Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Federal cyber security and mobility in execution

Author: Megan Darcy
by Megan Darcy
Posted: Jun 23, 2017

As the Federal Government is growing bigger and bigger, the proneness to cyber attack of its agency systems are growing geometrically. And as the entire network of users and diverse agencies is becoming more integrated, multiple access points make the entire system vulnerable to attack.

Though the government is aware of the hazards and is taking action. Frequently this has inhibited the productiveness of various agencies while concurrently causing the use of remote unsafe devices that enhance cyber hazard.

The endeavor to improve cyber security is a priority. Many federal executives nonetheless, find that they are inhibited by awkward cyber security policies and procedures at their agency in the areas of information access, computing mobility and functionality. The measures taken by the agency often create cyber-security related obstacles, like being forced to access information at home and disrupted communication with other staffs. Therefore, productivity suffers. While cyber attackers are nimble and creative, federal agency response remains rule bound and out of date.

The resultant online cyber security measures, frequently more bureaucratic than threat responsive, limit access to webmail accounts and websites that can be beneficial to federal executives. Limiting these types of information sources frequently negatively impacts the effectiveness with which executives do their jobs. Agency personnel frequently face slow-loading websites, delayed login times, boring email downloads, and prolonged file download times.

To maintain productiveness, federal staffs and executives often resort to less safe practices when cyber security protection related limitations prevent access to information they require for their jobs. The most dominant optional method of accessing information is the utilization of non-agency devices such as usb thumb drives, random media and unprotected wireless devices. Cyber attackers can utilize these unprotected devices to cause mayhem with other protected networks.

Federal executives often work outside agency buildings. Recent surveys show that roughly half of those responding do at least some work at home or on travel. To alleviate working beyond the office, federal agencies frequently offer them with a mobile device, and many executives have an agency-offered laptop. Many of these devices don’t have the require cyber security precautions.

As federal executives usually believe access to information is the most vital factor to consider while pondering changes to cyber security policy, it follows, then, that respondents most often recognize access to information as inhibited by cyber security measures. It is a major cause of lower productiveness at their agency.

Agencies should understand that, to enhance productiveness, executives and main staffs should work offsite with the mobile devices. Latest measures that add cyber security protection to these devices are necessary without sacrificing productiveness.

More applicable, organized and timely cyber policies are necessary at all federal agencies. Along with information access, many federal executives feel that other factors, including agency mission, response time, interconnectivity and computation of functionality should be prioritized to better cyber security policies in the federal area.

Author Info:-

Cyber Security Advisers is your most reliable choice to improve cyber security online cyber security, Cyber security protection.

About the Author

Megan Darcy has written numerous articles about cyber attacks and security. His recommendations on hiring the best cyber security companies have benefited most of the organizations.

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Megan Darcy

Megan Darcy

Member since: Mar 28, 2017
Published articles: 6

Related Articles