Menu
​Why partners should educate Government of the security mistakes of 2015

​Why partners should educate Government of the security mistakes of 2015

Governments continue to remain vulnerable to cyber attacks, with internal agencies standing tall as attractive targets for malicious hackers and criminals.

Governments continue to remain vulnerable to cyber attacks, with internal agencies standing tall as attractive targets for malicious hackers and criminals.

As such, governments must learn from past events to harden networks and reduce the risk of successful cyber attacks - creating a role for channel partners to drive a new wave of security conversations.

“Governments should use 2016 to course-correct by using recognisable patterns and paying greater attention to best practices to make sure defence strategies are agile,” says Pamela Warren, director, Government and Industry Initiatives, Palo Alto Networks.

Each year, Palo Alto Networks assesses application usage and threats seen through customer networks, analysing larger attacks against government networks.

With reference to 2015 specifically, Warren says that Software-as-a-Service is “everywhere” and as a result, can be used as an attack vector.

In addition, remote access application usage is growing, giving attackers easier access to networks while the weaponisation of local, regional, or international events at speed is also increasing.

“Attackers continue to target partners, contractors, and other with ‘outside-in’ access to networks macros have reappeared as attack methods,” Warren adds.

“Government agencies and critical national infrastructure are repeated targets.

“Using the cyber attack lifecycle as a guide, attackers often used either an exploit to a well-known vulnerability or malware in spear-phishing campaigns to establish their initial beachhead.”

To protect themselves, partners must advise governments on the need to be proactive and agile, while understanding cyber ranks and processes.

Citing a need to demand accountability, Warren says governments must test and evaluate to ensure teams are working together to address cyber security, gaining visibility into what applications are running in the network, who is using them, and why.

As partners can explain, Warren believes governments must account for the entire cyber attack lifecycle, integrating network security controls to improve threat prevention and reduce response time.

“Threat prevention is possible but too often we see organisations doomed to repeat the same mistakes,” Warren adds.

“If government agencies can learn from the security events of the past, then they can harden themselves against future attacks.”


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags palo alto networkssecuritygovernment

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments