Steve Gottwals is technical director of security solutions at Adobe
Across government, agencies are faced with a cyberthreat landscape continuously evolving and increasing in scope and complexity. In one year, data breaches exposed 17.3 million documents costing agencies an estimated $860,000 in data loss and downtime. According to agency reports, there were 15 percent more information security incidents between fiscal year 2013 and 2014.
3 Steps to Slash Threat Risk
As sensitive information continues to increase in volume, so do potential threats to its security. Information exists across multiple devices – laptops, smartphones, tablets and cloud storage – creating ample opportunity for both accidental and intentional data compromise and loss. Information security and regulatory compliance are major reasons why agencies must consider security at every step in the content life cycle.
There are three fundamental components of information protection – physical, technical and behavioral. To create a strong and effective defense against internal and external threats, these elements must work together.
Step 1: Physical
Examples of physical security controls include video camera surveillance, security guards, protective barriers and locks. Along with these measures, other access control protocols such as observations about the individual, time of day, individual appearance or how one...
William D. Eggers leads Deloitte’s public sector research and is the author of eight books on government reform. Greg Pellegrino is a recognized leader in customer experience strategy at Monitor Deloitte.
In the U.K., you can find links to online restaurant inspection data embedded in articles on Buzzfeed. In New Zealand, citizens can verify their identities online with a government program called “Real Me,” which simplifies the process of requesting passports, student loans, or birth certificates, all with one password.
In San Francisco, Muni bus tickets collect data on where riders embark and depart, allowing a more strategic deployment of resources.
Public sector organizations are responding to a changing digital environment. Simply switching paperwork to digital forms can save enormous sums of money, while technological advances in public health and analytical advances in policing or public transit can stem pollution and save lives.
Deloitte Digital has undertaken an extensive survey of the state of global digital transformation. We surveyed over 1,200 officials working in various public sector bodies in over 70 countries, and complemented these with interviews of 130 public sector leaders and outside experts. We identified which government organizations were furthest along the journey to digital...
Richard Brent is CEO of Louroe Electronics and Security Industry Association board of directors member.
Although technological innovation is at an all-time high, so is the vulnerability of every government agency, facility and operation. Officials and chief security officers are looking for new cost-effective solutions to enhance their physical layers of security.
One technology gaining more prominence in the security and federal space is audio monitoring.
Security solutions with audio and audio analytics have become important resources for security staff. Audio analytics refers to the capture and classification of sounds that indicate a threat or precarious situation. Common examples include glass break and car alarm detectors. Aggression detection software, which is an excellent deterrence tool for curbing workplace violence, is a more recent technology development in the market.
Perhaps the most valuable audio analytics solution available today for agencies is the gunshot detector. In situations where a security breach has occurred and seconds can be mean life or death for innocent civilians, a gunshot detector can shorten response time. When a gunshot detector identifies the sound of a firearm, it immediately notifies law enforcement and first responders, allowing them to respond quickly.
Audio can easily be integrated into any existing...
Kevin Davis is vice president of public sector at Splunk.
Fall has arrived and the NFL season is now well underway. While watching the games this past Sunday, I found myself thinking about the preparation that goes into each game and the intense scrutiny that follows every Monday morning for the losing team. Having played college football at Boston College for Tom Coughlin (now the two-time Super Bowl winning head coach of the New York Giants), I understand this better than most.
Coach Coughlin was a demanding coach, but he was also fair. What he asked from each player was simple – that you worked hard to be as prepared as possible and that you strived to continuously improve. Thinking about this now, these are the same standards we should be applying to government when it comes to cybersecurity.
In some ways, the “Monday morning quarterback” responses we often see in football are similar to the reactions we see in the wake of security breaches, with lots of questions surrounding what went wrong and how to improve before the next game (i.e. next attack).
However, when it comes to cybersecurity preparation, there is one question asked continually across government and...
Peter Galvin is vice president of strategy and marketing at Thales e-Security.
National Cybersecurity Awareness Month draws attention to one of the most critical realities of our age: It can be dangerous to be online. Changing password frequently and avoid using public computers and Wi-Fi for financial transactions are just a couple of ways individuals can protect themselves.
When it comes to network security for government agencies, organizations need in-depth insight into the threats that lie in wait. Below are five key points about cybersecurity today that will help you strengthen your defenses to keep your data secure.
1. Common security failures have enabled cyberattacks to cause significant damage to businesses.
These failures include:
Weak security hygiene. At the heart of many of the largest breaches are phishing attacks that capture user login information or enable malware installation. Many attacks succeed because default passwords have not been changed, patches have not been installed, accounts have excess privileges or system configurations are left in wide open, insecure states
Insufficient Data Protection. The ultimate goal of most malicious actors is to obtain sensitive user information or critical data. Encrypting stored data is one of the most effective ways of thwarting such attacks...