Latest News

For the latest news and ASX announcements Click here

Certified Information Security Management
ISO 27001 Information Security Management Certified Tier III Certified WALGA Preferred Supplier Logo

Security in Focus

18th June 2020

Back to news index page

In this article we will cover an introduction and overview of security in the IT realm and in future articles we will delve more deeply into specific security topics.

DC Two has a long heritage of expertise in IT Security. We design and manage datacentres and cloud hosting solutions, so protecting business datasets is critical to our customers and our success.

From our own in-house designed and engineered fully virtualised network security appliance (recently reviewed with SSL Labs with an outstanding A rating). To our very own Senior Tech Mark Dignam being the first person in Australia to decode and identify the Michelangelo Virus. We know security.

A Definition of IT Security

Broadly speaking, IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers.

Why is IT Security Required?

Hackers are smart and over time get smarter, so the need to protect your digital assets and network devices is constantly evolving. IT security can be seen as expensive, however as we have seen in many cases a significant breach costs an organization far more. Large breaches can jeopardize the existence of a small business. Thus, IT security cannot be viewed purely as a cost overhead, but more as a vital insurance policy ensuring the ongoing operational health of a company.


IT security (ITSEC) and Information security (InfoSEC) might sound similar, but they refer to different types of security. IT security refers to the holistic practice of securing digital information via network security. Whilst Information security refers to the tools and procedures designed to protect sensitive business information from invasive threats. Operational security (OpSEC) whilst not specific to IT can be viewed as an overarching process of assessing and protecting data or practices by analysing, grouping and protecting against known threat vectors.

Security of your critical business data cannot be left to chance. Use an experienced team as insurance against security threats.
Security of your critical business data cannot be left to chance. Use an experienced team as insurance against security threats.

Threat Vectors?

Threats to IT security can come from many different directions and variations. A common threat is malware, or malicious software, designed to infect network devices / computers. The weakest security link in any IT setup is you and me!! End users provide the most often exploited method of entry to IT systems than any other vector. Opening that interesting document in an email, clicking the web link from the Nigerian Prince, re-using the same very weak passwords. Once access is gained malware can infect the IT infrastructure to devastating effect via deploying Ransomware, Spyware or Viruses.

IT Security Benefits

IT security prevents these malicious threats and potential security breaches impacting your organization. When you enter your internal company network, IT security helps ensure only authorized users can access or make changes to sensitive information that resides there. IT security works to ensure the confidentiality and integrity of your organization's data.

Types of IT security


Network security is used to prevent unauthorized or malicious actors accessing your network. Ensuring usability, reliability, and integrity remained uncompromised. This type of security prevents a hacker from accessing data inside the network. It also prevents them from preventing your users' ability to access or use the network.

Network security has become increasingly important as businesses increase the number of endpoints and migrate more services to the cloud.


Internet security involves the protection of information that is sent and received in browsers and web-based applications. Monitoring and intercepting incoming internet traffic for malware, suspicious or unwanted traffic. This protection is provided in the form of firewalls, antimalware, antispyware or antivirus applications.


Endpoint security provides protection at the device / end user level. This can include all IT equipment that accesses a company network e.g. smart phones, tablets, laptops / desktops. Endpoint security will prevent your devices from accessing malicious networks that may be a threat to your organization. Anti-virus applications are examples of such end point security measures.


More and more applications, data, and identities are moving to the cloud. Cloud security ensures the delivery and users of software-as-a-service (SaaS) applications are secure and protected.


With application security, applications are specifically coded at the time of their creation to be as secure as possible, to help ensure they are not vulnerable to attacks. Application security can also involve the process of whitelisting and patching to ensure only designated and approved applications can operate within an IT environment and the latest versions are running.

How DC Two Implements Comprehensive Security

We have built a comprehensive culture and fabric that encompasses the full spectrum of protective systems and strategies.

Our infrastructure design implements physical and virtual firewalls, active intrusion detection, network segmentation via VLAN's, interface and port separation to ensure right across the technology stack data and communication is safe.

Combined with constant monitoring and alerting of our datacentre's operation, both physical and virtual, our team have instant knowledge of any issues before they become a problem.

The DC Two data centres have sophisticated security and 24/7 monitoring

If you want to improve your IT Security, always speak to an expert. Our great team of experts are available to review your requirements, contact DC Two today to get started.

Communication preferences:


I've known John and the DC Two team for a number of years. They are experts in all things cloud, and share the same passion for technology as our IT business, Ever Nimble. We have worked with them on a number of occasions, including a complex global Veeam deployment, and they have provided incredibly quick access to Co-Lo space when we needed it urgently. I would highly recommend the team; we are a very proud partner.

- Chris Morrissey, CEO, Ever Nimble