tag >> cyber-attack
December 22nd, 2017
Carahsoft's Steve Jacyna, Director of Sales for the Emerging Cybersecurity Solutions Team, shares his tips for online shopping safety.
October 18th, 2016
Ransomware isn’t a new threat for government agencies. These attack programs first appeared in 1989 and have continuously evolved to match new systems and security protocols.
September 7th, 2016
The fundamentals of cybersecurity still rest on perimeter security, access control for the ingress and egress of data, strong authentication, and data encryption. But these strategies alone are simply not enough for government agencies to defend themselves. Today, we have to assume that a breach is inevitable and, because of that, we need to be able to respond quickly with the tools at hand.
July 29th, 2016
It’s no secret that security incidents involving federal systems have been on the rise over the past few years, but the actual numbers are staggering. Between September 2014 and June 2015, there were 30 million attacks – that’s 1,000 attacks each day.
July 28th, 2016
In 2015, over 169 million records were exposed, which stemmed from nearly 800 publicized breaches across the public sector. This was a 38% increase in incidents from 2014 and these numbers show no sign of slowing down. The frequency of cyber-attacks is growing as we move more and more of our daily lives online. Attackers are findings new, creative ways to breach security at the same pace (if not faster) that we are learning to prevent the previous attack methods.
July 5th, 2016
The increasingly ubiquitous use of mobile devices by government employees is making endpoint security both more complex and more necessary. Many agencies looking to modernize device security are focused on user experience but they must also be vigilant around cyber-attacks. Both external and internal threats are constantly evolving, becoming more sophisticated and dangerous, and posing serious security challenges to an increasingly-connected workforce. From unification to thorough cybersecurity, there are several key factors CISOs, CTOs, and other agency security leaders should consider when implementing cyber protocols on organizational endpoints.
June 14th, 2016
With more and more agencies going paperless and moving to virtual storage infrastructures, organizations have to bolster their security strategies and learn how to anticipate future attacks. While this has typically meant fortifying network firewalls and securing the cyber perimeter, San Francisco’s FiberWAN data breach showed us in 2008 that threats are not always originating from external sources.
March 23rd, 2016
Building a resilient cybersecurity network can help to develop proactive defense. Resilient agencies are those who actively plan for what will happen once threats are in their network.
- Cyber Attack, Cybersecurity, flowthings.io, ForgeRock, Qmulos, Shavlik, Skyport Systems, Veritas, VMware