Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Three Steps to Create a Bulletproof Cybersecurity Strategy for Government Agencies

by The Gurus
August 2, 2016
in This Week's Gurus
Share on FacebookShare on Twitter

The list of critical data stored by government agencies is endless. From credit card data, passport numbers, drivers’ license numbers and tax information, government agencies are storing vast amounts of data that create the perfect treasure trove for hackers to exploit.
What’s more, with strict regulations being enforced to ensure that organisations not only keep their data secure but that they become more transparent about data breaches when they do occur, such as the EU General Data Protection Regulation (GDPR), there really is no room for government agencies not to follow these regulations themselves.
However, unfortunately this industry does not have the best track record when it comes to security breaches. The Office of Personnel Management breach, which saw over four million federal employee records stolen, is best known as one of the largest data breaches in history. To make it worse, it’s reported that it took around six months for cybersecurity professionals to identify the intrusion; six months where the hackers could move laterally throughout the system and make the network their playground.
It begs the question: if the United States government cannot prevent data breaches, what does this say about the safety of corporate networks in the private sector? Government agencies around the world, at all levels, need to take action, and they need to do it now by following these three steps.
Step 1: Assume that a breach is going to happen
Taking a proactive approach to cybersecurity is the only way to keep hackers out. When considering the vast amount of data breaches that have happened in the last few months alone, it’s clear that no organisation – government or otherwise – is immune from being the next hacking victim. Instead of focusing on perimeter defences, government agencies need to limit the scope of a breach by containing it to a single segment of the network, instead of leaving the hackers to move laterally through the system at their leisure.
Step 2: Align the function of access control around application access for users
It’s no longer acceptable for any cybersecurity strategy to focus purely on the network. Instead, modern, software-defined security positions the security policies and protection functions around applications and users, which means only giving access to users that need it to do their job. By carefully controlling which users can access which applications in all internal and external locations, the attack surface can be reduced. Simply put, if a user does not need to access a particular application to do his or her job, then they should not be able to send even a single packet to that application’s server.
Step 3: Use breach containment to limit the scope
Taking six months to detect that a breach has happened is far from tolerable. And if action isn’t taken, the situation will only get worse; from mobile, BYOD, the Cloud and even the Internet of Things, the attack surface is continuously getting bigger. However, just adding more traditional cybersecurity tools into the mix won’t solve the problem. It is only by using a software-defined approach to security that focuses on containing breaches that the scope of a breach will become manageable, as even when a breach does occur, the hacker is limited as to what damage can be achieved.
Protecting government agencies from the fate of more data breaches is possibly one of the biggest tasks being faced by Security Managers today. However, cybersecurity doesn’t need to be complicated. The tools are there for the taking but a change in mind-set is needed, and it is only when this is realised that this critical data will be kept secure.
Paul German, VP EMEA, Certes Networks

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

One in four IT managers thwart a data breach every day, research claims

Next Post

Thousands of pounds of tech will be taken on holiday this year but security will be left at home

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information