Study Showcases Biggest Cyber Threat - Feds Trying to Do Their Jobs

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Study Showcases Biggest Cyber Threat - Feds Trying to Do Their Jobs-4 Next

Alphabet Soup

Agencies lack confidence in (and compliance with) major Federal cybersecurity initiatives.

  • FISMA: Just over half of Feds say FISMA has improved security at their agency and only 27 percent were perfectly compliant with FISMA in fall 2013. Eighty-six percent believed FISMA compliance increased costs.
  • CDM: Fifty-six percent of Federal agencies are able to measure success in their CDM implementation, but only 44 percent are experiencing better security as a result of the CDM controls.
  • HSPD-12: Despite all of the PIV cards issued, 5.3 million unprivileged user accounts with limited access can log onto Federal networks with only a user ID and password and 134,287 privileged user accounts – system admins with access to everything – are just using user ID and passwords (instead of PIV).
  • TIC: In fiscal 2014, agencies passed 95 percent of traffic through a TIC or an equivalent Managed Trusted Internet Protocol Services (MTIPS) provider – while successful, TIC is cumbersome for mobile access and reduces easy access to data and apps.

Cybersecurity threats are growing. To defend against increasing threats, agencies must comply with various cybersecurity mandates that often fail to take the user experience into account. According to a new MeriTalk report, "Federal Cyber Uncertainty – KVM XYZ," keyboard-video-mouse (KVM) switching devices may be the solution agencies need when looking for ways to enable productivity while ensuring air-tight seals between networks, protecting from both internal and external threats.

According to the MeriTalk report, delivered as an infographic and sponsored by Belkin Government, Federal managers still lack confidence in their ability to protect sensitive data and experience challenges when it comes to compliance with Federal mandates designed to improve cybersecurity.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.