{"id":5078,"date":"2021-04-13T11:40:15","date_gmt":"2021-04-13T11:40:15","guid":{"rendered":"https:\/\/stash.global\/?page_id=5078"},"modified":"2021-12-23T12:42:31","modified_gmt":"2021-12-23T12:42:31","slug":"government","status":"publish","type":"page","link":"https:\/\/stash.global\/industries\/government\/","title":{"rendered":"Government"},"content":{"rendered":"\t\t
Of all vulnerable segments, government is the least protected from intrusions & data heists, relying as it does on unique by division legacy systems, that can\u2019t deliver the protection required.<\/strong><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t Central, State, and Municipal Government Departments and Agencies are the targets of an accelerating and full range of cyber-attacks. Adversaries include hackers\/hacktivists, malicious insiders, nation-state actors, criminals, organized crime, and terrorists.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Adversaries include hackers\/hacktivists, malicious insiders, nation-state actors, criminals, organized crime, and terrorists. Their tools range from bots and \u201ccopy from the web\u201d scripts to sophisticated zero-day vulnerabilities. And their impact can be severely damaging both to agencies\u2019 ability to operate and public confidence in government. This is a big challenge because of the huge volume of threats that agencies face on a daily basis and the scale of the potential consequences if successful. The scale of the data sets held by government, and their significance for adversaries, was illustrated by the theft of over 22 million federal employees\u2019 background investigation records from the US Office for Public Management. Government information security leaders have to operate in a complex environment of numerous systems, aging infrastructure, skill shortages, and funding constraints. They are also required by law to keep data for long periods, in the case of Archives for hundreds of years.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\tStay safe and secure online.
Counter and STOP cyber threats<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t