Ransomware and SLED – Why K-12 institutions and municipalities are juicy targets for hackers

This article originally appeared on TD Synnex’s official blog, HERE. Ransomware attacks against K-12 educational institutions have been on the rise in recent years, and the Cybersecurity and Infrastructure Security Agency (CISA) has taken notice. School networks have become juicy…

What federal agencies need to know about continuous data protection

Continuous data protection has emerged as a form of data protection for federal government agencies that picks up where legacy backup approaches leave off. For decades, the standard of care in protecting federal data has been to run full scheduled…

How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense

Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…

Federal data backups (Part 2) – How government agencies can build, document, and test their backup and recovery strategies

Last time on the GovCyberHub, we explored the first four steps of our seven-step guide that your government agency can use to inform your organization’s data backup strategy, going over how to effectively evaluate and assess your data, risks, goals,…

Data backup strategies (Part 1) – An essential step-by-step guide for federal government agencies

A data backup strategy is intended to help ensure your government agency is prepared in case of a severe outage or disaster. Floods, fires, blackouts, malware, cyberattacks and natural disasters are the ones that worry IT administrators most, but what…

What federal government security architects need to know about zero trust

For the federal government, a zero trust architecture assumes that all traffic on an agency’s internal network is potentially malicious. Consequently, it requires taking measures to: Authenticate all connections Identify all devices, users, applications, and services Ensure that traffic goes…

How immutable backups are protecting the federal government from ransomware attacks

This article originally appeared on Quest Software’s official blog. Immutable backups play an increasingly important role in helping federal government agencies protect themselves from the catastrophic impact of ransomware. Agencies and the data they produce are continually changing, so your…

Ransomware Resilience and Disaster Recovery – 4 Actions Government Agencies Can Execute Today

Ransomware has been a prominent threat to government agencies, enterprises, and individuals alike since the mid-2000s. In 2017, the FBI’s Internet Crime Complaint Center (IC3) received 1,783 ransomware complaints that cost victims over $2.3 million. Those complaints, however, represent only the…

Federal government looks to bolster cybersecurity infrastructures due to heightened security threats

This article originally appeared on the official DLT Solutions blog. The heightened threat of retaliatory cyberattacks by Russia against critical U.S. IT infrastructure is prompting federal investments in cybersecurity to strengthen its cyber defense posture. The ongoing conflict in the…

DBAs, Data Owners, and the Security Team—Distinguishing the Key Players Who Keep SLED Data Safe

In a previous article on the GovCyberHub, we were joined by Amit Parikh, an Information Management Senior Consultant at Quest Software, who discussed the new reality facing state and local government Database Administrators (DBAs) and explained how advanced workload analytics…