Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

New Cybersecurity Realities Call for Comprehensive Data Modernization

by GTI Editors
January 28, 2022
in Cybersecurity
Reading Time: 4 mins read
A A
Data Modernization
Share on FacebookShare on Twitter

Cyber attacks have become more common in the last two years as cyber criminals have taken advantage of the disruptions caused by the pandemic. In 2020 alone, the federal government recorded 30,819 incidents of cyber attacks. As the federal government embarks on its data modernization and cloud migration journeys, does this open the door for more cyber attacks?

In a recent GovLoop survey, sponsored by Presidio Federal and Dell Technologies, 47 percent of federal government respondents said that their agencies had experienced a breach in the past twelve months. While it may seem as though expanding the IT supply chain could lead to more cybersecurity vulnerabilities, Clark Anderson, Security Solution Architect at Presidio Federal, explained how data modernization is actually a very strong weapon against cyber attacks. “Data modernization and cybersecurity are virtually synonymous with each other,” said Anderson.

Prior to the rapid acceleration and adoption of cloud technology, the traditional method of keeping data safe rested in preserving files on backup software. While this was useful for accidental deletions or corruptions of data, backups were never intended to serve as a cybersecurity solution. Backups did little to prevent malware from being deposited into its networks – in fact, attacks on backups have been on the rise over the past few years, as hackers have found vulnerabilities in the networks that store backups and implemented a variety of ways to threaten the security of the data.

“Government agencies often experience a cyber attack without knowing about it for months,” said Anderson. These circumstances drive what he believes to be three key components to a comprehensive data modernization and protection strategy. “It’s about ‘sync, copy lock, and analyze,’” he said.

First, data must be synced to a fully isolated, air-gapped vault. Then, it must be locked away in immutable and unchangeable copies. Third, data should be continually analyzed through machine learning and forensics tools to better identify threats. “Together, these three components make up a solid plan to make sure that data is protected against sophisticated, unforeseen attacks,” said Anderson.

Anderson recommends that agencies pursue enterprise solutions that provide the full “sync, copy lock, and analyze” package. Each of these three components has many layers, and the centralization of these components in one solution set is helpful for agencies that might not have the resources or expertise to adequately execute on cybersecurity measures, including advanced AI-driven monitoring of their infrastructures against unexpected attacks. Cloud providers are also staying ahead of the game in keeping tools in compliance with cybersecurity standards such as NIST’s Cybersecurity Framework, while providing the ongoing testing and training that are essential to successful technology implementation.

With many IT decision-makers concerned that their organization’s existing data protection may not be adequate for coping with newer threats, it’s up to agencies to invest in comprehensive data modernization strategies that keep up with new cyber realities.

“Each agency has the authority and autonomy to decide how they want to manage their own data solutions and cloud migrations,” he said. “But for these measures to optimize cybersecurity, agencies should look at comprehensive solutions with solid security controls, advanced data protection analysis, and post-attack diagnostics.”

To learn more about how data modernization drives cybersecurity, download the Market Trends Report “Protecting Data at All Cost” from Presidio Federal and Dell Technologies.

Tags: cloud computingdata modernizationDell TechnologiesFCN Inc.federal cloud migrationPresidio FederalXaaS

RELATED POSTS

Flexible and Scalable Cloud Computing Technology That Won’t Break the Budget
Civilian

Flexible and Scalable Cloud Computing Technology That Won’t Break the Budget

November 8, 2022
Future of Work
Civilian

Hybrid Cloud is Evolving the Future of Work for Federal Agencies

July 18, 2022
Hybrid Cloud Roadmap
Civilian

Navigating the Hybrid Cloud Roadmap for Federal Agencies

July 11, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    8514 shares
    Share 3406 Tweet 2129
  • CISA Issues Updated Guidance to Protect Federal Agencies Against Expected Onslaught of DDoS Attacks

    34 shares
    Share 14 Tweet 9
  • Network Slicing Enables Agencies to Create Private, Secure, and Customized Networks: A Podcast

    125 shares
    Share 50 Tweet 31
  • Identifying the Building Blocks for a Successful Zero Trust Journey

    43 shares
    Share 17 Tweet 11

CONNECT WITH US

Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us