How secure is my data if
it’s in the cloud

Multiple levels of both physical and virtual security ensure the protection of your data is our top priority including measures to protect from cryptolockers and ransomware.

More Information

I don’t have a comprehensive backup and disaster
recovery strategy

DC Two are Gold cloud partners with Veeam® the market leaders in backup and disaster recovery solutions

More Information

Latest News

3rd July: Letter from the MD: Looking Forward, Looking Back Read more

Security in Focus

18th June 2020

Back to news index page

In this article we will cover an introduction and overview of security in the IT realm and in future articles we will delve more deeply into specific security topics.

DC Two has a long heritage of expertise in IT Security. We design and manage datacentres and cloud hosting solutions, so protecting business datasets is critical to our customers and our success.

From our own in-house designed and engineered fully virtualised network security appliance (recently reviewed with SSL Labs with an outstanding A rating). To our very own Senior Tech Mark Dignam being the first person in Australia to decode and identify the Michelangelo Virus. We know security.

A Definition of IT Security

Broadly speaking, IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers.

Why is IT Security Required?

Hackers are smart and over time get smarter, so the need to protect your digital assets and network devices is constantly evolving. IT security can be seen as expensive, however as we have seen in many cases a significant breach costs an organization far more. Large breaches can jeopardize the existence of a small business. Thus, IT security cannot be viewed purely as a cost overhead, but more as a vital insurance policy ensuring the ongoing operational health of a company.

ITSEC, InfoSEC & OpSEC

IT security (ITSEC) and Information security (InfoSEC) might sound similar, but they refer to different types of security. IT security refers to the holistic practice of securing digital information via network security. Whilst Information security refers to the tools and procedures designed to protect sensitive business information from invasive threats. Operational security (OpSEC) whilst not specific to IT can be viewed as an overarching process of assessing and protecting data or practices by analysing, grouping and protecting against known threat vectors.

Security of your critical business data cannot be left to chance. Use an experienced team as insurance against security threats.

Threat Vectors?

Threats to IT security can come from many different directions and variations. A common threat is malware, or malicious software, designed to infect network devices / computers. The weakest security link in any IT setup is you and me!! End users provide the most often exploited method of entry to IT systems than any other vector. Opening that interesting document in an email, clicking the web link from the Nigerian Prince, re-using the same very weak passwords. Once access is gained malware can infect the IT infrastructure to devastating effect via deploying Ransomware, Spyware or Viruses.

IT Security Benefits

IT security prevents these malicious threats and potential security breaches impacting your organization. When you enter your internal company network, IT security helps ensure only authorized users can access or make changes to sensitive information that resides there. IT security works to ensure the confidentiality and integrity of your organization’s data.

Types of IT security

Network

Network security is used to prevent unauthorized or malicious actors accessing your network. Ensuring usability, reliability, and integrity remained uncompromised. This type of security prevents a hacker from accessing data inside the network. It also prevents them from preventing your users’ ability to access or use the network.

Network security has become increasingly important as businesses increase the number of endpoints and migrate more services to the cloud.

Internet

Internet security involves the protection of information that is sent and received in browsers and web-based applications. Monitoring and intercepting incoming internet traffic for malware, suspicious or unwanted traffic. This protection is provided in the form of firewalls, antimalware, antispyware or antivirus applications.

Endpoint

Endpoint security provides protection at the device / end user level. This can include all IT equipment that accesses a company network e.g. smart phones, tablets, laptops / desktops. Endpoint security will prevent your devices from accessing malicious networks that may be a threat to your organization. Anti-virus applications are examples of such end point security measures.

Cloud

More and more applications, data, and identities are moving to the cloud. Cloud security ensures the delivery and users of software-as-a-service (SaaS) applications are secure and protected.

Applications

With application security, applications are specifically coded at the time of their creation to be as secure as possible, to help ensure they are not vulnerable to attacks. Application security can also involve the process of whitelisting and patching to ensure only designated and approved applications can operate within an IT environment and the latest versions are running.

How DC Two Implements Comprehensive Security

We have built a comprehensive culture and fabric that encompasses the full spectrum of protective systems and strategies.

Our infrastructure design implements physical and virtual firewalls, active intrusion detection, network segmentation via VLAN’s, interface and port separation to ensure right across the technology stack data and communication is safe.

Combined with constant monitoring and alerting of our datacentre’s operation, both physical and virtual, our team have instant knowledge of any issues before they become a problem.

The DC Two data centres have sophisticated security and 24/7 monitoring

If you want to improve your IT Security, always speak to an expert. Our great team of experts are available to review your requirements, contact DC Two today to get started.

Communication preferences

Testimonials

DC Two have been instrumental in providing IaaS offerings that have allowed us to build and scale fast and efficient cloud solutions for our clients. Their investment in providing local, robust infrastructure is a great win for clients in Western Australia that require low-latency, secure access to their resources.

- Brenton Baker, Empower ICT