GovCybersecurityHub Editors
87 Articles0 Comments

12 Privileged Access Management best practices for federal agencies

No matter what risks a federal government agency is facing, you can draw a threat vector from that risk to a privileged account. Privileged accounts are the backbone of any operating agency, so it’s vital that these accounts are protected…

What federal agencies need to know about continuous data protection

Continuous data protection has emerged as a form of data protection for federal government agencies that picks up where legacy backup approaches leave off. For decades, the standard of care in protecting federal data has been to run full scheduled…

How federal government agencies can get the most out of their MFA implementation

Authentication is the new entry point into federal government networks. Most federal users know this, and more importantly, attackers know this as well. Federal agencies can no longer recommend changing passwords on a periodic basis and consider that an adequate…

9 insider threats that are impacting endpoint security

This article originally appeared on Quest Software’s official blog, HERE. Insider threats take several forms for federal government agencies. In a classic scenario, highly privileged contractors install spyware that exfiltrates sensitive data to them long after their project is complete.…

Happy Holidays from the GovCybersecurityHub Team

The GovCybersecurityHub will be back with even more content in 2023. We would like to thank you for visiting us in 2022, and encourage you to come back in the New Year to see what we’ve got in store. Have a…

How the U.S. Air Force is prioritizing interoperability, cybersecurity, and resiliency

A top priority for the Department of the Air Force (AF) (which includes both the Air Force and Space Force) is enhancing its access, partnership and integration capabilities across IT systems, but also other parts of government. The department’s vision…

12 data governance tips that every federal agency should keep in mind

Data governance best practices ensure that your federal agency’s data is being created, collected, stored, and accessed by the right people for the right purpose. Which processes have you put in place to manage access, availability, usability, quality and security?…

How federal government agencies can navigate the challenges of cloud data warehouse adoption

This article originally appeared on Quest Software’s official blog. As federal government agencies prioritize their digital transformation goals, two trends in modernization, namely the hybrid cloud and the “cloud data warehouse,” have converged presenting a real opportunity to move the…

3 ways data optimization can enhance your federal agency’s data backups

As federal government agencies are increasingly under pressure to back up and recover data quickly, accurately and within budget, data growth in the cloud continues to make backup and recovery increasingly complex. Backing up all your data is a challenge…

Federal data backups (Part 2) – How government agencies can build, document, and test their backup and recovery strategies

Last time on the GovCyberHub, we explored the first four steps of our seven-step guide that your government agency can use to inform your organization’s data backup strategy, going over how to effectively evaluate and assess your data, risks, goals,…