Protecting privileged accounts is an important part of any agency cybersecurity strategy because these accounts have access to a lot of sensitive information in organizations. Hear how Rod Simmons recommends agencies prevent external threats from compromising these accounts.
Posts Tagged: hacking
Changes in federal government keep coming fast. That’s why GovLoop is giving you these weekly recaps of presidential transition news that may affect agency management and employment.
How can a group of individuals spread across the globe, working behind their personal computers, with no real budget, successfully take down organizations and governments with millions—sometimes billions—of dollars to spend on cybersecurity?
Developing a truly effective cybersecurity culture requires that agencies take a deeper look at how they promote and enforce cybersecurity policies among their employees. With that in mind, here are five tips we’ve found beneficial for fostering a cyber-aware professional culture.
Last weekend, New Zealand joined Australia for GovHack 2015. If you’re not familiar with the idea, this is a 2-day hackathon set up for people – community, industry, academia, civil society and public sector − to get creative with government data. The goal is to build some ‘thing’ using open government data. To be clear: this is… Read more »
Hackers, hackers everywhere. If you’ve been following the news recently, the “hacker” label probably doesn’t give you a warm-fuzzy sensation. But hackers aren’t always bad guys. To the software development community, hacking simply means taking a piece of code and altering it. It can be used for wrongdoing, but it can also be used to… Read more »
OmniStudio is often asked if WordPress sites are more vulnerable to security breaches than other content management platforms. With all websites, even those run by Fortune 500 companies, the threat of hacking is ever present, regardless of the platform it’s built within. Professional website design and development firms who use open source platforms, like WordPress or… Read more »
In the time it takes you to read this short article, an intruder can create 3-5 user accounts within your business system. Social engineering is a technique hackers use to take over an account by persuading or psychologically manipulating people to divulge confidential information. This is usually the first step within a more complex scheme…. Read more »
For the first time since I became an internet user (1998), I admit that I am afraid of being hacked, and apparently, I am not alone. According to Reuters, U.S. citizens fear having their credit cards, computers, or smartphones hacked more than any other crimes. Six years ago, I planned our Florida destination wedding entirely… Read more »
On January 12, a group claiming to be connected to ISIS hacked the Twitter and YouTube accounts of U.S. Central Command, also known as CENTCOM. If the military can be hacked, is your agency’s social media vulnerable to a hacker attack? How can your agency protect itself on social media? The hack of CENTCOM’s social… Read more »