Nature News: In 2002, bioinformatician Mark Gerstein and his colleagues set up a server to host some commonly used genomics databases to monitor any anomalies in web traffic or surreptitious scans.Seven months later, the picture that emerged was one of a network under siege. Not all of these visits were attacks, Gerstein notes, but many were.Protecting research data presents particular challenges. Most information-technology (IT) professionals suggest ensuring that large or sensitive data stores are managed by a centralized IT team that can monitor and administer systems, keeping a close watch over traffic and limiting access.But this can conflict with the ethos of researchers who need such systems to be accessed by a wide variety of students, postdocs, and collaborators.