Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

The top 5 reasons hackers love data centers

August 13, 2018

The top 5 reasons hackers love data centers


Do you think your data center’s impervious to a physical attack or a cyberattack? Think again. From the human element to the increasing number of global cyberattacks, your data center is vulnerable. The worldwide cost of cybercrime is estimated to reach $6 trillion annually by 2021, which means that it’s not about if your data center will be hacked, but when. Learn more about the top 5 reasons hackers love data centers.

  1. Outdated software: Earlier this year, the Iranian IT ministry reported that data centers in Iran were attacked by a network of hackers warning Iran not to mess with U.S. elections. The culprit? A known router vulnerability. The lesson: keep your data center software, firmware and patches up to date.
  2. Malware: Ransomware is dominating the malware market. Due to its success, more campaigns are being launched. According to AV-TEST’s security report, its database counted 570 million malware programs. And there’s no sign of letting up as AV-TESTS’s study found five new malware threats per second. Read more about addressing the human element of malware with security training.
  3. More connected things: The number of connected devices on our networks has grown at a rapid pace, exposing data centers to more end points. Gartner estimates that the number of the Internet of Things will grow at a 32.9% CAGR between 2015 and 2020, resulting in 4 billion units by 2020. McKinsey suggests 20–30 billion units, while Ericsson forecasts 28 billion connected devices.
  4. Physical threats: Not all data centers possess the latest protocols and hardened physical security practices to protect their facilities, equipment and resources from unauthorized access. Learn how to address physical threats here.
  5. The human factor: Not all hackers rely on technological exploits alone. Some leverage social engineering. Read this story about how one man approached and skimmed identification codes from employee access badges. Review your customers’ physical security practices to protect their facilities, equipment and resources from unauthorized access, and people and property from harm.

For more background, read about the evolution of data center security requirements. To improve your data center’s security posture, read about 5 ways to improve data center security. To plan for the worst, read about replication and disaster recovery to learn how to isolate incidents and recover quickly. To learn more about Microsoft Azure, visit ingrammicrocloud.com. And to learn more about penetration testing and vulnerability and social engineering assessments, visit ingrammicrolink.com.