Study Showcases Biggest Cyber Threat - Feds Trying to Do Their Jobs

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Study Showcases Biggest Cyber Threat - Feds Trying to Do Their Jobs-5 Next

The Need for KVM Security

A significant amount of government data resides on endpoints – but 66 percent of Feds say they are missing measures for endpoint security management. Additionally, nearly half of IT and IT security decision makers said government data is most at risk of breach from employees' or contractors' desktops or laptops.

Cybersecurity threats are growing. To defend against increasing threats, agencies must comply with various cybersecurity mandates that often fail to take the user experience into account. According to a new MeriTalk report, "Federal Cyber Uncertainty – KVM XYZ," keyboard-video-mouse (KVM) switching devices may be the solution agencies need when looking for ways to enable productivity while ensuring air-tight seals between networks, protecting from both internal and external threats.

According to the MeriTalk report, delivered as an infographic and sponsored by Belkin Government, Federal managers still lack confidence in their ability to protect sensitive data and experience challenges when it comes to compliance with Federal mandates designed to improve cybersecurity.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.