Ransomware and SLED – Why K-12 institutions and municipalities are juicy targets for hackers

This article originally appeared on TD Synnex’s official blog, HERE. Ransomware attacks against K-12 educational institutions have been on the rise in recent years, and the Cybersecurity and Infrastructure Security Agency (CISA) has taken notice. School networks have become juicy…

What federal agencies need to know about continuous data protection

Continuous data protection has emerged as a form of data protection for federal government agencies that picks up where legacy backup approaches leave off. For decades, the standard of care in protecting federal data has been to run full scheduled…

How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense

Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…

The current state of government AppSec and the threats agency developers face

For IT professionals who develop the technologies, applications, and services that federal, state, and local government agencies employ, there is one specific challenge that they always find themselves brushing up against. When government agencies request new applications and expect them…

Federal data backups (Part 2) – How government agencies can build, document, and test their backup and recovery strategies

Last time on the GovCyberHub, we explored the first four steps of our seven-step guide that your government agency can use to inform your organization’s data backup strategy, going over how to effectively evaluate and assess your data, risks, goals,…

Data backup strategies (Part 1) – An essential step-by-step guide for federal government agencies

A data backup strategy is intended to help ensure your government agency is prepared in case of a severe outage or disaster. Floods, fires, blackouts, malware, cyberattacks and natural disasters are the ones that worry IT administrators most, but what…

5 ways federal government agencies can reduce risk from attack vectors

A data breach can be a catastrophic event for any federal government agency. One way to help curb potential exploits is to get a handle on potential attack vectors. An attack vector is the combination of a bad actor’s intentions…

How immutable backups are protecting the federal government from ransomware attacks

This article originally appeared on Quest Software’s official blog. Immutable backups play an increasingly important role in helping federal government agencies protect themselves from the catastrophic impact of ransomware. Agencies and the data they produce are continually changing, so your…

Ransomware Resilience and Disaster Recovery – 4 Actions Government Agencies Can Execute Today

Ransomware has been a prominent threat to government agencies, enterprises, and individuals alike since the mid-2000s. In 2017, the FBI’s Internet Crime Complaint Center (IC3) received 1,783 ransomware complaints that cost victims over $2.3 million. Those complaints, however, represent only the…

How the U.S. Government Can Stop Cyber Threats Emerging from the Ukraine-Russia Conflict

This article originally appeared on the official DLT Solutions blog. Though the Ukraine-Russia conflict began when the Russian military invaded Ukraine last February, the cybersecurity and cyber warfare elements of this conflict began long before initial combat action. Ukraine was…