CINXE.COM

Top Government Cybersecurity Threats for 2022 | CISO Collective

<!DOCTYPE HTML> <html lang="en" data-template="post-page darkRed-layer"> <head> <link rel="preload" as="script" href="/etc/designs/fortinet/adb-target/visitorapi.min.js"/> <link rel="preload" as="script" href="/etc/designs/fortinet/adb-target/at.js"/> <script> ;(function(win, doc, style, timeout) { var STYLE_ID = 'at-body-style'; function getParent() { return doc.getElementsByTagName('head')[0]; } function addStyle(parent, id, def) { if (!parent) { return; } var style = doc.createElement('style'); style.id = id; style.innerHTML = def; parent.appendChild(style); } function removeStyle(parent, id) { if (!parent) { return; } var style = doc.getElementById(id); if (!style) { return; } parent.removeChild(style); } addStyle(getParent(), STYLE_ID, style); setTimeout(function() { removeStyle(getParent(), STYLE_ID); }, timeout); }(window, document, "body {opacity: 0 !important}", 3000)); </script> <script type="text/plain" class="optanon-category-C0003" src="/etc/designs/fortinet/adb-target/visitorapi.min.js"></script> <script type="text/plain" class="optanon-category-C0003" src="/etc/designs/fortinet/adb-target/at.js"></script> <meta charset="UTF-8"/> <title>Top Government Cybersecurity Threats for 2022 | CISO Collective</title> <meta name="keywords" content="CISO Collective,IT Leadership"/> <meta name="description" content="Government agencies should pay special attention to three key threats going into 2022. Read this to get a CISO’s perspective on these top threats."/> <meta name="template" content="post-page"/> <meta name="viewport" content="width=device-width, initial-scale=1"/> <meta name="google-site-verification" content="tiQ03tSujT2TSsWJ6tNHiiUn8cwYVmdMQrGUCNrPQmo"/> <meta property="og:site_name" content="Fortinet Blog"/> <meta property="og:title" content="Top Government Cybersecurity Threats for 2022 | CISO Collective"/> <meta property="og:url" content="https://www.fortinet.com/blog/ciso-collective/top-security-threats-for-government"/> <meta property="og:type" content="article"/> <meta property="og:description" content="Government agencies should pay special attention to three key threats going into 2022. Read this to get a CISO’s perspective on these top threats.…"/> <meta property="og:image" content="https://www.fortinet.com/content/dam/fortinet-blog/article-images/social-ciso-top-cyber-threats-blog-hero.png.png"/> <meta property="twitter:card" content="summary"/> <meta property="twitter:site" content="@Fortinet"/> <meta property="article:author" content="Jim Richberg"/> <meta property="article:section" content="CISO Collective"/> <meta property="article:published_time" content="2021-12-23T08:00:00.000Z"/> <meta property="article:tag" content="IT Leadership"/> <link rel="shortcut icon" href="/etc/designs/fortinet-blog/favicon.ico"/> <link rel="canonical" href="https://www.fortinet.com/blog/ciso-collective/top-security-threats-for-government"/> <link rel="stylesheet" href="/etc.clientlibs/fortinet-blog/clientlibs/clientlib-base.min.900b148ab7b87024003111a1245cca9c.css" type="text/css"> <!-- SEO Script --> <!-- OneTrust Cookies Consent Notice start for fortinet.com --> <script src="https://cdn.cookielaw.org/scripttemplates/otSDKStub.js" data-document-language="true" type="text/javascript" charset="UTF-8" data-domain-script="f85f39fc-d7aa-467a-b762-fbb722748016"></script> <script type="text/javascript"> function OptanonWrapper() { { try{ $('#cookiescript_injected').remove(); // remove old cookie script }catch(e){} window.dataLayer.push({ event: 'OneTrustGroupsUpdated' }); Optanon.InsertScript('//assets.adobedtm.com/launch-EN23cb8375449840dc93b13f34d935b8b9.min.js','head',null, null, '1',true); } } </script> <!-- OneTrust Cookies Consent Notice end for fortinet.com --> <!