How to Avoid a Data Breach

Government agencies are becoming prime targets for cyber attackers, they hold data for ransom. Whatever the rationale of the cyber attackers, it is imperative that government agencies need to pull up their socks to understand the gravity of the situation, Take the Baltimore data breach which occurred twice in less than a year. Large corporations and government agencies, US municipalities need to take a look at their existing IT infrastructure to avoid any future cyber-attacks and look to plug the holes soon.

A recent study by cyber security research firm Recorded Future finds surge in state and local government ransom ware attacks targeting essential infrastructure and processes. The study revealed that reported attacks on state and local government skyrocketed by 39 percent in the US in 2018, and that many of these attacks were opportunistic: in most cases, attackers “stumbled” upon public-sector entities when looking for vulnerable targets.

Though there is no ideal solution, but few suggestive measures that can be considered to avoid a data breach:

  • Have a proper maintenance of perimeter security software and infrastructure and test it periodically.
  • Backup all critical data
  • Beware of phishing
  • Remove local admin privileges to contain and block attacks -have a combination of least privilege and application control policies on endpoints and servers as part of a larger Zero Trust approach, to mitigate the risk of attack
  • Latest versions of software with regular updates and systems must be in place
  • Plug holes in the existing legacy devices during transition to newer systems
  • Faster budgetary approvals to purchase security tools.
  • Look at providing a cloud-based services to avoid costs and increase security
  • Have a proper cyber insurance in place
  • Have a proper MSSP who can work provide end point detection and response, security information and event management (SIEM) and other managed services
  • Make that transformation change in IT systems and security polices

It is time that organizations and government agencies start getting educated on the risks of these data breaches and take appropriate measure to plug it, as these attacks and data breaches will be on the rise – agility and best security practices must be in place to avoid your next breach.

Related Articles

Sennovate Insights: Gartner Magic Quadrant in Access Management 2019

Sennovate Insights: Gartner Magic Quadrant in Access Management 2019 Technology providers are present worldwide, but to know who is the best among the vendors is a challenging task for analysts, and for organizations to choose, as each vendor offering will have some...

Real ID-Compliant – A Must for all Residents

Real ID-Compliant – A Must for all ResidentsStarting October 1, 2020, every State and Territory Resident will need to present a REAL ID-compliant license/ID or another acceptable form of identification (like a passport or passport card) for boarding commercial...

AI Bias And Related Cyber Security Issues

AI Bias And Related Cyber Security IssuesAI systems is on a fast pace, many AI based systems and tools are already emerging or in development stage and soon to hit the market.  The business for AI looks exciting, however there is a dark side which is also emerging  -...

Stay Up to Date With The Latest News & Updates

Join Our Newsletter

Unleash more of your potential with weekly updates, tailored for your team.