How Agencies can Respond to Future Cyber Attacks with Incident Response

Data breaches. Not a day seems to pass by without concerns about new vulnerabilities, a successful hack, or a scramble to respond.

Without an incident response plan, the impact can be catastrophic as we’ve seen at OPM, IRS, and the list goes on. It makes the difference between a hacker simply getting in the front door without fruitful results and one that sneaks in, lays low for months and compromises or steals vast amounts of sensitive data. It also creates a huge PR headache and compromises employee trust.

Symantec Now Protecting More Than One Billion IoT Devices

The Internet of Things (IoT) just got a lot more secure. DLT partner, Symantec, announced in late August that it is securing more than one billion IoT devices – including everything from ATMs to vehicles to critical infrastructure.

The number of IoT devices is expected to reach 25 billion by 2020, and from a security perspective remain particularly vulnerable to attacks because of their always-on nature.

Finding the Positives in the Wake of the Data Breach at OPM

We all know the negative outcomes of the data breach at the Office of Personnel Management (OPM) and can only hope that there are no more surprises stemming from the hack. Yet, despite the gloom and doom, the attack has delivered some positives and has quickly become a major catalyst for change in how the government approaches cybersecurity. Below are two positives (and more to come), that we’ve been able to identify so far:

3 Steps Government Agencies Should Take to Prevent Data Breaches

According to the Government Accountability Office (GAO), over 25,500 data incidents at federal agencies occurred in 2013 alone. Breaches in 2014 also occurred in highly visible agencies like the White House, State Department and Postal Service just to name a few.  To avoid being on GAO’s 2015 report, agencies need to take a 3-step approach to prevent data breaches:

1. Implement real-time network visibility

Going Beyond Layered Security to Respond Rapidly to Advanced Cyber Threats

IT organizations have never been as well equipped to deal with sophisticated security threats as they are today. But at the same time, IT organizations have never been at greater risk.

Despite putting in place policies, controls, technologies and so on, cyber adversaries have never been in a greater position of strength. According to DLT partner, ForeScout, attackers are increasingly coordinated and have a wealth of resources to draw from, including hacking communities, organized crime, and nation states.