• Home
  • Advertising
    • Why Advertise
    • Create Your Campaign
  • About
    • About Security on Screen
    • Privacy Policy
  • Webinars
  • Social Wall
  • Contact Us
Wednesday, August 17, 2022
No Result
View All Result
  • Login
  • Register

No products in the basket.

Submit News
Submit video
  • Create Your Campaign
  • Product Groups
    • Access Control
    • Biometrics
    • Physical Security
    • Smart City
    • Surveillance
    • Systems Integration
  • Cyber-Security
  • Industry sectors
    • Banking
    • Casinos
    • City Surveillance
    • Data Centres
    • Government
    • Healthcare
    • Leisure
    • Manufacturing
    • Retail
    • Schools and Campus Security
    • Transport
    • Utilities
  • Business News
    • New Technology
    • Opinion
    • People
    • Education & Events
  • Create Your Campaign
  • Product Groups
    • Access Control
    • Biometrics
    • Physical Security
    • Smart City
    • Surveillance
    • Systems Integration
  • Cyber-Security
  • Industry sectors
    • Banking
    • Casinos
    • City Surveillance
    • Data Centres
    • Government
    • Healthcare
    • Leisure
    • Manufacturing
    • Retail
    • Schools and Campus Security
    • Transport
    • Utilities
  • Business News
    • New Technology
    • Opinion
    • People
    • Education & Events
No Result
View All Result
No Result
View All Result

Morse Watchmans | Securing data centres with key control systems

by Zoe Deighton Smythe
28/08/2021
in Access Control, Cyber Security, PRESS RELEASE
Morse Watchmans | Securing data centres with key control systems

In this article,Fernando Pires, CEO of Morse Watchmans Inc, discusses how key management can play an important role in cyber security and improve company data.

At the time, it was the largest data breach in history…

In 2009, Heartland Payment Systems, a Princeton, N.J.-based provider of credit and debit processing, payment, and check management services, announced that it had suffered a massive data breach. Criminals installed spying software on the company’s computer network and stole the numbers of as many as 100 million credit and debit cards.

Since then, more than 7,524 data breaches across all types of industries have been made public, according to Privacy Rights Clearinghouse data.

Data breaches occur for many reasons, and not always from state-sponsored actors who breach a company’s network. Tossing paperwork into a dumpster as opposed to destroying it, losing a USB drive loaded with data, leaving a PC on a train, or having your office broken into – all of those actions can lead to a data breach.

According to a report from ForgerRock, personally identifiable information (PII) was by far the most common type of breach in 2018, representing 97% of all breaches. Date of birth (DOB) and/or Social Security Numbers (SSN) were the most frequently compromised type of PII in 2018, with 54% of breaches exposing this data. Unauthorised access was the most popular type of attack in 2018 by a significant margin, comprising 34% of all attacks.

There are approximately three million data centres across the United States. Data centres house millions of organisations’ networked computer servers that collect, store and process large amounts of data each day. Data centres are essential for financial institutions, large enterprises, and other corporations to function. Yet, because of the information that data centres house, they often offer the biggest bang for a criminal’s buck. Security on the outside of a data centre usually consists of gates, bollards, video surveillance, perimeter detection systems, and alarms. Yet, it is critical to secure data centres within the inside as well, not only from cybersecurity breaches, but physical breaches, too. Physical breaches at data centres can result in costly consequences, to include fines, downtime, loss of reputation and business, and more.

In addition to a data centre’s network, there are multiple physical areas of a data centre that need to be secured. Those include server rooms and cages, video surveillance and video storage centres, backup power areas, security control centres, biometric security systems, and power and cooling device areas for air conditioners or generators.

The most effective way to control access to all of those areas is by controlling the access and use of physical keys with a key management system. Using a PIN, biometric scan, or ID card will give chosen employees access to their designated keys, and tell you what key was accessed, what time, and by whom. A key control system can send alerts to your security team if an unauthorised attempt is made to access a key or to forcefully open the key cabinet. The system will even alert security if a key is not returned at a designated time. Key control systems can also be designed with card readers or biometric readers, and they can be networked for centralised control.

In a data centre, a physical or cybersecurity breach can be catastrophic and cause damage for years to come. A key control system is the most effective way to control access to all parts of a data centre and prevent physical and cyber breaches.

Download our recent whitepaper, Understanding key control systems and best practices to discover how you can bring increased security, efficiency, and accountability to your company with comprehensive key control.

Fernando Pires, CEO of Morse Watchmans Inc.

Tags: Access controlCybersecuritykey managmentMorse Watchmans
ShareTweetShare

Related Posts

KnowBe4 launches resource kit to help defend against surging “Human Layer” attacks
Cyber Security

KnowBe4 launches resource kit to help defend against surging “Human Layer” attacks

New UK maritime security strategy to target latest physical and cyber threats
Cyber Security

New UK maritime security strategy to target latest physical and cyber threats

barox Ethernet PoE switches approved to power Redvision X4 COMMANDER PTZ camera
New Technology

barox Ethernet PoE switches approved to power Redvision X4 COMMANDER PTZ camera

Nominations open for Security Serious Unsung Heroes Awards 2022
Cyber Security

Nominations open for Security Serious Unsung Heroes Awards 2022

Feedzai and Lloyds Banking Group recognised as a Aite-Novarica Group 2022 Fraud Impact Award Winner 
Banking

Feedzai and Lloyds Banking Group recognised as a Aite-Novarica Group 2022 Fraud Impact Award Winner 

Altronix Trove expansion
Access Control

Altronix expands Trove Access and Power Integration Solutions

Load More

The Tannery, 3a John Street, Tunbridge Wells,
Kent TN4 9RU
All enquiries: +44 (0)1892 525141

  • Home
  • Advertising
  • About
  • Webinars
  • Social Wall
  • Contact Us
No Result
View All Result
  • Login
  • Sign Up
  • Cart
  • Home
  • Why Advertise
  • Create Your Campaign
  • About Security on Screen
    • Privacy Policy
  • Webinars
  • Social Wall
  • Contact Us
  • Business News
    • New Technology
    • Opinion
    • People
    • Education & Events
  • Product Groups
    • Access Control
    • Biometrics
    • Cyber Security
    • Physical Security
    • Smart City
    • Surveillance
    • Systems Integration
  • Industry Sectors
    • Banking
    • Casinos
    • City Surveillance
    • Data Centres
    • Government
    • Healthcare
    • Leisure
    • Manufacturing
    • Retail
    • Schools and Campus Security
    • Transport
    • Utilities

© 2020 SecurityOnScreen.com

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.