In previous blog posts, we discussed technologies like IoT, RPA and AI, also known as Industry 4.0. These technologies come with their demands of data, storage and power, and their challenges are not exempted. Recently, ENISA published ‘Good practices for Security of Internet of Things in the context of Smart Manufacturing’ to support businesses in handling the security challenges that arise when using these technologies. Also, national and international laws and regulations are created, or coming to oblige technology to comply to high security and privacy standards (like GDPR and the planned IoT cybersecurity law in the US). So, what can we expect from this good practice?
The good practice of ENISA identifies threats and relates them to assets and security measures since the proper method is also based on a review of a wide range of standards, schemes and initiatives (like resources from ISO, NIST and SANS Institute). A link with the GDPR is also made. Therefore, this document can be seen as a guide in risk analysis and a checklist of process steps for companies that use Industry 4.0 and Smart Manufacturing technologies. The structure described in performing a risk assessment is pretty basic. However, the security measures and examples mentioned here help you to have a better understanding of the assets, possible cyber security attacks and risks that should be taken into account.
The good practice by ENISA cannot be seen as a rulebook that prescribed all measures that need to be implemented to be sure your IoT environment is adequately secured. The document must support a wide range of companies and technologies; therefore, the security measures can be seen as considerations that must be taken into account when setting up the analysis. For compliance with multiple frameworks and standards, a mapping is available with a variety of standards and frameworks. Due to the use of a wide range of resources, the security measures will be probably used and equal to coming law and legislation, as we have seen at the introduction of the GDPR.
The good practice relies on the ‘Baseline Security Recommendation for IoT’, and therefore it has similarities with that study also provided by ENISA. Although a lot of the content relies on the Baseline, the good practice is beneficial and more mature for using it to set up or review your current environment.
Data centers deliver business continuity towards her customers, often supported by a service level agreement (SLA). One of the things with a guaranteed uptime is power. To make sure a data center can provide power during a power outage a backup generator is one of the most important components at a data center. And what about the most critical requirements for a generator, and how can it impact the continuity? You know what I’m talking about; fuel!
Today, almost half of the world’s population accesses the internet everyday and the online space is not a new phenomenon. The Internet or “Net” stands for Interconnection of Computer Networks and is a connected community of servers and networks. But what is the difference between the Service Provider (Carrier) Tiers?
The world rotates at just over 1,600km/h, similar to how fast the data center world moves. If we look to the future, the concept of what data centers do and how the tasks are accomplished in a data center will continue to evolve. What will 2019 bring? For sure it will be an interesting year for the data center industry.
Datacenter.com operates large scale flexible data center facilities to meet the market’s growing need for energy-efficient, highly interconnected, neutral facilities, in which organizations can host their critical IT infrastructure. We address the increased demand for cloud computing. The foundation for Datacenter.com is based on making the digital business of our customers successful, by offering custom-made, proven, reliable, secure, innovative and energy-efficient data center solutions, combined with best-in-class customer support.