Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home CRM Systems Customer Service Business Intelligence Sales & Marketing More Topics...
Network Security
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Study Finds Basic Federal Cybersecurity Ignored
Study Finds Basic Federal Cybersecurity Ignored

By Jennifer LeClaire
February 4, 2014 1:50PM

Bookmark and Share
"Security isn't convenient, it doesn't make money, and it is only ancillary to an agency's primary mission," said Aaron Titus, chief privacy officer and general counsel at Identity Finder. "When data security compliance competes with core mission objectives, it isn't hard to understand why a bureaucrat may not spend time or money on data security."
 



A recent report about the worst passwords revealed that "password" was toward the top of the list for many consumers. But it turns out that "password" is also a popular password for government employees, which weakens the nation's cybersecurity.

That's one of the conclusions of the Senate cybersecurity report, which reveals that government agency systems are open to attack because they don't update with the latest security patches, have old anti-virus programs, or because employees don't choose solid passwords.

"While politicians like to propose complex new regulations, massive new programs, and billions in new spending to improve cybersecurity," said Sen. Tom Coburn, R-Okla., the ranking Republican on the committee, "there are very basic -- and critically important -- precautions that could protect our infrastructure and our citizens' private information that we simply aren't doing."

Systemic Change Needed

We turned to Matthew Standart, manager of Threat Intelligence at HBGary, a technology security firm. He told us the findings are not surprising.

"They reflect the overall state of security in most, if not all, organizations. Attackers are motivated to get in and they will do so by following the path of least resistance," Standart said. "These paths, or vulnerabilities, are the result of poor policy and planning, lack of resources and integration, insufficient technology and execution, or overall plain human error and negligence."

As he sees it, government agencies should lead, because technology alone won't fix the problem. Systemic change may be needed from the top down to foster a culture that is security-minded and aware, he said.

"Actions carry risk, but risk is usually ignored or discredited due to convenience or complacency. Leaders convey a message that IT and IT Security are both cost centers and an inconvenience, when their strategic alignment should be perceived as a necessary and powerful means to do business," Standart said.

"Auditors are always the laggards behind the adversaries, and leaders need to be in the right place to raise the bar and hold people accountable to be well above the bar. Organizations need to be proactive about security rather than reactive."

It's Your Problem

TK Keanini, CTO of Lancope, said the problem was that cybersecurity was an "everyone and everything problem," not just this computer or that network because it was deemed "critical infrastructure."

"Yes, it is important to call these out and label them as such but in this hyper-connected world, malicious intruders have hundreds of ways to go about their campaign, and only one needs to work. My point is that our daily lives, personal and at work, are blurring when it comes to information systems," Keanini told us. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:

Les S.:

Posted: 2014-03-06 @ 8:08am PT
Here are a few suggested best practices for Global Governance, Risk & Compliance:

- Be aware of the data that is being sent out of your control, either to an employee's cloud, the organizations own cloud, an employee's flash drive or via any of the 65,000+ available channels. It only takes a few seconds for a trusted employee or untrusted entity (e.g. malware) to send data such as PII or PCI to the cloud or "phone home", violating compliance regulations &/ or policy. You need to understand and know what data was sent, from where and to where it's going.
- Know what data you can send out of the network and where to. When data travels cross borders, as it does so often, the risk increases on an exponential basis for the data owner.

- Detection accuracy ensures you protect the correct data with the proper control and be alerted to irregular activity. Some data needs to be blocked, some just encrypted while other information can leave without any issue. Many "DLP" solutions cannot accurately provide both the content & context awareness to respond.

above quoted from www.gtbtechnologies.com

David C. Brown:

Posted: 2014-02-05 @ 7:35pm PT
Passwords can be a very difficult security issue. Too short and simple ones are easy to remember AND easy to guess and crack. Too long and people write them down and keep IT support tied up resetting passwords.

Here’s some password help.

I regularly use complex 22-character passwords that are
unique to each site and system that I use.

Using my method I do not have to write them down to remember them.

If you would like to learn how to use my method, visit the Resources page on my website and you can try it out for yourself.

Look for the free
“How to Create Secure and Easy2Remember Long Passwords” poster.

Check it out at https://www.businesscompletesolutions.com

I hope this makes life a little easier for my fellow IT and InfoSec people.

I wish you the very best.

Dave

David C. Brown, PMP, CISSP, CIP
S.M.A.R.T - Business Improvement Specialist
Business Complete Solutions



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Network Security
1.   Wall Street Journal Hacked Again
2.   Dropbox for Business Boosts Security
3.   Banks Hit by Android-Skirting Malware
4.   New Technology Defeats Privacy Efforts
5.   Juniper DDoS for High-IQ Networks


advertisement
Android SMS Worm on the Loose
Malware lets bad actors cash in.
Average Rating:
New Technology Defeats Privacy Efforts
Study identifies 3 browser techniques.
Average Rating:
Banks Hit by Android-Skirting Malware
34 institutions, four European countries
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
New Web Tracking Technologies Defeat Privacy Protections
Recently developed Web tracking tools are able to circumvent even the best privacy defenses, according to a new study by researchers at Princeton and the University of Leuven in Belgium.
 

Enterprise Hardware Spotlight
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Business Intelligence | Sales & Marketing | Contact Centers | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.