SD-WAN solutions have become increasingly popular as organizations demand fast, scalable, and flexible connectivity to and between different network environments
"The objective of any SD-WAN deployment is to establish and maintain a high user experience while lowering the overall total cost of ownership (TCO) for connections between remote offices and users and business-critical resources and applications. But as with most technologies, the wrong SD-WAN solution can significantly inhibit an organization's ability to quickly adapt to changing business demands, rather than accelerate them. And the most significant challenge is that the wrong SD-WAN solution can introduce serious security challenges that can bring the entire system to a screeching halt..."
As school districts across the United States booted up for distance learning, endpoint security became a top priority
"Many educational organizations found themselves a target of cybercriminals exploiting the recent pandemic through social engineering attacks-especially now that students and staff have access to the district's network from their own devices, in their own homes.
Even prior to the COVID-19 pandemic, the number of easily exploited endpoint devices connected to networks was growing rapidly. This increased even moreso with the shift to remote work and learning. This issue is exacerbated by the growing sophistication of cyber threats and the pandemic-related attacks launched by cybercriminals leveraging fear, uncertainty and doubt (FUD) in social engineering attacks..."
The availability of reliable and actionable threat intelligence is essential for any effective security strategy
"Security tools not only need to be able to gather threat intelligence from the places in the network they have been deployed, but they also need to be able to share and correlate that intelligence across and between all other security devices deployed anywhere across the network. Integrated solutions that can see, share, and correlate live threat data enable the sort of broad visibility across the network that security systems require to effectively detect and respond to threats.
But that is only half of the equation. Locally gathered threat intelligence needs to be assessed within a broader context of global threats and industry attack trends. This requires subscribing to external threat intelligence feeds from multiple sources. Many security vendors provide external security feeds, as do groups related to an organization, such as ISACs formed around industries or regions. Secondary sources, such as threat reports and updates, are important resources as well..."
Compared to other significant IT issues, election security poses unique challenges given the importance of public confidence in electoral integrity
"Voter behavior is changing to adapt to new challenges brought on by COVID-19, which has put additional strain on existing election systems. Additionally, the pandemic has had an enormous impact on state and local government revenue and resources, and the increased demand for absentee/mail-in voting has led to increased costs, complexity, and heightened security risk.
Elections are essential services that must be provided despite budget restrictions, and the process will need to be secured regardless of the resources available. Election officials have a responsibility to ensure that all registered voters are able to cast their ballot, in addition to reporting election outcomes quickly and accurately. To meet these demands, election offices today typically rely on computerized systems and software to facilitate various aspects of running an election and voter registration. While these solutions can help streamline the process, they can also create opportunities for sophisticated adversaries attempting to disrupt or alter the outcome of an election..."
See all Archived Fortinet News articles
See all articles from this issue