Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Protecting Next-Generation Federal Networks from Cyber Attacks

by Brandon Shopp
October 8, 2019
in Cybersecurity
Reading Time: 4 mins read
A A
Protecting Next-Generation Federal Networks from Cyber Attacks
Share on FacebookShare on Twitter

As agencies across the federal government modernize their networks to include and accommodate the newest technologies such as cloud and the Internet of Things (IoT), federal IT professionals are faced with modernizing security tactics to keep up with leading-edge threats that accompany leading-edge technologies.

This is no easy task, as modernization has brought complexity—and complexity exacerbates the security challenge. So, what’s the solution?

It’s important to point out that there is no proverbial silver bullet, no single thing that will protect an agency’s network. The reality is that the best defense is implementing a range of tactics that will work in concert to provide the most powerful security solution.

There are absolutely tactics that should be higher priority than others—tactics that federal IT pros can take today to help protect next-generation networks against attack.

Let’s take a closer look.

Access Control

Something nearly all of us take for granted is access. With increased accessibility to a broad range of files and devices within our networks, far too many individuals have too much access to too many things. The federal IT pro can help dramatically improve the agency’s security posture by reining in access.

There can be any number of reasons that federal IT pros set overly lenient permissions—from a lack of configuration skills to a limited amount of time. The latter is often the more likely culprit as access control applies to so many aspects of the environment. From devices, to file folders, to databases; it becomes difficult to manage setting access rights and is a highly time-consuming process.

Luckily, there are an increasing number of tools available to help automate the process. Some of these tools can go so far as to automatically define permission parameters, create groups and ranges based on these parameters, and automatically apply the correct permissions to any number of devices, files, applications, etc.

Once permissions have been set successfully, be sure to implement multifactor authentication to ensure access controls are as effective as possible.

Diverse Protection

As discussed above, next generation networks are complex—with different segments that, potentially, reside in different locations and different types of networks (on-premises data center, cloud, hybrid cloud, etc.). The best protection against a complex network is multi-faceted security. Specifically, to ensure the strongest defense, invest in both cloud-based security and on-premises security.

For top-notch cloud-based security, consider the security offerings of the cloud provider with as much importance as other benefits. Too many decision-makers overlook security in favor of more bells and whistles. Ultimately, security will be far more important.

Along similar lines of implementing diverse, multi-faceted security, consider network segmentation if it’s not already in place. The reason? If an attack happens, the federal IT pro should be able to shut down a portion of the network—to contain the attack—while the rest of the network remains unaffected.

Testing

Once the federal IT pro has put everything in place, the final phase—testing—will quickly become the most important aspect of security.

Testing covers many things, and that’s the point. Testing should include technology testing (penetration testing, for example), process testing (is multi-factor authentication working?), and people testing (testing the weakest link).

People testing may well be the most important part of this phase. Why? Because increasingly, security threats caused by human error are becoming one of the federal government’s greatest threats. In fact, according to a recent Cybersecurity Survey, careless and malicious insiders topped the list of security threats for federal agencies. Specifically, 56 percent of survey respondents said the greatest source of security threats to federal agencies is careless and/or untrained agency insiders.

Conclusion

As I mentioned earlier, there is no proverbial silver bullet to protecting next-generation federal networks. Yet, there are tactics federal IT pros can employ to provide a more secure environment, from enhancing access control to implementing a broader array of security defenses to instituting a testing policy.

While each of these is important individually, putting them together will go a long way toward strengthening any agency’s security infrastructure.

Tags: Brandon ShoppFederal CybersecurityIoT SecurityNational Cyber Security Awareness MonthNCSAMPreventing Cyber AttacksSolarWinds Cybersecurity

RELATED POSTS

Reliable 5G
Cybersecurity

How Agencies like CISA are Preparing Federal Organizations for Secure, Reliable 5G

January 21, 2022
federal cybersecurity
Cyber Security

Prioritizing A Strong Federal Cybersecurity Team Exemplifies Agency Maturity

November 1, 2021
federal cybersecurity
Cyber Security

Working Together to Bolster Federal Cybersecurity Efforts in a Hybrid World

November 1, 2021

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9327 shares
    Share 3731 Tweet 2332
  • Fixed Wireless Access: Communications Infrastructure Podcast for the Public Sector

    73 shares
    Share 29 Tweet 18
  • Laid-off Tech Workers Find Unexpected Opportunities with Federal Government Contractors

    11 shares
    Share 4 Tweet 3

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us