Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Datacenter robbed for the 4th time in 2 years

mariushm (1022195) writes | more than 6 years ago

Security 1

mariushm writes "The CIHost datacenter was attacked by armed intruders for the fourth times in two years.

According to a letter C I Host officials sent customers, "at least two masked intruders entered the suite after cutting into the reinforced walls with a power saw, [...]

During the robbery, C I Host's night manager was repeatedly tazered and struck with a blunt instrument. After violently attacking the manager, the intruders stole equipment belonging to C I Host and its customers."

To aggravate the situation, C I Host representatives needed several days to admit the most recent breach, according to several customers who said they lost equipment, all the while reporting the problems as "router failures"."

Link to Original Source

cancel ×

1 comment

Sorry! There are no comments related to the filter you selected.

Cameras collect evidence but don't prevent crime (1, Insightful)

Anonymous Coward | more than 6 years ago | (#21222599)

We did a physical security evaluation of a local data center and found a lot of talk but fairly soft security. Yes, there were cameras on the entrances. Yes, there were biometrics. No, there was not a guard on duty 24/7. No, there were no perimeter cameras. No, they did not check the identity of guests. Our evaluators were actually able to walk into the data center control room (not data floor) unchallenged.

I agree with the author that the focus on cyber-hardening has distracted folks from the realities of physical security. Good physical security takes real estate (expensive) and good people (very expensive). Some customers may not want to go through man-traps and have their guests challenged when giving a tour. Then there are the customers that are willing to pay more for that knowing that the jewels are safe. We ended up accepting some risk for a non-sensitive application\data since they weren't going to change their business model and good security comes at a premium.
Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>