Security Is a Top Priority for Feds and Should Be Moving Forward
It’s no secret that security is top priority for the federal government. It seems like every week we are hearing about a new threat, hack, or breach that has hit an agency. In just the past few weeks, we’ve heard about significant breaches that have resulted in both citizen and federal employee information being compromised.
Obviously, these kinds of attacks are putting agencies on alert. This is especially important as organizations continue to embrace new technologies and polices to improve operations and efficiency. As technology investments bring great new capabilities to government, it’s imperative that IT managers design security in from the very beginning.
I recently discussed this topic in an article published in Federal Times. The article explored how the Internet of Things (IoT) and Internet of Everything (IoE) need cybersecurity protection. In addition to a projected $4.6 trillion in value for global public sector by 2022, the enhanced connectivity offered by IoE technologies also creates an increased need for network security. For example, while BYOD programs are tremendously valuable, these initiatives also create a larger surface area for potential attacks by adding devices to the networks.
With billions of devices expected become connected over the next five years, it’s important that agencies have a plan in place to address their security needs. In general, agencies should focus their efforts on creating a cybersecurity strategy that is visibility-driven, threat-focused and platform-based. As more individuals and devices need network access, having real-time visibility becomes even more critical to gaining insight on surrounding threats and identifying system vulnerabilities. Also, presuming the network has already been breached it can help agencies be more proactive their approach. And lastly, a platform-based approach will provide scalability and flexibility required to address a variety of threats and reduce complexity through centralized management.
The number of ways IoE can make our lives better and our organizations more efficient depends mainly on our ability to think of new ways to use the technology. If we can be confident in the security of IoE, we can be confident developing more applications for it. All organizations should be in a position to ask, “Now that I am confident with my protection, what new things can I develop to save money or time and delight my users?”