{"id":21925,"date":"2023-05-04T07:20:56","date_gmt":"2023-05-04T15:20:56","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/05\/04\/news-15656\/"},"modified":"2023-05-04T07:20:56","modified_gmt":"2023-05-04T15:20:56","slug":"news-15656","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/05\/04\/news-15656\/","title":{"rendered":"Cybersecurity Guide: Securing Government Agencies"},"content":{"rendered":"<p><strong>Credit to Author: Doug Aamoth| Date: Thu, 04 May 2023 14:34:59 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Cyber threats in the government sector continue to grow in both volume and complexity. 58% of state and local government organizations were hit by ransomware in 2021 \u2013 a massive 70% increase in the rate of ransomware attacks over the previous year. Furthermore, 59% of organizations reported an increase in attack volume and complexity over the last year, and 56% reported an increase in the impact of attacks.<\/p>\n<p>Government agencies are custodians of highly sensitive data, whether national security, critical infrastructure, or information on individual citizens. At the same time, shrinking IT budgets, a skills shortage, cloud adoption, and reliance on a wide network of contractors and third-party vendors are widening the attack surface.<\/p>\n<p>In light of such challenges, government agencies need powerful cybersecurity against financially and politically motivated threat actors who try to steal and manipulate sensitive data, disrupt essential services, and threaten the national assets of government states.<\/p>\n<h2>The evolving threat landscape in government agencies<\/h2>\n<p>In addition to the growing professionalism and evolving tactics, techniques, and procedures employed by criminal groups, there are a few other factors that are increasing the cybersecurity challenges in this sector:<\/p>\n<ul>\n<li>All government agencies have vast stores of data ranging from personally identifiable information (PII) on citizens: health, digital identification, and tax information, to sensitive commercial corporate data, and state and national level secrets that need to be protected to preserve citizens\u2019 privacy and national security<\/li>\n<li>Phishing attacks in government agencies are rising, and their impact can be enormous given the scale and critical nature of the data they hold<\/li>\n<li>Hostile state-sponsored threat actors hack government systems to disrupt essential services, threaten national assets, and bring embarrassment or erode trust in the government<\/li>\n<li>Hacked government agencies can give access to systems of interlinked government departments, third-party vendors, and corporate entities working with them<\/li>\n<li>Government data needs to be shared between different government agencies and commercial partners across multiple jurisdictions, making secure remote access a necessity<\/li>\n<li>Government agencies must ensure 24\/7 availability of government networks and online applications that provide critical services, such as tax payments, healthcare portals, and similar platforms to citizens<\/li>\n<li>Third-party users like social workers or healthcare staff, vendors, and commercial partners need continuous external access to the network from different devices \u2013 increasing third-party risks of data privacy breaches, fraud, and credential theft<\/li>\n<li>Cybercriminals are targeting the cloud to exploit less established cybersecurity practices than in traditional on-premises environments<\/li>\n<\/ul>\n<h2>Sophos can help<\/h2>\n<p>Download our <a href=\"https:\/\/assets.sophos.com\/X24WTUEQ\/at\/gx769x65jgj834kjv9mfjb\/sophos-cybersecurity-guide-for-government-agenies-wp.pdf\">Cybersecurity Guide for Government Agencies<\/a> to learn how Sophos can help address the most common cybersecurity challenges facing the <a href=\"https:\/\/www.sophos.com\/en-us\/solutions\/industries\/government\">government sector<\/a>.<\/p>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-detection-and-response\">Sophos MDR<\/a> is our fully-managed, 24\/7 service delivered by experts who specialize in detecting and responding to sophisticated cyberattacks that technology solutions alone cannot prevent. As the world\u2019s most trusted MDR provider and with many hundreds of government sector customers, we have unparalleled depth and breadth of expertise when it comes to threats facing the government sector. Sophos MDR applies learnings from defending one government agency to all others in the sector, generating \u201ccommunity immunity\u201d and elevating everyone\u2019s defenses.<\/p>\n<p style=\"text-align: center\"><em>\u201cSophos MDR frees us up to do more interesting and more development-style work rather than just day-to-day security support.\u201d <\/em><\/p>\n<p style=\"text-align: center\">UK Independent Parliamentary Standards Authority<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/05\/Screenshot-2023-05-01-124525.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-91489\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/05\/Screenshot-2023-05-01-124525.png?w=300\" alt=\"\" width=\"300\" height=\"162\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/05\/Screenshot-2023-05-01-124525.png 807w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/05\/Screenshot-2023-05-01-124525.png?resize=300,162 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/05\/Screenshot-2023-05-01-124525.png?resize=768,416 768w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><a href=\"https:\/\/www.sophos.com\/en-us\/products\/zero-trust-network-access\">Sophos ZTNA<\/a> eliminates vulnerable VPN clients, enabling government agencies to offer secure and seamless access to resources for remote users defined by policies. It removes implicit trust in your environment\u2019s applications, users, and devices, allowing segmented access to your systems and resources to just those who need it.<\/p>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/products\/next-gen-firewall\/ecosystem-central\">Sophos Secure Access Portfolio<\/a> enables government agencies to connect remote and branch sites, deliver critical cloud and SaaS applications such as Dropbox, Salesforce, and similar services, and share data and information between sites. It includes:<\/p>\n<ul>\n<li>Sophos ZTNA to support secure access to applications<\/li>\n<li>Sophos SD-RED remote Ethernet devices to safely extend your network to branch locations and remote devices<\/li>\n<li>Sophos Wireless access points for easy and secure wireless networking<\/li>\n<li>Sophos Switch for secure access on the LAN<\/li>\n<\/ul>\n<p>Everything is managed through a single cloud-based security platform, Sophos Central.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/05\/04\/cybersecurity-guide-securing-government-agencies\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/05\/government.jpg\"\/><\/p>\n<p><strong>Credit to Author: Doug Aamoth| Date: Thu, 04 May 2023 14:34:59 +0000<\/strong><\/p>\n<p>Sophos optimizes defense capabilities and frees up government IT teams to focus on their businesses.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[1328,25038,24562,26709,28851,17812,27604,24563],"class_list":["post-21925","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-government","tag-mdr","tag-products-services","tag-sase","tag-secure-access-portfolio","tag-solutions","tag-sophos-mdr","tag-sophos-ztna"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21925"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21925\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}