Currently Being Moderated

What keeps agency leaders up at night? After locking their own doors, do their minds turn to securing their agency networks in a tough budget environment? We are living in an age where doing more with less has become the norm rather than the exception. How to maintain secure agency networks in this environment has many federal leaders’ minds racing.  

For those who are losing sleep over the issue, the good news is cyber security doesn't have to take a hit when your budget does. Here are a few tips to help boost your security posture and rest at night:

1. Think about security in a new way. Consider everywhere you can focus on security. Within your agency, make sure security needs are integrated and working hand-in-hand with traditional IT. Then it's easier to move to the next step of collecting data from non-traditional data sources.

2. Collect information from systems about processor utilization, power consumption, disk space, memory utilization logs from storage systems, and other sources of information on the network. This will give you your baseline. Once you have established this baseline, it will be easier to highlight anomalies on the network which could reveal a security breach.

3. Assign weights to resources within your network – not just network devices such as switches and routers, but critical sources of data like databases or SharePoint sites. Then you can begin to assess the impact of an event on your environment and accurately assign resources to minimize the risk.


The goal is to move toward real-time situational awareness. By embracing a new approach to cyber security, you can increase your visibility into your risk posture without having to buy new products. This is made possible by collecting and analyzing data from resources you already have in your environment.


In the end, may this keep your cyber security worries out of sight…or at least for tonight.


Lee Vorthman, CISSP, Cyber Practice Lead, NetApp U.S. Public Sector

Check out how NetApp helps agencies’ rest easy in cyber security.


Filter Blog

By author:
By date: By tag: