Government Technology: Imagine this: A cleverly devised email evades your anti-spam filters. It arrives with a malicious link into several thousand state government email inboxes at 2 p.m. on Saturday.
Or, a series of unexpected connections to South America are initiated from inside local government firewalls just after midnight on Sunday.
Or, several large file transfers to Asia containing gigabytes of sensitive data are flagged deep within your system logs at 9 p.m. one evening.
Now some questions: Assuming that your enterprise monitoring systems could learn about these events from key indicators, would the right technical staff be available to take action or start risk mitigation steps? How long would it take? Could your team react in time to stop security breaches from happening?
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Nowi360Gov is an intelligent network of websites and e-newsletters that provides government business, policy and technology leaders with a single destination for the most important news and analysis regarding their agency strategies and initiatives.
Telephone: 202.760.2280
Toll Free: 855.i360.Gov
Fax: 202.697.5045
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Now