Quest’s Chris Roberts on the current state of federal zero trust

It has been more than two years since President Biden released his Executive Order (EO) on Improving the Nation’s Cybersecurity. Paramount to this EO was the directive for federal agencies to move towards adopting and implementing zero trust cybersecurity architectures.…

AD migration and consolidation (Part 2)—The tools and best practices federal agencies should employ to reach their desired end-states

In our last article, the GovCyberHub sat down with Quest Software’s Chris Esler to examine the reasons why federal agencies migrate and consolidate their Active Directory (AD) environments, as well as delve into the many different benefits these processes deliver…

AD consolidation and migration (Part 1)—What federal agencies need to plan for and consider beforehand

As federal IT continues to evolve, it is not uncommon for government agencies to reorganize how they conduct business to match the pace of advancements in technologies. Add into the mix that administrations and leadership can change every four years,…

Why the federal government’s lagging MFA adoption rate poses severe cyber risks to agency networks

According to Microsoft’s Vice President of Identity Security, Alex Weinert, only 25 percent of organizations today have adopted multi-factor authentication (MFA) as part of their overall cybersecurity infrastructure. That is a shining statistic when compared to 2017’s adoption rate of…

Ransomware and SLED – Why K-12 institutions and municipalities are juicy targets for hackers

This article originally appeared on TD Synnex’s official blog, HERE. Ransomware attacks against K-12 educational institutions have been on the rise in recent years, and the Cybersecurity and Infrastructure Security Agency (CISA) has taken notice. School networks have become juicy…

3 ways data optimization can enhance your federal agency’s data backups

As federal government agencies are increasingly under pressure to back up and recover data quickly, accurately and within budget, data growth in the cloud continues to make backup and recovery increasingly complex. Backing up all your data is a challenge…

Federal data backups (Part 2) – How government agencies can build, document, and test their backup and recovery strategies

Last time on the GovCyberHub, we explored the first four steps of our seven-step guide that your government agency can use to inform your organization’s data backup strategy, going over how to effectively evaluate and assess your data, risks, goals,…

Data backup strategies (Part 1) – An essential step-by-step guide for federal government agencies

A data backup strategy is intended to help ensure your government agency is prepared in case of a severe outage or disaster. Floods, fires, blackouts, malware, cyberattacks and natural disasters are the ones that worry IT administrators most, but what…

5 ways federal government agencies can reduce risk from attack vectors

A data breach can be a catastrophic event for any federal government agency. One way to help curb potential exploits is to get a handle on potential attack vectors. An attack vector is the combination of a bad actor’s intentions…

3 ways SAP monitoring solutions are boosting mission success for government agencies

For most government agencies, SAP® applications are mission critical. Yet, SAP performance management is still notoriously complicated and unreliable. That’s why it’s critical for agencies’ IT teams to prioritize the monitoring of the SAP landscape with solutions that will not…