Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Resources Dell Technologies - Be Ready for What's Next Cyber Security

Working Together to Bolster Federal Cybersecurity Efforts in a Hybrid World

by GTI Editors
November 1, 2021
in Cyber Security, Dell Technologies - Be Ready for What's Next
Reading Time: 4 mins read
A A
federal cybersecurity
Share on FacebookShare on Twitter

Last month, the White House issued a statement for National Cyber Security Awareness Month, stating that, “Any disruption, corruption, or dysfunction of our vital infrastructure can have a debilitating effect on national and economic security, public health, and our everyday safety.” Yet, there is a constant and persistent threat of malicious cyber attacks in the form of ransomware, phishing, and more that are disrupting hospitals, schools, supply chain suppliers, and small businesses across the U.S.

The threats are increasingly more difficult to protect against in the current hybrid work environment. As organizations are becoming more disparate and remote, new risks arise for the public sector workforce. “Some of the biggest threats for remote teams are social engineering, system access authentication, insecure home networks or WiFi networks, and unencrypted file and data storage,” Mike Nagy, Chief Technology Officer for Lyme Technology Solutions, recently told us.

Understanding the risks that small businesses and public sector institutions are facing, the Biden Administration has put into place requirements to ensure that cyber and communications infrastructure are protected. “Earlier this year, I signed an Executive Order to modernize and improve the security of our technology including areas like software security, information sharing, and federal network modernization,” President Biden wrote in a Cyber Security Proclamation. The EO directs agencies to only purchase products from companies that meet strong federal cybersecurity standards, thereby putting pressure on the private sector to raise the bar on their cybersecurity efforts.

According to Nagy and his colleague Justin Gedney, Senior Systems Engineer at Lyme Technology Solutions, this directive will have the greatest impact on small businesses that will need to ensure they’ve met the requirements to “do their part” in today’s tumultuous environment. “Managing cyber threats requires technology and manpower,” stated Gedney. “For small businesses looking to do business with the government, this will be significant investment to meet compliance with the Executive Order.”

On the flip side, federal agencies are working double time to ensure that they are also in compliance with the new EO, and quickly. Since releasing the order, additional memos were released around incident response, critical software, and a Zero Trust Architecture strategy draft. Each of these memos outline how agencies will be held accountable for ensuring a cyber practice is put in place. For example, the Office of Management and Budget has given agencies 60 days to access how they log cyber incident data as part of the Endpoint Detection and Incident Response model provided. It requires agencies to identify gaps for early detection, outline a mitigation plan for response, and leverage advanced technologies for remediation.

From a proactive perspective, Gedney told us that advanced technologies and practices are needed for a robust federal cybersecurity approach, such as “encryption of data-in-transit and data-at-rest” as well as advanced monitoring tools. Yet, there is no substitute for training and educating end-users, he advised. “End-user training is the most important aspect to combat cyber attacks. If everyone is aware and looking out for threats, the chance of a breach becomes significantly less. Technology is put in place to aid the behavior.”

In the end, for our nation to bolster its cybersecurity efforts, it will require public-private partnerships, collaboration, and all users to “do their part” in adhering to cyber security best practices.

For more information about federal cybersecurity solutions, reach out to the Lyme Technology Solutions team at sales@lyme.com or visit www.lyme.com. You can learn more about how they partner with Dell Technologies here.

Tags: Biden AdministrationCyber Security ProclamationExecutive OrderFederal CybersecurityLyme TechnologiesMike NagyNational Cyber Security Awareness MonthRansomwareZero Trust Architecture

RELATED POSTS

Creating Human-Centered Federal Customer Experiences
Customer Experience

Creating Human-Centered Federal Customer Experiences

January 6, 2023
Whole-of-State Security Might be the Key to Stronger Cyber Defenses for State and Local Governments
Cybersecurity

Whole-of-State Security Might be the Key to Stronger Cyber Defenses for State and Local Governments

January 4, 2023
Consistency is the Key to Creating Outstanding Customer Experiences
Connecting to the Customer

Consistency is the Key to Creating Outstanding Customer Experiences

November 17, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    8274 shares
    Share 3310 Tweet 2069
  • The Department of Defense is Embracing a Holistic Approach to Transformation and Modernization

    30 shares
    Share 12 Tweet 8
  • The Five Pillars of Zero Trust Architecture

    332 shares
    Share 133 Tweet 83
  • Identifying the Building Blocks for a Successful Zero Trust Journey

    16 shares
    Share 6 Tweet 4

CONNECT WITH US

Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us