5 Security Challenges Facing State and Local Governments in 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 5 Security Challenges Facing State and Local Governments in 2016-4 Next

Network Visibility

Network visibility will become more critical.

As we enter into 2016, network security will only become more prominent, particularly as state and local government networks are at increased risk. According to recent data, 23 percent of government networks triggered BrowseFox alerts, compared to only 5 percent of non-government/education networks.

It takes many technologies to provide all-inclusive security management, and government IT professionals should rethink visibility at every layer of the network and use the appropriate network monitoring tools. As hackers become more educated every day, IT can stay one step ahead by continually checking the network systems and adjusting as necessary.

When it comes to the security of state and local government networks, recent data all points in one direction: vulnerability. At a time when network security is more in the spotlight than ever, state and local governments are expected to keep data private and secure, but the threat of network exposure is more prominent than ever.

By analyzing over 30 million security alerts from its users around the world, Sentinel IPS discovered that 67 percent of state and local government networks triggered critical malware or ransomware alerts, compared to only 39 percent of non-government/education networks.

What does this mean for state and local governments looking ahead to 2016? The data shows several trends emerging for the upcoming year.

David Lissberger is chief executive officer at Sentinel IPS, a managed service that relieves the burden of network security for businesses with its threat management system that is based on active threat intelligence.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.