Cybersecurity breaches in the government seem to be all over the news. (If you haven’t heard of Edward Snowden… well, he may know who’s heard of you – that’s all we’ll say.) The sheer number and wild variety of sources for these breaches led us at SolarWinds to wonder what federal agencies are really dealing with on a regular basis – are insiders leaking data? Are hackers stealing it? Who’s responsible and what can federal IT operations and IT security teams do to prevent these breaches?

 

We partnered with leading government research provider Market Connections to survey 200 IT and IT security professionals in the federal government and military on the top cybersecurity threats they face as well as what obstacles they have to implementing IT security strategies and what actions they are taking to remediate threats.

 

These survey results demonstrate that a broad and concerning range of cybersecurity threats plague government agencies with threat sources coming from careless and untrained agency insiders nearly as frequently as from malicious attackers and hackers from without.


whiteboard.png

While federal IT Pros face cybersecurity threats both from malicious outsider threats and internal ignorance, they must prevent and mitigate these attacks despite organizational issues and budget constraints. Finding the right software can provide much of the tech armor an agency needs to automate monitoring and thwarting of threats, but acquiring that technology has its own set of obstacles.


whiteboard2.png

Given the variety of cybersecurity threats and the unpredictability of human behavior, coupled with budget and organizational challenges, federal IT Pros must consider taking a more pragmatic and unified approach to addressing the availability, performance, and security of their infrastructures. By the “collecting once, reporting to many” theory, federal IT Pros can opt to use tools that address continuous monitoring of their networks, servers and apps across both their IT Operations and Information Security domains for maximum IT security coverage.


Full survey results: