Study Showcases Biggest Cyber Threat - Feds Trying to Do Their Jobs

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Study Showcases Biggest Cyber Threat - Feds Trying to Do Their Jobs-2 Next

A Growing Threat

Between 2009 and 2014, the number of reported breaches on U.S. Federal computer networks rose 73 percent. There was a 680 percent increase in the number of incidents agencies reported to the Federal information security incident center over the past six years, and 1.73 million data records were compromised in 27 government data breaches in 2014 alone. Additionally, 45 percent of Federal officials cite cyberattacks as the greatest threat to national security (20 percent higher than terrorism).

Cybersecurity threats are growing. To defend against increasing threats, agencies must comply with various cybersecurity mandates that often fail to take the user experience into account. According to a new MeriTalk report, "Federal Cyber Uncertainty – KVM XYZ," keyboard-video-mouse (KVM) switching devices may be the solution agencies need when looking for ways to enable productivity while ensuring air-tight seals between networks, protecting from both internal and external threats.

According to the MeriTalk report, delivered as an infographic and sponsored by Belkin Government, Federal managers still lack confidence in their ability to protect sensitive data and experience challenges when it comes to compliance with Federal mandates designed to improve cybersecurity.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.