Interest in IT security occurs only after an incident. Then after the dust settles, it’s back to the same business as usual. No true concrete steps are taken, according to Directorate Executive, ATF. Take real steps for securing your data with SkyFlok!
SkyFlok provides protection against cyberattacks and remove the need to trust any single cloud provider. Choose the locations and providers where your and your client’s data is stored. You are in control of your files. Since SkyFlok does not store a single file in a single provider, this means that an attack in any single Cloud location does not compromise your data. Finally, we keep all past versions of your files, which means that you can always easily go back to them.
SolarWinds, a leading provider of powerful and affordable IT management software, today revealed the findings of its fifth Federal Cybersecurity Survey.
“This year’s results demonstrate the challenges facing government IT security pros, but also the progress they’ve made in meeting those challenges,” said Jim Hansen, VP of Products, Security and Cloud, SolarWinds. “The risk posed by careless untrained insiders and foreign governments is at an all-time high, yet for the most part, IT pros feel like their agencies are doing good jobs with their IT security. In particular, they believe that government mandates and investments in training are paying dividends.”
2019 Key Findings for the Federal Sector
IT security threats posed by careless/untrained insiders and foreign governments have risen substantially over the last five years.
- Fifty six percent of respondents believe careless untrained insiders are a significant source of IT security threats in their agencies, while 52 percent of respondents pointed to foreign governments as primary threats. When asked the same question five years ago, only 42 percent said insiders and 34 percent said foreign governments were the greatest sources of IT security threats.Contractors and temporary workers present unique IT security challenges to government agencies.
- Just over half of respondents believe IT security risks are greater with contractors (51 percent).
- The most frequently noted causes of breaches by contractors are: accidentally exposing, deleting, or modifying critical data (48 percent), accessing resources that are not necessary to do their job (46 percent), and using unsecured networks/Wi-Fi (42 percent).Government IT pros rely on training, access control, and monitoring to manage contractor risk.
- About half of respondents rely on ongoing security training (53 percent), multifactor authentication (50 percent), onboarding security training (49 percent), restricted use of external devices (48 percent), and data/systems monitoring (48 percent) to reduce the risks posed by contractors.Respondents that rate their organizations’ IT training highly are more likely to indicate their ability to prevent and detect insider threats has improved or they have it under control.
- On average, respondents rate their IT security training efforts as acceptable. Forty percent of respondents view their security training efforts as better than average or superior.
- Defense respondents give higher ratings for the comprehensiveness and the effectiveness of their IT security training relative to those from civilian agencies.IT security pros believe they are making progress managing risk due to government mandates, security tools, and best practices.
- When asked about their ability to detect and prevent insider threats, 66 percent of respondents said things have improved or are under control when it comes to malicious threats. When asked about accidental or careless insiders, this number decreased to 58 percent.
- When asked about the benefits of security frameworks or mandates, a majority of respondents felt that, with the exception of HIPAA, all the mandates they were asked about contributed to their ability to manage risk. This is an improvement over last year, when over half of respondents indicated that regulations and mandates posed more of a challenge.
- Respondents believe that their organization’s tools, policies, and practices are effective at reducing risk based on Center for Internet Security® (CIS) framework controls.
- Improved strategy, a concerted effort to apply security best practices, end user security awareness training, and intrusion detection and prevention tools all contributed to the successful risk management of threats posed by careless insiders.
- Key contributors to risk management of threats posed by malicious insiders include employee background checks, patching, and network traffic encryption.”The results of this year’s survey are encouraging, but there’s certainly more work to do,” said Mav Turner, VP of Product Strategy, SolarWinds. “In particular, agency IT professionals must continue to identify ways to improve security around contractors and temporary workers, who comprise a large population of the federal workforce, and insider and foreign threats continue to loom. Overall, agencies appear to be on the right track, with the right tools and policies in place-a trend we hope will continue into next year.”There is redundant and inefficient security on endpoints-specially desktops and notebooks. Traditional antivirus and scanning is not keeping up. It also adds tremendous processing overhead and degrades user experience. New ways of delivering security, such as network analytics and threat detection via AI, must be considered soon. — IT Director, ArmyInterest in IT security occurs only after an incident. Then after the dust settles (investigations, reviews, numerous warning and alert memos), it’s back to the same business as usual. No true concrete steps are taken, in my opinion. — Directorate Executive, ATFSecurity guidance needs to be produced internally much faster-how to take external direction and policy and provide guidance to program managers, operators, and developers. Now the solutions are being implemented with a best guess and the guidance comes next, leading to either compliance failures or the need to redo everything. — IT Director, DOD