Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Netwrix Corporation: 72% of Government Entities Worldwide had their Security Compromised in 2016

October 2017 by Netwrix Corporation

Netwrix Corporation announced the release of its 2017 IT Risks in Government infographics. Part of the recently published Netwrix 2017 IT Risks Report, these infographics are based on feedback provided by IT specialists working for government agencies around the world.

The 2017 IT Risks in Government infographics provide insight into the cybersecurity challenges, security practices and IT plans common among government entities. The IT risks are divided into three areas: security, compliance and operations.

The survey’s key findings for government entities are:

* 57% of government entities focus on endpoint protection.
* 75% of government entities do not have any visibility into BYOD, 67% lack insight into shadow IT, and 60% have no visibility into their cloud infrastructures.
* 100% of respondents from the government sector see employees as the biggest threat to security.
* 72% of government entities experienced security incidents in 2016; the most common reasons were human errors and insider misuse.
* Only 14% of government entities consider themselves to be well prepared to beat IT risks.
* The IT departments of government agencies are mainly restrained by lack of time (57%), insufficient budget (43%), and IT infrastructure complexity (43%).
* Government entities are willing to invest in protection against intellectual property theft (43%), data breaches (29%) and fraud (14%).

"Government entities have to embrace the new cyber security reality. While they continue to focus on the traditional perimeter-defense approach, the world has changed, and they are not prepared for new threats," said Michael Fimin, CEO and co-founder of Netwrix. "Government agencies need to gain visibility into what is happening across all of their critical assets — both outside and inside the perimeter. With user behavior analytics at their fingertips they can stay on top of abnormal activity caused by human errors, malicious insiders and outside attackers."


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts