – Register now!
Webinar: Telcos as an intelligent provider: Monetizing “consumer intelligence”...
Honeywell: 7 in 10 Australians fearful that cyber attacks could damage Australia’s economy
More than seven in ten surveyed adults (72 percent)...
Imperva Introduces Cloud Reference Architecture for Protecting Web Applications in Infrastructure-as-a-Service Environments
Imperva Inc, pioneering the third pillar of enterprise security...
Stuxnet Patient Zero: First Victims of the Infamous Worm Revealed
More than four years have passed since the discovery...
Inmarsat completes construction of the Global Xpress ground network
Inmarsat, the leading provider of global mobile satellite communications...
Shavlik Eliminates Known Vulnerabilities in Third-party Software with Shavlik Patch 2.1
Shavlik has announced the release of a new version of...
F5 Showcases F5 Synthesis™ Interoperability with VMware Solutions at vForum 2014
F5 Networks showcased at vForum2014 at Grand Hyatt Hotel,...
New Gartner report on Application Delivery Controllers
The application delivery controller (ADC) is a key component...
Kaspersky Lab sheds light on “Darkhotel” espionage campaign
Kaspersky Lab experts have researched the ‘Darkhotel’ espionage campaign,...
Goodbye Graffiti Resources
The WA Police Graffiti Team is taking orders for...
The impact of mobile devices on information security: A survey of IT Professionals in Australia and New Zealand
Mobile devices cause ongoing concern for IT teams responsible...
F5 Networks Appoints Emmanuel Bonnassie to Lead Sales in Asia Pacific & Updates from vForum in Singapore
Emmanuel Bonnassie (Manu) is Senior Vice President of Asia...
Akamai Observes Shellshock Being Used to Build a DDoS Botnet
Akamai Technologies, the leading provider of cloud services for...
Australian Consumer Security Risks: Multiple threats in a multi-device world
With every third of the world’s inhabitants a global...
UL introduces the Collis Visa Cloud-based Functional Test Suite
UL is pleased to introduce its Collis Visa Cloud-based...
Aconex Launches Dynamic Manuals for Mobile Handover
Aconex, provider of a leading cloud collaboration platform for...
ONVIF Connects with International Audiences at Security Industry’s Largest Trade Shows
ONVIF, the leading global standardization initiative for IP-based physical security...
Cubic Awarded $46 Million Contract to Provide Training Systems Support for the U.S. Marine Corps
Cubic Applications, Inc., an operating company of the Mission...
UL receives confirmation from Visa for simulating the latest version of ADVT
UL is pleased to announce that its Collis Brand...
Introducing the Check Point Capsule: Groundbreaking mobile security that goes where you go
Check Point® Software Technologies Ltd. , the worldwide leader in...
Seagate research reveals nearly half of Australian small businesses have lost work due to not backing up effectively
Of these 45% of businesses that have lost work...
FireEye Exposes Cyber Espionage Group Potentially Linked to Russian Government
 FireEye research, analysis exposes long-standing operations by APT28 targeting...
Symantec donates $260,000 to not-for- profit beyondblue at the Gold Coast 600 V8 Supercars event
Donation helps Australian children build resilience against depression and...
INTERPOL World launches Strategic Partners Programme to design innovative security solutions with industry to address global challenges
INTERPOL World has launched a Strategic Partners Programme with...
F35B successfully completes wet runway and crosswind testing
In an important program milestone enabling U.S. Marines Corps...
DOD plans to deliver F-35’s 5th gen capability at 4th gen cost by 2019
The Department of Defense announced an agreement aimed at...
Robot Linda will mingle with visitors at the Natural History Museum
Members of the public will have the opportunity to...
F-35 achieves three major flight test milestones on same day
In three separate flight tests on May 27, Lockheed...
Australia now has more than 100 certified unmanned aircraft operators
A major milestone has been recorded by the Australian...
Let’s go fly a drone: The best vacation pics come from above
Here’s a very 2014 question: What could the technology behind...
Robot’s undersea exploration ends in catastrophe
A voyage to the bottom of the Pacific Ocean...
New F-35 flying records
The Lockheed Martin F-35 Lightning II aircraft fleet, which...
Procurement of Joint Strike Fighter
After the evaluation of the current situation in the...
F-35 joint strike fighters to transform Australia’s air combat capability
The Government has approved the acquisition of an additional...
F-35 fleet surpasses 15,000 flying hours
The Lockheed Martin F-35 Lighting II fleet recently surpassed...
Google to buy drone-maker
By Alexei Oreskovic (Reuters) – Google Inc has acquired...
What will travel look like in 2024?
As technology continues to improve, it’s worth asking: What...
German engineers design bionic kangaroo
If it looks like a kangaroo and hops like...
Now police can reconstruct your face from DNA evidence
Criminals who inadvertently leave traces of their DNA at...
HPD information
Please read the following information below regarding the interactive...
Bosch brings the internet into the car
Twenty years ago, the internet revolutionized computing. Over the...
Motorola Solutions unveils police car of the future in Australia
Motorola Solutions has launched its emergency vehicle of the future...
Handheld launches the all-new NAUTIZ X4 rugged computer for the mobile worker
Handheld Group, a leading manufacturer of rugged mobile computers...
MASA Group is declared a National Champion of European Business at the British Embassy in Paris
An exclusive event hosted by the British Embassy in...
Space to the subsea – emergence of agnostic integrated systems
By Chris Cubbage During September 2013, Executive Editor, Chris...
HGH Infrared Systems Debuts Spynel-S
HGH Infrared Systems, a global provider of 360 degree...
Crowd control using Video Analytics vs. Personal GPS. Which is better for safety and security?
BBC’s Click program highlighted how the Police used personal...
Simlat to supply Summit Avanced Systems
Simlat Ltd. has been chosen to provide its advanced...
Axis upgrades top-of-the-line pan/tilt/zoom series with launch of nine new cameras
The top-of-the-line AXIS Q60 PTZ Dome Network Camera Series...
New camera line from MOBOTIX is more light Sensitive and shows more detail than ever before
The new D25, M25 and Q25 5-megapixel IP camera...
Sony introduces new W series Rapid Dome IP Cameras to harness IPELA ENGINE™ PRO technology
Sony Electronics continues its commitment to advance the security...
All new Fisheye Dome cameras
ACTi delivers a new level of resolution and functionality...
ACTi’s latest PTZ
ACTi is proud to launch the very first product...
Canon presents world’s smallest Full HD PTZ surveillance camera
Canon unveils the world’s smallest full high definition (HD)...
World’s first Raytec lighting integration with Milestone VMS
Raytec is delighted to announce its integration with Milestone’s...
MOBOTIX launches lowlight exposure optimization – MxLEO
MOBOTIX AG has launched the new Lowlight Exposure Optimisation...
Integrated Milestone IP video surveillance monitors all district campuses
Milestone XProtect® open platform video management software (VMS) is...
Raytec protects critical infrastructure in Oman
The Oman Water and Electrical Board have chosen Infra-Red...
Arecont Vision’s New MegaView® 2 and MegaBall® 2 combine high performance, great aesthetics and ease of installation
Arecont Vision, the industry leader in IP-based megapixel camera...
UXC Connect secures $4.1 million contract to deliver IP surveillance and security solution for LNG project in Western Australia
UXC Connect has announced that it has secured a...
Arecont Vision unveils new SurroundVideo® 12 Megapixel 360° panoramic camera with true wide dynamic range (WDR)
Arecont Vision, the industry leader in IP megapixel camera...
FLIR and VideoIQ join forces for new site protection solution
  FLIR Systems is proud to announce the launch...
Imaging chips and pixels
Everything started with the discovery of the Charge Coupled...
The Past Present and Future of Video Analytics
Author:  Dr Rustom Kanga –  iOmniscient This article was...
HID Global Introduces Best-in-Class Features to the Industry’s Leading Retransfer ID Card Printer
HID Global has launched its enhanced FARGO® HDP5000 High...
SightLogix Smart Thermal Camera Solution Integrates With ViconNet VMS for Perimeter Security
SightLogix® a leading smart thermal camera manufacturer for perimeter...
Gallagher launch Command Centre v7.10
Gallagher Security has announced one of its most important...
City Surveillance Market Set to Double
El Segundo, Calif. (June 24, 2013)—The global market for...
PUBLIC CCTV SURVEILLANCE : NETWORKS & AWARENESS
As at 2011, living in modern Australia, and indeed...

