5 Security Challenges Facing State and Local Governments in 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 5 Security Challenges Facing State and Local Governments in 2016-6 Next

Assume a Breach

All organizations – regardless of size – will need to assume a breach.

Looking back over 2015, countless security breaches, some high-profile federal breaches and some at the local level, didn't receive national media attention. According to the Identity Theft Resource Center, almost 28 million personal records were exposed through the first half of 2015 due to government data breaches. And in 2016, there will most likely be more.

For 2016, planning should start from the assumption that a data breach is going to occur. Just because you may be a small organization or are at the local level isn't a good enough reason to assume you won't be hacked. You have assets that are most likely important to somebody. By focusing on visibility across your network, you can prepare for the worst and implement a solid disaster recovery plan.

When it comes to the security of state and local government networks, recent data all points in one direction: vulnerability. At a time when network security is more in the spotlight than ever, state and local governments are expected to keep data private and secure, but the threat of network exposure is more prominent than ever.

By analyzing over 30 million security alerts from its users around the world, Sentinel IPS discovered that 67 percent of state and local government networks triggered critical malware or ransomware alerts, compared to only 39 percent of non-government/education networks.

What does this mean for state and local governments looking ahead to 2016? The data shows several trends emerging for the upcoming year.

David Lissberger is chief executive officer at Sentinel IPS, a managed service that relieves the burden of network security for businesses with its threat management system that is based on active threat intelligence.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.