top of page

The Campus X blueprint for ensuring IT security and compliance in a new office



As kids, many of us were accustomed to fearing IT as the mere thought of Stephen King's Pennywise lurking in the dark sent chills down our spines. As soon as we entered the business world, running our own companies and managing teams and processes, our minds stripped the clown costume. The "IT" we now dread has taken on the form of "IT security."

But instead of red balloons and creepy laughter from storm drains, the threats now come from data breaches, phishing attacks, and unchecked system vulnerabilities.


The "IT" that haunts children is a creature of fiction. The IT security risk that threatens companies often seems like that, too—until it gets too late and companies realize that the threat is very real—silent, invisible, but omnipresent.


How do we know? Over the years, the Campus X team has helped dozens of companies de-escalate the stress and fear around ensuring flawless IT security and compliance in a new office location. And so, we thought: Why not share our experience to help take your defences to the next level? 


How Campus X helps our members ensure IT security and compliance in a new office environment


Just in Q2 2024, organizations have suffered an average of 1,636 cyber attacks per week, a 30% year-over-year increase. And while the IT security risk universe continues to expand, companies’ measures to counteract it often struggle to catch up. 


As of 2024, the average time to identify a data breach, for example, is 194 days. Another 64 days are needed to contain it. At the same time, according to IBM, the average cost of a data breach in 2024 was $4.88 million, a 26% jump since 2020. 

Striking figures. Yet, very real ones. 


Worried your company might make the statistics? Here are some tips on how Campus X ensures our members don’t: 


Enterprise-grade network security and reliability by default


When the Campus X founding team was planning the design of our network infrastructure, we took inspiration from multinational enterprises like Progress (former Telerik), and the lessons learned while scaling an organization internationally and support thousands of employees across several continents. The goal was for Campus X to function as the HQ, providing enterprise-grade, highly secure, and redundant network infrastructure protecting our members' and their clients' critical data and devices.


To achieve that, we prioritized two principles - constant network availability and high security.


We offer our members flexible, tiered network security solutions suitable for companies of various industries and sizes. By default, every Campus X member, be it a freelancer, a small-team startup, or the hundred-person branch of a big multinational company, can access our high-speed, highly available network infrastructure. Although all members are tied to the same network, they can't access each other's devices.


However, members with more complex security needs or requirements can move to the next tier. We will explain more about this in the next section - now, let's focus on the second critical aspect: availability.


While Bulgaria has a relatively stable power system, companies still experience around one monthly power outage. Such instances can have costly implications. According to research, the average cost of downtime can hit $9,000 per minute for big organizations. In the financial and healthcare industries, it can top $5 million per hour, excluding potential regulatory fines, penalties, or long-term business consequences.


Hefty, isn’t it? 


At Campus X, we believe that availability is the best ability. That’s why we have put supporting our members’ business continuity from a network access standpoint at the top of our priorities. 


Regarding internet connectivity, a crucial measure we have adopted from the get-go is decentralizing the network connection. We use three physically separate optical routes for constant connectivity. We also ensure backup water and power supplies to keep operations and on-site infrastructure up and running at all times.


This enables our member companies to provide uninterrupted services and ensure a better market position in terms of reputation and reliability.


“It's extremely important to have access to all critical systems 24/7. Maintaining continuity of IT services at our workplace is something we can barely live without,” shares Andrey Andreev, former Engineering Lead at our member company OfficeRnD.  


“We have used different office providers in the past, but none of them comes close to the security and reliability provided by Campus X. Personally, I can say that watching the whole neighborhood blackout and still being able to finish your work is a great advantage,” Andreev adds.


Flexible and customizable IT and network security solutions for on- and off-site access


A Forrester research reveals that 75% of companies struggle with IT challenges due to the shift to remote and hybrid working. In fact, according to Deloitte, 41% of organizations consider hybrid IT cases their biggest cybersecurity challenge.


Be it a fully remote startup, a company building a network-connected product or testing software on various devices, or simply due to exponential growth - there are many reasons why Campus X members might want to move to the next network security tier. 


“We usually equip those companies with a dedicated network segment that serves as their own environment to test and collaborate in isolation,” explains Sergei Biliarski, IT Director of Campus X. 


Companies can get both wired and wireless internet access to their dedicated network. This is highly convenient since it enables secure access from all across our 18,000 sq.m. facilities. Based on the company’s security requirements, access to the network can be through shared or individual passwords.


“Whether for onboarding a remote or hybrid-working team or ensuring a secure connection to the networks of big-name clients, we help companies implement the most suitable VPN solution,” shares our IT Director. “Over the years, client and site-to-site VPN services have proven to be a game-changer for our members, blending convenience and industry-leading security.” 


However, the importance of IT security and compliance today extends beyond threat protection and also carries significant business implications. According to Gartner, by 2025, 60% of organizations will use cybersecurity risk as a critical factor for determining the parties they will do business with. 


Anticipating these market shifts, many of our members have already future-proofed their operations. Using VPN tunnels, they can securely access highly protected remote infrastructures through the Campus X network, enabling them to participate in large projects for industry-leading global corporations.


For the curious among you, here is the story behind implementing our award-winning network infrastructure.  

 

Digital Lights (now part of Wiser Technology) is a case in point. The company started in 2018 from a few desks in the Campus X shared office space and quickly became one of the fastest-developing companies in Bulgaria. Our IT team hasn't only witnessed that growth first-hand but also supported it actively through:


  • Establishing site-to-site and client VPNs for seamless connectivity 

  • Ensuring seamless access to the company’s HQ network from Campus X network from its satellite locations.  

