In the first of this two-part series, we speak with John McGee, Senior Director of Technology at TECA Data Safe about the steps, policies, and processes TECA takes to ensure the highest level of cyber security for all of their clients.
- Ransomware, hacking, and cybercrimes are frequently in the news. What does TECA do to ensure the security of its clients’ critical data?
- The core of TECA Data Safe’s business is data protection. To that end, TECA Data Safe employs multiple layers of defense to ensure the integrity of customer data. This includes offsite backups, immutable storage options, hardware redundancy, and host and network layer security.
- What type of security does TECA provide to every client they serve to defend against hackers or cybercriminals?
- TECA Data Safe employs multiple layers of security to defend against bad actors with ill intent. Intrusion prevention systems are deployed to mitigate botnet and Denial of Service Attacks (DDoS) and to identify suspicious traffic. Reputation Enabled Defense blocks traffic from known malicious sources. TECA Data Safe can implement geolocation filtering when requested to prevent connections from regions where the customer does not expect traffic. The most critical component of any network security program is user awareness training. TECA Data Safe employees are regularly briefed on the latest security threats and mitigation techniques.
- What about protection from viruses?
- TECA Data Safe employs numerous levels of antivirus protection. Their endpoints are protected with enterprise-class, centrally managed antivirus software. The network ingress and egress points are screened with signature- and behavioral-based antivirus solutions. Each of these antivirus solutions relies on a different antivirus vendor. This reduces the likelihood that a zero-day attack breaches TECA Data Safe’s infrastructure because any one antivirus vendor was slow to identify and respond to a new threat.
- How secure is the physical data center facility?
- TECA Data Safe utilizes tier three data centers. The data centers have multiple distribution paths for power and cooling and redundant generators back up power systems. Power is seamlessly transferred to generators monthly to ensure the operation and to burn off and recycle fuel. All of TECA Data Safe’s data centers employ live security personnel to monitor access to data centers. Visitors are screened by security. Then, they are issued a badge. Once the visitor receives a badge, they will encounter a mantrap, where the door they entered is secured behind them, and they must present their credentials to enter the next area. Visitors are monitored throughout the facility by cameras and live security personnel.
Watch for Part 2 of this interview in our next edition of TECA’s e-news. Questions about TECA’s secure data centers or the services we provide? The expert TECA technology team are happy to help. Contact us today. Contact us today.
We’re pleased to announce that DataMagazine, a UK publication that promotes the greatest leading-edge companies, businesses, and innovations on the global stage, has listed TECA Data Safe as one of the 34 Most Innovative Cloud Data Services in Minnesota.
Contact us today to learn how we can protect your business and help you succeed.
True or False?
Autumn is here which means it’s time to head to the movies. See how much you know about these popular IT movies. True or False:
The Imitation Game. Based on the true story of mathematician, Alan Turing, who works with a British intelligence agency to crack Germany’s Enigma code during World War II.
True. Sure, he cracked that code, but did he get today’s Wordle in less than six tries?
Her. A socially challenged writer falls in love with his phone’s OS.
True. But highly unlikely. We all know how temperamental Siri can be. She’s just not good relationship material.
Office Space. Three computer programmers who hate their jobs get new jobs at a local Chili’s where they’re required to wear 13 pieces of “flair” at all times.
False. They write code that’s intended to embezzle pennies at a time from their employer but one of the programmers makes a mistake. With skills like that, they might have been better off at Chili’s.