Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

What Does it Take to Solve the Contractor Breach Challenge?

by Jim Hansen
August 15, 2019
in Cybersecurity
Reading Time: 3 mins read
A A
contractor
Share on FacebookShare on Twitter

Federal IT pros are having more success tackling cybersecurity challenges within their agencies. However, there’s still much work to be done when it comes to solving the security challenges posed by contractors.

According to the most recent SolarWinds Federal Cybersecurity Survey Report, more than half of federal IT pros surveyed say that IT security risks are greater with contractors than with internal agency personnel. Respondents say that “accidental data exposure” and the “lack of understanding of IT security policies and procedures” are the risks most closely associated with agency contractors and/or temporary personnel.

Specifically, nearly half of respondents—48 percent—say that accidentally exposing, deleting, or modifying critical data is the number one common cause associated with careless insider breaches from contractors. “Access to data and resources that are not necessary to do their job” and “using unsecured networks/Wi-Fi” are the next two highest causes of insider breaches from contractors, cited by 46 percent and 42 percent of respondents, respectively.

Solving the contractor-breach challenge

How can a federal IT pro reduce insider-threat risks associated with contractors?

There are a range of tactics agencies can undertake to strengthen and take control of how contractors behave inside and outside agency walls. Let’s take a closer look.

More than half of survey respondents—53 percent—say that ongoing security training is the best way to reduce insider-breach risks associated with contractor personnel. Other tactics that survey respondents cited include:

  • Using multifactor authentication (50 percent)
  • Training on security policies when onboarding (49 percent)
  • Restricting use of external devices (mobile, USB drives, etc.) (48 percent)
  • Monitoring how contractors are accessing accounts, data, systems (48 percent)

Why is training so important? Because implementing all the best technology in the world will not automatically stop a phishing attack. In fact, many agencies structure their security budgets so heavily on technology, that the “human firewall” factor often gets less budget than it deserves. The reality is, taking a more holistic approach to IT security by balancing security awareness training and security technologies is far and away the best approach.

Training is also often required by federal compliance rules and regulations such as FISMA (Federal Information Security Modernization Act of 2014), HIPAA (Health Insurance Portability and Accountability Act of 1966), NIST Special Publication 800-53 (Security and Privacy Controls for Federal Information Systems and Organizations), and more.

Conclusion

It’s important to note the importance of balancing training with technology. In other words, things like multi-factor authentication for access control, and ongoing monitoring are important parts of the equation. Be sure to invest in a tool or series of tools that provide these capabilities along with the ability to visualize the entire environment from a centralized location. This will ensure every federal IT pro is prepared for any potential cyber attack, regardless if that attack is socially or technologically engineered.

Tags: Accidental BreachBreach PreventionContractor BreachescybersecurityCybersecurity Surveysolarwinds

RELATED POSTS

Virtual Technology Briefing
AI & Data

Virtual Technology Briefing Showcases Strategies to Empower Agencies to Do More with Less

March 14, 2023
Contributed Articles

Silent But Deadly: The Cybersecurity Risks of Quiet Quitting

March 9, 2023
collaborating on cybersecurity
Cybersecurity

Collaborating on Cybersecurity Best Practices Enables Federal Agencies to Combat Global Threats

March 8, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9298 shares
    Share 3719 Tweet 2325
  • Fixed Wireless Access: Communications Infrastructure Podcast for the Public Sector

    72 shares
    Share 29 Tweet 18
  • Laid-off Tech Workers Find Unexpected Opportunities with Federal Government Contractors

    10 shares
    Share 4 Tweet 3

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us