Century_Link_Logo2Most organisations have a pretty good sense of the potential fallout from security breaches. However, the truth is that data breaches are growing in number, and the financial cost is growing too. The average cost of data breach has nearly doubled in the past five years, from $6.46 million in 2010 to $12.9 million today*.

Stuart Mills, regional director, ANZ, CenturyLink, said, “The costs aren’t just monetary. Organisations must understand the other risks including damage to reputation and leaked intellectual property. Customers and users place an enormous amount of trust in the companies with whom they do business. A single breach can damage that trust forever. And, if intellectual property is leaked it could sound the death knell for any organisation.”

“Today, security isn’t just about basic monitoring services. Companies have far more to consider than they once did, particularly because of the rise of new technologies and business-use scenarios, like cloud and BYOD. Instead, security is a holistic approach to protection, prevention, and response, and it needs to encompass all aspects of technology.”

What organisations should consider when implementing, updating, and enforcing their security policy:

1. External threats: The sheer number of external threats is growing, and there’s absolutely nothing we can do about it, other than maintaining constant vigilance through a security policy that is constantly updated and enforced. The speed at which threats are increasing is exponential. For instance, there are millions of malware variations that enterprises must defend against, but it’s difficult for signature-based malware to keep up.

There are more distributed denial-of-services (DDoS) attacks than ever before, and they vary widely; they can be highly targeted or generic, long in duration or short. And they mutate; there’s a new breed of DDoS attacks that use Web servers as payload carrying bots, which makes them even more damaging because of exponential performance increases.

And then there are application attacks, often targeted at financial systems, which can bring a company to its knees. What’s even more problematic is that most organisations have already been breached—they just don’t know about it.

2. Internal threats: Employees often leak data because security policies are not enforced. External threats are real and dangerous. But internal threats can be just as common and just as damaging. Internal threats are often inadvertent, stemming from a lack of oversight as well as from disgruntled employees who leak sensitive data right after they’re fired.

3. Untrained staff: When it comes to security, one key oversight is lack of training. It’s imperative that employees know what the security policies are, all the way from what devices they can use to what applications they can download.

4. Shadow IT: More organisations are struggling with shadow IT, which is the use of hardware or software that is not supported or authorised by an organisation’s IT department. Shadow IT can range from developers using various Software-as-a-Service (SaaS) platforms to employees storing corporate data in cloud storage solutions like Dropbox or Google Drive. These solutions seem innocuous to most people, which is why employees need to receive comprehensive training about what is a security risk and what isn’t.

5. Compliance: If your organisation isn’t compliant, it’s unlikely to be secure. Consider whether the organisation would pass a compliance audit for security and Payment Card Industry (PCI). Complicating matters is the fact that many organisations don’t even know that governmental compliance regulations apply to them.

6. The right partners: More organisations are choosing to outsource security operations. But when it comes to outsourcing security, it’s truly a buyer beware scenario. The first step is to understand exactly what needs protection including devices, network, applications, and data. Then, determine which components of these are being outsourced. The second step is to choose the right partner or partners for those specific needs. Keep in mind that the more vendors are consolidated, the more efficient the strategy will be. Make no mistake, security is expensive. Not having security is even more expensive. But part of choosing the right partner comes down to understanding the balance between performance and cost. Choose a vendor who can help make the right decisions around balancing performance, effectiveness and cost.

7. Physical security: Physical security is the protection of people, hardware, programs, networks and data from any damage that might occur. If your physical system isn’t secure, nothing else matters. Yet physical security is one of the most overlooked aspects of a security strategy. The physical management of data centres includes security policies and procedures, security officer staffing, access control systems, video surveillance systems, standards compliance and physical security designs. Make sure the data centre complies with standards and conduct annual audits.

*Business Data Breaches Get More Expensive Each Year: The State of Enterprise Security.” Enterprise Apps Tech News. N.p., n.d. Web. 24 Mar. 2015.” Disaster Recovery Statistics. N.p., n.d. Web. 27 Mar. 2015. http://www.appstechnews.com

About CenturyLink
CenturyLink is a global communications, hosting, cloud and IT services company enabling millions of customers to transform their businesses and their lives through innovative technology solutions. CenturyLink offers network and data systems management, Big Data analytics and IT consulting, and operates more than 55 data centres in North America, Europe and Asia. The company provides broadband, voice, video, data and managed services over a robust 250,000-route-mile U.S. fibre network and a 300,000-route-mile international transport network. Visit CenturyLink for more information.

Comments are closed.

Subscribe to our newsletter