When it comes to data security, businesses are currently stuck between a rock and a hard place. According to the 2017 Norton SMB Cyber Security Survey, 37 per cent of businesses admit they wouldn’t last one week without access to critical data. But with around one in four small businesses falling victim to cybercrime, that data is more vulnerable than ever.
The Norton survey also reveals that email or phishing scams, hacking attempts and online identify fraud are all up on 2016 figures, and the average financial cost to business per cyberattack exceeds $10,000. And more than half of businesses that experienced data loss due to a cyberattack were unable to recover that data.
This is all evidence that cyberattacks are a clear and present danger for any business that values its data. So what’s the best way to protect it?
If data is the heart of your organisation, your server infrastructure is your brains trust. This is where your data lives, and it must be protected at all costs. However, protecting your data centre with software applications alone is no longer enough to shut out sophisticated hackers.
You also need protection barriers built into your physical server hardware – and many server manufacturers are stepping up to the plate.
For example, Hewlett Packard Enterprise (HPE) is leading the game with its Security Assurance Strategy. Security is literally burned into the silicon components on the motherboards of HPE’s Gen10 Servers, and company-owned firmware ensures a strict protocol for both server access and sign-off on changes. Coupled with self-encrypting drives that automatically encrypt data at rest, the latest server hardware is now built to fight off hacker attacks itself.
With the heart of your data centre protected, you can now focus on your perimeter defences. There are a number of strategies you can take to detect network breaches, but your best bet is a multi-pronged defence system that is integrated with your server security for maximum effectiveness.
Here’s where software can play a role. The latest analytics and intelligence software applications monitor network activity and immediately alert your IT team when it detects usual behaviour. It’s a little like a trip wire surrounding your data centre that alerts your troops when an enemy is near.
This should of course be combined with standard network security measures such as firewall protection, network encryption, two-factor authentication and the use of virtual private networks (VPNs).
It’s also important to embrace an organisation-wide cybersecurity strategy that extends beyond your IT team. Senior management should strive to create a risk-aware organisational culture in which every team member is trained in common hacker techniques that aim to exploit human vulnerabilities.
For example, many phishing attacks rely on employees physically clicking on infected email links or unwittingly downloading malicious programs that open a backdoor for hackers to stroll through. Put simply, your team needs to be able to identify when they’re being played.
It’s a scary cyber world out there, but protecting your data with hardware, software and human barriers will put your business in a strong position to defend against cyberattacks.
Contact sales@dickerdata.com.au for all your technology needs.
1 May, 2025 - 2 min read
In today's digital landscape, implementing a Microsoft 365... Read more
16 April, 2025 - 3 min read
Meet Andrew Upshon, your go-to expert in AV and Collaboration,... Read more
16 April, 2025 - 4 min read
Are you looking for ways to help your customers maximise their... Read more
Subscribe to the Dicker Data blog
for regular updates and insights
Dicker Data (ASX: DDR) is an Australian owned and operated, ASX listed hardware distributor with over 46 years experience. Our dedicated sales and presales teams are comprised of experienced product specialists who are focused on using their in-depth knowledge to help customers tailor solutions to suit their client’s needs.
Phone: 1800 688 586
Email: sales@dickerdata.com.au