  • Helping Digital Lights become the first Bulgarian company certified for TISAX, representing the highest security standard in the automotive industry.


To date, Digital Lights still relies on Campus X’s enterprise-grade network infrastructure and IT support team.


One-size-doesn’t-fit-all when it comes to IT security


“Established organizations are typically well aware of their IT support, compliance, and security needs and come to us with pre-defined requirements based on a certification they already have or aim to obtain,” explains Sergei Biliarski.


“There is also the case of startups. For some, often just having an internet connection is enough,” says Sergei. “However, we are proactive in explaining that they will, at some point, grow, and their needs will evolve, and they should be able to respond in the best possible way. So in this aspect, we also serve as IT security and compliance consultants,” he adds.


At Campus X, we have blueprints with the best IT security and compliance practices for different companies based on their size and needs. That way, we can guide our members in what to anticipate as they grow, taking the uncertainty factor out of the equation and allowing them to plan their resources ahead of time.


“You never know how rapidly a company will grow. However, we know that our members should concentrate on precisely this - growing their business - not worrying about what IT challenges they will face in the next step of their journeys. When needed, we can help take care of this.” Sergei concludes.


Different industries, different IT security and compliance requirements


To take the compliance burden off our members’ shoulders, we assist them in complying with niche-specific IT security requirements and obtaining IT security certifications. That way, our members can rest assured that protecting their and their clients’ sensitive information measures up to the high standards required by partner corporations and industry-leading practices.


Companies conducting business with automotive industry clients from the German market, for example, must comply with TISAX - a labeling that validates a company’s information security management system compliance with defined security levels. 


Or let’s take HIPAA (Health Insurance Portability and Accountability Act) - a U.S. federal law protecting the privacy of patient health information and ensuring that those having access to it will follow strict guidelines for handling, storing, and sharing sensitive medical data. 

These are just two of a long list of industry-specific IT and data security-related regulations and certifications. However, no matter the industry, non-compliance with existing IT and data security regulations can result in serious legal, financial, business, and reputational consequences.


“We are proactive in helping our members understand the IT and data security regulations and mechanisms they are subject to. No matter the size or at which part of the journey they are, we work with member companies to help them align as their business or regulatory landscape evolves,” explains Sergei. 


We love seeing our members thriving, and as soon as Verto Digital, a leading data-driven marketing agency, expanded its client portfolio and started working with more demanding companies, we performed a gap analysis to evaluate how the agency handled sensitive information and if there were areas that could be improved upon. As a result, we helped Verto implement an advanced endpoint management solution and tailored security policies to align with relevant requirements.


Enterprise-grade IT security and compliance without breaking the bank

There is the perception that ensuring a company’s compliance with stringent IT security requirements is a tedious and expensive endeavor.


Well, yes, and no.


Yes, in the case where you are opening your own office and have to hire an IT security and support team to set up and maintain the necessary software and hardware infrastructure. 

However, if you have chosen to become a member of Campus X, you can lean on our experienced team to cover this, giving you the freedom to concentrate on your business from day one.


For our member Digital Lights, we have built a VPN tunnel to help them connect to their clients. That way, it spared the need to invest in expensive infrastructure or hire an internal IT support team to securely set up the connection.


Don’t forget physical security: The importance of ensuring safe and convenient facility access


A security breach can occur both within the digital and physical realms. However, with the right IT security team by your side, you can ensure proper protection against both. Most importantly - without sacrificing convenience.


At Campus X, we have designed a system enabling facility access through both physical and digital devices and keep detailed access logs for six months.


For example, we use advanced chips with encryption of the highest level, which basically makes any attempts to copy them meaningless.


Our members can also access their workplace through their smartphone or smartwatch devices.


“Campus X is compliant with all relevant physical security certifications and regulations. And with that, so are our members,” says Sergei.


The design of our facility and network access systems make them a perfect fit for companies that prioritize remote collaboration or hybrid working models. Oh, and let's not forget that it makes your summer/winter office experience a breeze.


When it comes to privacy and security at our premises, we can proudly say that we have thought about everything. Like, literally.


For example, nobody usually cares about printers, right? But have you thought about everything that can go wrong with it? And we don't mean the typical "the printer won't start," "there is no ink," or "the paper's gone" kind of stuff. Sure, these are annoying, but have you considered printers a potential data security vulnerability? 


Just imagine - you are in a shared coworking space and start printing. But at the same time, someone else is approaching the printer to get their printed documents. The best-case scenario - they get your weekend trip itinerary. The worst - your startup pitch deck or sensitive client information leaks.


At Campus X, even printing is a convenient and privacy-first process. The system allows you to print by using the machine in the closest proximity, no matter where on the campus you are. Furthermore, the printing process starts only when you get to the printer and authenticate yourself through a code or a your token, confirming that the pending documents are those from your printing request. 


Joining Campus X as a way to elevate your IT security and compliance


Products and services evolve.


Processes become more resource-intensive.


Startups grow.


Big companies expand.


Regardless of size, use case, or growth stage, prioritizing IT security and compliance is now a critical business requirement with potentially costly regulatory, reputational, and operational consequences if underestimated.


Just as Pennywise feeds on fear, cyber threats prey on negligence. We can help ensure your IT security isn't the monster that comes back to haunt you.

Comentarios


bottom of page