Cyber Security in Government

Cyber-attacks are on the rise. Data breaches are becoming more common and devastating. Akamai’s State of the Internet Report revealed that hacker attacks on websites…

Mark J. Barrenechea profile picture
Mark J. Barrenechea

December 3, 20144 minute read

Cyber-attacks are on the rise. Data breaches are becoming more common and devastating. Akamai’s State of the Internet Report revealed that hacker attacks on websites rose by 75% in the final quarter of 2013. As digital technologies evolve, information security breaches are becoming more sophisticated, multi-stage, and highly targeted.

From organized crime syndicates to hacktivists, vulnerabilities permeate all levels of IT systems—at great cost. Estimated financial impact of cybercrime to the global economy ranges from $375 billion to $575 billion annually. And this figure doesn’t even reflect estimated losses of trade secrets, intellectual property, and other non-financial impacts, which peaks at $2.2 trillion annually (PwC). To mitigate this corporate threat, world-wide investment in information security is expected to reach $76.9 billion by 2015.

Enterprises and government agencies are under virtually constant attack. As gatekeepers of highly sensitive data and confidential assets, cyber security is a top priority for government agencies. In a recent study, half of cyber security professionals in the U.S. Federal Government agree that their agency is likely to be the victim of a denial-of-service attack in the next 12 months. What is especially concerning is that, while they foresee future breaches, the majority of participants in this study feel unprepared: 74% say they are not prepared for an international cyber-attack; 74% are not prepared to support secure access for mobile devices; 70% are unprepared for a denial-of-service attack; and 70% are not prepared to secure cloud computing environments. These are disconcerting numbers.

The same study revealed one of the major catalysts of security breaches—the end user (in other words, your employees). While many security risks come from outside an organization, many breaches occur from within. The rise of the mobile workforce contributes to this, increasing risk through the lack of clearly defined or implemented Bring-Your-Own-Device (BYOD) policies, lost or stolen devices, and the accidental sharing of confidential information across devices.

Most Likely Source of a Security Breachnew

To their disadvantage, agencies fail to take the end-user experience into account when deploying cyber security solutions. As a result, users often circumvent security measures, making their agencies vulnerable to data theft, data loss, and denial-of-service attacks. While federal agencies are looking for mechanisms to fight information security threats, they are shifting to a distributed approach that combines top-down governance and bottom-up security mechanisms, fully integrated in an Enterprise Information Management (EIM) system.

Taking the end user into account, EIM is designed to protect information where it is used: at the point of interaction (with the end user) in the application itself. Mechanisms like access and permission rights, information audit, and secure information exchange are built right into the system to secure content. Technologies such as records management and auto-classification provide a non-intrusive solution that eliminates the need for business users to sort and classify content, while enabling agencies to establish highly defensible, completely transparent records management as part of a broader information governance strategy. Automating the ability to identify records and apply classifications eliminates the burden on the end-user, increases productivity, and helps to ensure content is securely managed and disposed of, throughout its lifecycle, in any format.

Government agencies are challenged to protect personal data and comply with privacy and other regulations, while permitting open access to government information. From the top-down, EIM offers a risk-based approach to information security and ensures the capabilities, programs, and processes are in place to assist governments in maintaining the confidentiality, integrity, and availability of their information. EIM helps agencies find a fine balance by empowering both the organization and end users with the confidence that their information is secure.

With security threats looming on the horizon, the value of information cannot be considered outside of the context of security. EIM is a key component in a comprehensive information security arsenal—alongside established policies and procedures, employee training and awareness, and continual monitoring of security risk and the program as a whole.

You can read more about information security in the public sector in my book: e-Government or Out of Government and view our targeted government solutions.

Share this post

Share this post to x. Share to linkedin. Mail to
Mark J. Barrenechea avatar image

Mark J. Barrenechea

Mark J. Barrenechea joined OpenText as President and Chief Executive Officer in January 2012, and also serves as a member of the Board of Directors. In January 2016, Mark took on the role of Chief Technology Officer and was appointed Vice Chair in September 2017.

See all posts

More from the author

OpenText Committed to Climate Innovation

OpenText Committed to Climate Innovation

As I return home from OpenText World Europe, I am feeling invigorated by the powerful conversations that occurred throughout the week. I am also feeling…

5 minute read

The Future Needs You Today: A Conversation on AI & Decolonization with Karen Palmer

The Future Needs You Today: A Conversation on AI & Decolonization with Karen Palmer

AI is bringing us into a new epoch of human society—it is a force multiplier for human potential. OpenText is about Information Management + Data…

8 minute read

OpenText World 2023—Welcome to the AI Revolution

OpenText World 2023—Welcome to the AI Revolution

Welcome to the AI Revolution. AI is not just a technology, it is a new ontology—for creativity, data, trust. No business or individual will be…

6 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.