A data backup strategy is intended to help ensure your government agency is prepared in case of a severe outage or disaster. Floods, fires, blackouts, malware, cyberattacks and natural disasters are the ones that worry IT administrators most, but what…
What federal government security architects need to know about zero trust
For the federal government, a zero trust architecture assumes that all traffic on an agency’s internal network is potentially malicious. Consequently, it requires taking measures to: Authenticate all connections Identify all devices, users, applications, and services Ensure that traffic goes…
How immutable backups are protecting the federal government from ransomware attacks
This article originally appeared on Quest Software’s official blog. Immutable backups play an increasingly important role in helping federal government agencies protect themselves from the catastrophic impact of ransomware. Agencies and the data they produce are continually changing, so your…
Ransomware Resilience and Disaster Recovery – 4 Actions Government Agencies Can Execute Today
Ransomware has been a prominent threat to government agencies, enterprises, and individuals alike since the mid-2000s. In 2017, the FBI’s Internet Crime Complaint Center (IC3) received 1,783 ransomware complaints that cost victims over $2.3 million. Those complaints, however, represent only the…
Federal government looks to bolster cybersecurity infrastructures due to heightened security threats
This article originally appeared on the official DLT Solutions blog. The heightened threat of retaliatory cyberattacks by Russia against critical U.S. IT infrastructure is prompting federal investments in cybersecurity to strengthen its cyber defense posture. The ongoing conflict in the…
DBAs, Data Owners, and the Security Team—Distinguishing the Key Players Who Keep SLED Data Safe
In a previous article on the GovCyberHub, we were joined by Amit Parikh, an Information Management Senior Consultant at Quest Software, who discussed the new reality facing state and local government Database Administrators (DBAs) and explained how advanced workload analytics…
How the U.S. Government Can Stop Cyber Threats Emerging from the Ukraine-Russia Conflict
This article originally appeared on the official DLT Solutions blog. Though the Ukraine-Russia conflict began when the Russian military invaded Ukraine last February, the cybersecurity and cyber warfare elements of this conflict began long before initial combat action. Ukraine was…
Microsoft’s Federal Security CTO on the impact of OMB’s zero trust strategy
Last January, the Office of Management and Budget (OMB) released M-22-09, a memorandum that set forth the federal government strategy on zero trust adoption, in an effort to reinforce the security and protection of government agencies’ critical systems, networks, and…
Why Digital Transformation is Good for Constituents, but Bad for DBAs
The day-to-day of a database administrator (DBA) working for a state, local, or municipal government or agency has changed significantly in the past few years. The digital transformation initiatives that became incredibly pervasive in the days following the start of…
How Government IT Can Plan for DDoS Attacks in 2022 and Beyond
Richard Hummel, ASERT Threat Research Lead at NETSCOUT, recently joined GovCyberHub to detail some of the topline messages from the NETSCOUT Threat Intelligence Report and shared how DDoS attacks have evolved over the second half of 2021. During our conversation, he described…