Category Archives: Security

Infomart Data Centers Announces Security Enhancements for Dallas Facility

Infomart Data CentersInfomart Data Centers Announces Security Enhancements for Dallas Facility is planning a massive security overhaul for its Infomart Dallas facility.

Wilcon Receives SSAE 16/SOC 1 Type II Attestation and HIPAA Security Rule Compliance Report

Wilcon.2016LOS ANGELES, July 5, 2016 — KirkpatrickPrice announced today that Wilcon, a fiber optic and data center infrastructure provider, has demonstrated through an independent review of their information security control structure, their compliance with the SSAE 16/SOC 1 Type II Audit Standards, as well as the HIPAA Security Rule. The completion of these engagements provides evidence that Wilcon has a strong commitment to deliver high quality services to its clients by demonstrating they have the necessary internal controls and processes in place to protect consumer data and comply with industry standards and regulations.

Facilities Network Hacks

By Jeff Plank, CEO Agile Data Sites

picture of a computer hacker

The number of data breaches and hacks is constantly increasing. The question is, how long will it be until someone hacks the most vulnerable piece of the IT pipeline. Today I’d like to talk about security, or more specifically, facilities security, or more specifically still, facilities network security. Ok. Let me step back a minute while I define my terms.

Extending the Edge: New Thinking on Data Security

Originally posted on Data Center POST

Mike SprungerSecurity, like most aspects of IT infrastructure, has historically been a siloed function. Focused on protecting data, applications, network connections, and with the advent of BYOD (bring your own device) policies, network endpoints, it is a practice that, for most companies, evolved in a reactive fashion – new technology acquired and implemented based on a specific need.

It is not uncommon for a medium-to-large company to have 50 or more different security technologies in place. While fiscally inefficient, this approach has been somewhat effective up to this point in dealing with the types of attacks launched against it.

The Benefits of Working with a Managed Network Security Provider

Originally posted on Windstream Business™ by Jeremy Story

Windstream logo We know. Placing your network security responsibilities in the hands of a Managed Security Service Provider (MSSP) may put you outside of your comfort zone—but most likely, not for long. Our experience is that any hesitancy giving up some hands-on, day-to-day oversight of network security to a third-party provider is quickly overcome when companies realize the benefits of working with a trusted, reliable MSSP.

Warning: Plenty of Holes Exist in SIP Security Practices

As originally published on TMCnet

By Peter Scott, TMCnet Contributor

imgresSession Initiation Protocol (News – Alert) (SIP) has delivered us VoIP calling, which reduces costs while increasing what we can do with voice communications. Another gift from SIP is less welcome, however: Added security concerns when it comes to calling.