Exciting Trends in the technology and commercial real estate world

Apple’s New Headquarters Is a Sign of Tech’s Boom, Bravado

Check out this article from The Wall Street Journal about how companies are using their headquarters and office buildings as a way to project their identities.

apple HQ

 

 

Cyber Security: Five Steps You Can Take To Protect Your Data Center

By: Kelci Smesko

techrealestatetrends.com

cyber security

Cyber security in data center facilities has become a growing concern for global corporations. Cyber security has become increasingly more important as the threat of attacks has grown exponentially. The following are five steps you can take to keep your data safe from rogue employees and hackers:

  • Protect against insider threat capabilities through video
    • Though sometimes unintentional, it is important to be aware of insider threats. Some insider threats could be benign but also may be intentional, malicious acts. Live video security replay is important for data centers because all activity of people on the inside of the facility can be monitored and easily reviewed in the case of a crisis or breach.
  • Use an analytical program that gives you visibility throughout your facility
    • Analytical programs, such as Raytheon’s Forcepoint, gives you visibility to see early warning signs that your data center has been hijacked, gone rogue or is making detrimental mistakes. The program defines specific risky behaviors and actions based on a set of negative activities that have been correlated to high security risk and scores each employee daily to ensure that sensitive data has not been breached or stolen by an interior or exterior hacker.
  • Create a risk-free environment for employees to practice and train to increase skill sets
    • Create a platform for your company for cyber security training and exercises so your employees can test and evaluate current and next generation threats using scenario-based exercises. This test and practice not only helps your employees gain knowledge on the possible threats on your data assets, but also helps prepare your employees to quickly complete damage control in the event of a breach.
  • Complete URL and File Analyses
    • Perform security assessments on websites and IP addresses to monitor for possible malicious coding. Also, perform a security assessment on various files to monitor for possible infected files or malware in files that could pose a threat to your data.
  • Be wary of incoming emails
    • Many cyber attacks begin with an email. Most traditional email security systems are not often capable of detecting malicious URLs or ransomware in attachments so it is worth it to invest in an email security system that can minimize these risks in order to protect your data and assets.