(800) 233-0298
IDenticard Insights

Bring a Friend: The "Two-Man Rule" & What It Means for Data Center Security

Posted by Dan Ryan on Dec 1, 2017 8:30:00 AM

It's something everyone heard at some point as a child: "Use the Buddy System!"

Along with making parents feel better and keeping kids safer, the idea of the Buddy System also added a layer of accountability to any action: whatever was going on, there would be two people there to witness it.

In the field of information and data center security, there's a similar idea: the two-man rule.

The two-man rule adds accountability to any data center operation, adds security by preventing rogue individuals from doing any harm and lessens the dangers that can come from a lost access card or key.

In short, the same principle that guided the Buddy System that helped keep you safe as a child can help keep your data safe today. 

What is the two-man rule in data center security?

Read More

Topics: access control, Rack Armor, server security, modern security, data security, two-man rule, security tips

Data Protection & the Need for a Modern Server Rack Security Solution

Posted by Dan Ryan on Jun 30, 2017 12:00:00 PM

Nowadays, cybersecurity and data theft are two of the hottest topics in the world of technology.

The rise in the importance of and interest in cybersecurity has been driven by a number of high-profile incidents that have occurred over the past several years:

  • There have document and data dumps perpetrated by individuals like Edward Snowden and Reality Winner that have revealed sensitive government information.
  • There has been ongoing discussion about the involvement of Russia in "hacking" the United States Presidential Election.
  • There have been massive global malware attacks, like Petya and WannaCry, dedicated to stealing personal or customer data and holding it for ransom.

To put it simply, data security is a big deal in today's technology-focused world, and it's only going to get bigger.

Organizations around the world, terrified by the prospect of becoming the next company that has its customer data stolen and by having to deal with the ensuing PR fallout, have responded to these threats by ratcheting up their data protections.

These attempts have included things like two-factor authentication, biometric authentication and varying levels of encryption. 

While they're effective at addressing certain types of threats, these methods don't address a central vulnerability: your servers and data centers themselves.

Don't ignore the physical when you focus on the digital

Read More

Topics: access control, Rack Armor, data security, two-man rule, hacking, building security

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all

Follow Me