5 Security Challenges Facing State and Local Governments in 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 5 Security Challenges Facing State and Local Governments in 2016-6 Next

Assume a Breach

All organizations – regardless of size – will need to assume a breach.

Looking back over 2015, countless security breaches, some high-profile federal breaches and some at the local level, didn't receive national media attention. According to the Identity Theft Resource Center, almost 28 million personal records were exposed through the first half of 2015 due to government data breaches. And in 2016, there will most likely be more.

For 2016, planning should start from the assumption that a data breach is going to occur. Just because you may be a small organization or are at the local level isn't a good enough reason to assume you won't be hacked. You have assets that are most likely important to somebody. By focusing on visibility across your network, you can prepare for the worst and implement a solid disaster recovery plan.

When it comes to the security of state and local government networks, recent data all points in one direction: vulnerability. At a time when network security is more in the spotlight than ever, state and local governments are expected to keep data private and secure, but the threat of network exposure is more prominent than ever.

By analyzing over 30 million security alerts from its users around the world, Sentinel IPS discovered that 67 percent of state and local government networks triggered critical malware or ransomware alerts, compared to only 39 percent of non-government/education networks.

What does this mean for state and local governments looking ahead to 2016? The data shows several trends emerging for the upcoming year.

David Lissberger is chief executive officer at Sentinel IPS, a managed service that relieves the burden of network security for businesses with its threat management system that is based on active threat intelligence.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.