Why agencies need to consider the source (code)

By Chris Miranda, vice president of the Telecommunications Studies Center for LGS Innovations

Our work days revolve around our networks, and any interruption in our ability to access data and systems can have a crippling effect on operations. Network administrators need to ensure we have the data we need when we need it, can easily share data with colleagues regardless of location and above all make sure our networks are secure.

A 2013 annual crime report from the FBI states there has been a nearly 50 percent increase in reported monetary losses due to cybercrime since 2012, and with multiple data breaches in the news, network administrators must look to leave no stone unturned when protecting the integrity of their networks and data.

It has become widely accepted that no single technology or device can fully secure a network, but even with a defense-in-depth strategy including firewalls, demilitarized zones (DMZs), intrusion detection systems and intrusion prevention systems, can we be confident all network security issues are being addressed?

With the global nature of today’s supply chain, hardware and software are being outsourced to countries around the world. We have put our trust in equipment manufacturers who often outsource this work to the lowest bidder. This opens our networks up to a vulnerability, which if overlooked, can lead to potentially disastrous consequences.

Read more: http://federalnewsradio.com/commentary/2015/12/agencies-need-consider-so…

More News

On June 9, 2017, LGS Innovations CEO Kevin Kelly had
“It’s More Than Building Robots” [caption id="attachment_3780" align="alignleft" width="300"] Gail
Herndon, VA – June 28, 2017 – LGS Innovations has
LGS Innovations has been awarded a 2017 Top Workplaces honor
Back
to Top