-- BE IXF: BE IXF: Place getHeadOpen just inside of the head tag --> <!-- be_ixf, sdk, gho--> <meta name="be:sdk" content="java_sdk_1.6.7" /> <meta name="be:timer" content="70ms" /> <meta name="be:norm_url" content="https://www.fortinet.com/blog/ciso-collective/top-security-threats-for-government" /> <meta name="be:capsule_url" content="https://ixfd1-api.bc0a.com/api/ixf/1.0.0/get_capsule/f00000000310757/0886918094" /> <meta name="be:api_dt" content="pny_2024; pnm_11; pnd_22; pnh_01; pnmh_41; pn_epoch:1732268482665" /> <meta name="be:mod_dt" content="pny_1969; pnm_12; pnd_31; pnh_16; pnmh_00; pn_epoch:0" /> <meta name="be:orig_url" content="https://www.fortinet.com/blog/ciso-collective/top-security-threats-for-government" /> <meta name="be:messages" content="0" /><style> .be-ix-link-block {clear:both;background-color: #000;} .be-ix-link-block .be-related-link-container { padding: 15px;padding-top: 0;margin: 0 auto;max-width: 70em;width: 92vw;} .be-ix-link-block .be-related-link-container .be-label {margin: 0;color: #fff; font-size: 2rem; font-weight: 400;} .be-ix-link-block .be-related-link-container .be-list {display: inline-block;list-style: none;margin: 0;padding: 0;margin-top: 5px;} .be-ix-link-block .be-related-link-container .be-list .be-list-item {display: inline-block;margin-right: 20px;} .be-ix-link-block .be-related-link-container .be-list .be-list-item .be-related-link{color: #fff;} .be-ix-link-block .be-related-link-container .be-list .be-list-item .be-related-link:hover{opacity: .7;color: #fff;} .be-ix-link-block .be-related-link-container .be-list .be-list-item:last-child {margin-right: 0;} .page .be-ix-link-block {clear:both;background-color:#e6e6e6;} .page .be-ix-link-block .be-related-link-container {padding-bottom: 15px;text-align: center;} .page .be-ix-link-block .be-related-link-container .be-label {color: #000;font-size: 1.3rem;font-weight: 400;} .page .be-ix-link-block .be-related-link-container .be-list {margin-top:0;} .page .be-ix-link-block .be-related-link-container .be-list .be-list-item {margin-right: 4px;} .page .be-ix-link-block .be-related-link-container .be-list .be-list-item .be-related-link{color: #000;} .page .be-ix-link-block .be-related-link-container .be-list .be-list-item .be-related-link:hover{color: #000;} .page .be-ix-link-block .be-related-link-container .be-list .be-list-item:not(:last-child):after {content: " | ";color: #000;} @media (max-width: 767px) { .be-ix-link-block .be-related-link-container{padding-bottom: 15px;} .be-ix-link-block .be-related-link-container .be-label {width: 100%;} .be-ix-link-block .be-related-link-container .be-list {display: block;width: 100%;} .be-ix-link-block .be-related-link-container .be-list .be-list-item {display: block;margin-right: 0;}} @media (min-width: 768px) { .be-ix-link-block .be-related-link-container {display: flex;} .be-ix-link-block .be-related-link-container .be-label {display: inline-block;flex-basis: 150px;flex-grow: 0;flex-shrink: 0;margin-right: 20px;} .be-ix-link-block .be-related-link-container .be-list {width: auto;} .page .be-ix-link-block .be-related-link-container .be-label {display: inline-block;flex-basis: 150px;flex-grow: 0;flex-shrink: 0;margin-right: 20px;}} </style> <!--BE IXF: Header End --> </head> <body> <div class="root responsivegrid"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="b1-header aem-GridColumn aem-GridColumn--default--12"> <header class="b1-header__container"> <div class="b1-header__logo"> <a href="https://www.fortinet.com"> <img class="desktop-logo" src="/content/dam/fortinet-blog/fortinet-logo-white.svg" alt="Fortinet home"/> <img class="mobile-logo" src="/content/dam/fortinet-blog/fortinet-logo-white.svg" alt="Fortinet home"/> </a> </div> <div class="b1-header__cta-list"> <a class="b1-header__cta-list-item " href="https://www.fortinet.com/blog"> <span>Blog</span> </a> </div> <div class="b1-header__nav"><div class="b2-navigation"> <ul class="b2-navigation__list"> <li class="b2-navigation-categories"><div class="b2-navigation__list-item nav-dropdown-title">Categories</div> <ul class="navdropdown"> <li> <a class="b2-navigation__dropdown__list-item" href="/blog/business-and-technology"> <span>Business &amp; Technology </span> </a> </li> <li> <a class="b2-navigation__dropdown__list-item" href="/blog/threat-research"> <span>FortiGuard Labs Threat Research</span> </a> </li> <li> <a class="b2-navigation__dropdown__list-item" href="/blog/industry-trends"> <span>Industry Trends</span> </a> </li> <li> <a class="b2-navigation__dropdown__list-item" href="/blog/life-at-fortinet"> <span>Life at Fortinet</span> </a> </li> <li> <a class="b2-navigation__dropdown__list-item" href="/blog/partners"> <span>Partners</span> </a> </li> <li> <a class="b2-navigation__dropdown__list-item" href="/blog/customer-stories"> <span>Customer Stories</span> </a> </li> <li> <a class="b2-navigation__dropdown__list-item" href="/blog/psirt-blogs"> <span>PSIRT Blogs</span> </a> </li> </ul> </li> <li class="m-nav-item"> <a class="b2-navigation__list-item false" href="/blog/business-and-technology"> <span>Business &amp; Technology </span> </a> </li> <li class="m-nav-item"> <a class="b2-navigation__list-item false" href="/blog/threat-research"> <span>FortiGuard Labs Threat Research</span> </a> </li> <li class="m-nav-item"> <a class="b2-navigation__list-item false" href="/blog/industry-trends"> <span>Industry Trends</span> </a> </li> <li class="m-nav-item"> <a class="b2-navigation__list-item false" href="/blog/life-at-fortinet"> <span>Life at Fortinet</span> </a> </li> <li class="m-nav-item"> <a class="b2-navigation__list-item false" href="/blog/partners"> <span>Partners</span> </a> </li> <li class="m-nav-item"> <a class="b2-navigation__list-item false" href="/blog/customer-stories"> <span>Customer Stories</span> </a> </li> <li class="m-nav-item"> <a class="b2-navigation__list-item false" href="/blog/psirt-blogs"> <span>PSIRT Blogs</span> </a> </li> <li> <a class="b2-navigation__list-item false" href="/blog/ciso-collective"> <span>CISO Collective</span> </a> </li> </ul> </div> </div> <div id="blog-site-search" class="b1-header__search" aria-expanded="false"><div class="b3-searchbox"> <form class="b3-searchbox__form" action="/blog/search" method="get"> <input class="b3-searchbox__input" type="text" name="q" placeholder="Search Blogs"/> <button class="b3-searchbox__icon" aria-label="Search" type="submit"> <svg viewBox="0 0 16 16" xmlns="http://www.w3.org/2000/svg"> <path d="M15.688 14.18l-4.075-4.075C12.36 9.06 12.8 7.78 12.8 6.4 12.8 2.87 9.93 0 6.4 0 2.87 0 0 2.87 0 6.4c0 3.53 2.87 6.4 6.4 6.4 1.38 0 2.66-.44 3.705-1.187l4.075 4.075c.207.208.48.312.753.312.274 0 .547-.104.755-.312.416-.417.416-1.093 0-1.51zM2.133 6.4c0-2.357 1.91-4.267 4.267-4.267s4.267 1.91 4.267 4.267-1.91 4.267-4.267 4.267S2.133 8.757 2.133 6.4z" fill="#fff"> </path> </svg> </button> </form> </div> </div> <button class="b1-header__search-toggle" aria-controls="blog-site-search" aria-label="Search"> <svg viewBox="0 0 16 16" xmlns="http://www.w3.org/2000/svg"> <path d="M15.688 14.18l-4.075-4.075C12.36 9.06 12.8 7.78 12.8 6.4 12.8 2.87 9.93 0 6.4 0 2.87 0 0 2.87 0 6.4c0 3.53 2.87 6.4 6.4 6.4 1.38 0 2.66-.44 3.705-1.187l4.075 4.075c.207.208.48.312.753.312.274 0 .547-.104.755-.312.416-.417.416-1.093 0-1.51zM2.133 6.4c0-2.357 1.91-4.267 4.267-4.267s4.267 1.91 4.267 4.267-1.91 4.267-4.267 4.267S2.133 8.757 2.133 6.4z"> </path> </svg> <div class="b1-header__search-toggle-close"> <span class="b1-header__search-toggle-close-line"></span> <span class="b1-header__search-toggle-close-line"></span> </div> </button> <div class="b1-header__nav-toggle" aria-hidden="true"> <span class="b1-header__nav-toggle-line"></span> <span class="b1-header__nav-toggle-line"></span> <span class="b1-header__nav-toggle-line"></span> </div> </header> </div> <section class="b4-hero aem-GridColumn aem-GridColumn--default--12"> <div class="b4-hero__container" style="background-image:url(/content/dam/fortinet-blog/article-images/social-ciso-top-cyber-threats-blog-hero.png.png);"> <img class="ratio" alt="Top Government Cybersecurity Threats for 2022 | CISO Collective" aria-hidden="true" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAQAAAADCAQAAAAe/WZNAAAADklEQVR42mNkgAJGDAYAAFEABCaLYqoAAAAASUVORK5CYII="/> <div class="b4-hero__text text-container"> <p class="b4-hero__kicker"></p> <h1 class="b4-hero__headline">Top Government Cybersecurity Threats for 2022</h1> </div> </div> </section> <section class="b15-blog-meta aem-GridColumn aem-GridColumn--default--12"> <div class="b15-blog-meta__container text-container"> <span>By </span> <span class="b15-blog-meta__author"> <a href="/blog/search?author=Jim+Richberg">Jim Richberg</a> </span> <span class="b15-blog-meta__"> </span> <span class="b15-blog-meta__date"> | December 23, 2021</span> </div> </section> <div class="responsivegrid aem-GridColumn aem-GridColumn--default--12"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="raw-import aem-GridColumn aem-GridColumn--default--12"> <div class="text-container"></div> </div> <div class="cmp cmp-text aem-GridColumn aem-GridColumn--default--12"> <p>Malicious cyber actors are often opportunistic, targeting the low-hanging fruit of networks with visible vulnerabilities and valuable assets. In the private sector, would-be attackers will often simply move on to an easier target if an organization appears to have good security and <a href="https://www.fortinet.com/blog/ciso-collective/the-importance-of-good-cyber-hygiene-now-more-than-ever?utm_source=blog&amp;utm_campaign=the-importance-of-good-cyber-hygiene-now-more-than-ever">cyber hygiene</a>. </p> <p>But, because government agencies have data or other assets that malicious cyber actors want, they will often go to great lengths to get it. Due to the sensitivity of the information government holds and the persistence of many of those who are targeting it, government organizations don’t have the luxury of operating subpar cybersecurity without putting citizens’ data and potential essential services at unacceptable levels of risk.</p> <p>Malicious actors are also aware that government security teams are increasingly asked to “do more with less” and that many agencies may face shrinking budgets and resources. Federal, state, and local government agencies are also connected to a wide array of contractors and third-party partners that can be targeted to <a href="https://www.fortinet.com/resources/cyberglossary/login-credentials?utm_source=blog&amp;utm_campaign=login-credentials">steal user credentials</a> and gain access to government networks.</p> <p>The nation-state cyber actors who target government networks are typically well organized and sophisticated, but according to a recent <a href="https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/report-threat-landscape-2021.pdf?utm_source=blog&amp;utm_campaign=blog">report from FortiGuard Labs</a> on the evolving threat landscape, cybercriminals also are becoming more organized and sophisticated. <a href="https://www.fortinet.com/resources/cyberglossary/advanced-persistent-threat?utm_source=blog&amp;utm_campaign=advanced-persistent-threat">Advanced persistent threat</a> (APT) activity can now come from nation-states, from proxy actors working on their behalf, or from criminal groups or syndicates. All of these threat actors look to exploit government organizations’ fragmented network perimeters, siloed networking and security teams, and aging legacy digital infrastructure that was stressed in supporting the pivot to <a href="https://www.fortinet.com/solutions/enterprise-midsize-business/network-access/teleworker-work-remote?utm_source=blog&amp;utm_campaign=teleworker-work-remote">remote work</a> as well as broad technology changes such as <a href="https://www.fortinet.com/resources/cyberglossary/what-is-5g?utm_source=blog&amp;utm_campaign=what-is-5g">5G communications</a> and <a href="https://www.fortinet.com/resources/cyberglossary/edge-computing?utm_source=blog&amp;utm_campaign=edge-computing">edge computing</a>.</p> <p>There is good news and progress. The <a href="https://www.fortinet.com/blog/industry-trends/fortiguard-labs-threat-landscape-report-highlights-tenfold-increase-in-ransomware?utm_source=blog&amp;utm_campaign=fortiguard-labs-threat-landscape-report-highlights-tenfold-increase-in-ransomware">US Department of Justice (DOJ)</a> charged a <a href="https://www.justice.gov/opa/pr/department-justice-launches-global-action-against-netwalker-ransomware">NetWalker affiliate</a>, but even though the amount of attention that some operations like this have garnered has forced a few ransomware operators to announce that they were ceasing operations altogether, <a href="https://www.fortinet.com/resources/cyberglossary/ransomware?utm_source=blog&amp;utm_campaign=ransomware">ransomware</a> and <a title="raas" href="https://www.fortinet.com/resources/cyberglossary/ransomware-as-a-service-raas?utm_source=blog&amp;utm_medium=blog&amp;utm_campaign=blog-ransomware-as-a-service-raas">RaaS</a> are not on the decline. Regardless, the DoJ has also made remarks about remaining dedicated to fighting cyber threats and prioritizing <a href="https://www.justice.gov/opa/speech/deputy-attorney-general-lisa-o-monaco-delivers-remarks-annual-munich-cyber-security">disruption of the cybercriminal ecosystem</a>. </p> <h2>Three Top Cybersecurity Threats for Governments</h2> <p>It is critical for government agencies to have a full spectrum of security capabilities to protect against any threat. However, this year, they should pay special attention to three key threat areas that malicious actors are ready to exploit.</p> <h3>1. Continued Growth in the Digital Attack Surface</h3> <p>Malicious cyber actors are exploring and discovering new areas for exploitation as organizations adopt new technologies and operating patterns. As agencies continue to expand their network infrastructure to accommodate <a href="https://www.fortinet.com/blog/business-and-technology/work-from-anywhere?utm_source=blog&amp;utm_campaign=work-from-anywhere">work-from-anywhere</a> (WFA), remote learning, and new cloud services, the remote environment provides ample opportunity for malicious actors to find a vulnerability and gain a foothold. Instead of targeting only the traditional core network of an organization, threat actors are exploiting emerging edge and “anywhere” environments across the extended network, including assets that may be deployed in multiple clouds with differing security policies and capabilities in each.</p> <p>Government agencies should focus on implementing zero trust principles and architectures as soon as possible. <a href="https://www.fortinet.com/resources/cyberglossary/what-is-the-zero-trust-network-security-model?utm_source=blog&amp;utm_campaign=zero-trust-network-security-model">Zero trust network access</a> (ZTNA) is critical for moving beyond the outmoded ‘moat and castle’ model of network defense or the relatively simple measures of <a href="https://www.fortinet.com/products/identity-access-management/fortiauthenticator?utm_source=blog&amp;utm_campaign=2018-q2-fortiauthenticator-main-page">multifactor authentication</a> and <a href="https://www.fortinet.com/products/vpn?utm_source=blog&amp;utm_campaign=vpn">VPN connections</a> that many government organizations used to secure their networks during the rise of remote work. Zero Trust must be applied at a more nuanced level—by application—since access should not be evaluated and granted on a ‘one and done’ basis when a user logs on. This affords better protection to the organization’s data and supports a ‘work from anywhere’ operating posture where the new normal may include users, data, and devices connecting in increasingly innovative and non-traditional patterns.</p> <p>In addition, software defined networking is becoming increasingly common, and <a href="https://www.fortinet.com/products/sd-wan?utm_source=blog&amp;utm_campaign=2018-q2-sd-wan-web">secure software defined wide area networking (SD-WAN)</a> is becoming increasingly important because of the organizational flexibility, cost savings, and better user experience it offers. Secure SD-WAN can both offer organizations these benefits and provide powerful and dynamic capabilities for segmenting networks and access to data to restrict an intruder’s freedom of lateral movement and keep breaches restricted to a smaller portion of the network.</p> <h3>2. Increase in OT Attacks</h3> <p>The General Services Administration has stated it wants to have smart energy technology deployed by 2025 in all of the 10,000 buildings it manages for the Federal Government. The increasing popularity of green building technology and the rise of building automation (‘<a href="https://www.fortinet.com/blog/industry-trends/smart-buildings-new-attack-surface?utm_source=blog&amp;utm_campaign=smart-buildings-new-attack-surface">smart buildings</a>’) is going to increase the need to secure <a href="https://www.fortinet.com/solutions/industries/scada-industrial-control-systems/what-is-ot-security.html?utm_source=blog&amp;utm_campaign=what-is-ot">operational technology (OT)</a> in government organizations’ digital environments. The <a href="https://www.fortinet.com/blog/industry-trends/as-ot-systems-become-more-connected-ot-security-becomes-more-challenging?utm_source=blog&amp;utm_campaign=as-ot-systems-become-more-connected-ot-security-becomes-more-challenging">convergence of IT and OT</a> networks has enabled some attacks to compromise IT networks through OT devices and systems in the office environment—and even through <a href="https://www.fortinet.com/resources/cyberglossary/iot-security?utm_source=blog&amp;utm_campaign=iot-security">Internet-of-Things (IoT)</a> devices deployed in remote users’ home networks.</p> <p>Since networks are becoming increasingly interconnected, virtually any point of access can be targeted to attempt to gain entry to the IT network. Traditionally, attacks on OT systems were the domain of more specialized threat actors, but such capabilities are increasingly being included in <a href="https://www.fortinet.com/blog/industry-trends/the-definition-and-examples-of-exploit-kits?utm_source=blog&amp;utm_campaign=the-definition-and-examples-of-exploit-kits">attack kits</a> available for purchase on the Dark Web, making them available to a much broader set of attackers and lowering the skill and expertise needed to launch such attacks. Many OT and IoT devices lack strong security and cannot be upgraded or patched, forcing organizations to be nimble and adopt methods such as <a href="https://www.fortinet.com/blog/business-and-technology/why-virtual-patching-essential-for-vulnerability-mitigation?utm_source=blog&amp;utm_campaign=why-virtual-patching-essential-for-vulnerability-mitigation">virtual patching</a> of such headless devices.</p> <p>Given the sophisticated and often clandestine nature of the attacks directed against them, government agencies should consider the use of <a href="https://www.fortinet.com/products/fortideceptor?utm_source=blog&amp;utm_campaign=2019-q4-deception">deception technology</a> to help an organization discover intruders and impede their movement. Using a layer of digital decoys and <a href="https://www.fortinet.com/resources/cyberglossary/what-is-honeypot">honeypots</a>, deception technology helps conceal sensitive and critical assets behind a fabricated surface, which confuses and redirects attackers while revealing their presence on the network. Studies also suggest that, if an agency deploys deception technology, it doesn’t need to use it everywhere to reap the benefit -- much as a home security sign both deters intrusion and affects how any would-be burglar proceeds if they do proceed to try to break in.</p> <h3>3. AI Will Be a Tool of Choice for Malicious Actors</h3> <p>The rise in <a href="https://www.fortinet.com/resources/cyberglossary/deepfake?utm_source=blog&amp;utm_campaign=deepfake">deep fake technology</a> should be of growing concern to both public and private sector organizations. It uses <a href="https://www.fortinet.com/solutions/enterprise-midsize-business/security-operations?utm_source=blog&amp;utm_campaign=ai-automation">artificial intelligence (AI)</a> to mimic human activities and can be used to enhance <a href="https://www.fortinet.com/resources/cyberglossary/social-engineering?utm_source=blog&amp;utm_campaign=social-engineering">social engineering attacks</a>. The bar to creating deep fakes is getting lower, and it's easy to find content generation tools on code repositories like GitHub that generate output that is good enough to fool even AI experts. <a href="https://www.fortinet.com/resources/cyberglossary/phishing?utm_source=blog&amp;utm_campaign=phishing">Phishing</a> continues to be a serious problem for government, with many employees continuing to work remotely and relying on email to conduct business. In the case of a phishing attack, malicious actors are not only looking to steal a user’s identity and address book, but also the contents of their email inbox and outbox. </p> <p>It is now possible to use such data to automatically generate phishing content that mirrors the writing style and syntax of a sender and tailors the content of each phishing email to topics they have already discussed with the target. Detecting phishing will no longer be a matter of looking for obvious indicators like bank scam subjects or awkward English usage.</p> <p>Advanced technologies like <a href="https://www.fortinet.com/products/endpoint-security/fortiedr.html?utm_source=blog&amp;utm_campaign=fortiedr">endpoint detection and response (EDR)</a> can help by identifying malicious threats based on behavior, either of any executable code associated with that email (by running it in a virtualized <a href="https://www.fortinet.com/products/sandbox/fortisandbox.html?utm_source=blog&amp;utm_campaign=fortisandbox-main-page">sandbox</a>) or based on malicious characteristics fed to the EDR engine from other sources of <a href="https://www.fortinet.com/resources/cyberglossary/cyber-threat-intelligence?utm_source=blog&amp;utm_campaign=cyber-threat-intelligence">cyber threat intelligence</a>. The speed of attacks is increasing, and EDR coupled with actionable and integrated threat intelligence can help agencies defend against threats in real-time.</p> <p>Agencies should look to leverage the power of AI and <a href="https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/report-threat-landscape-2021.pdf?utm_source=blog&amp;utm_campaign=machine-learning">machine learning (ML)</a> to act as a force multiplier to speed threat prevention, detection, and response. The sheer size and complexity of the digital <a href="https://www.fortinet.com/resources/cyberglossary/attack-surface?utm_source=blog&amp;utm_campaign=attack-surface">attack surface</a> is often considered one of the greatest challenges to effective network defense. This approach of AI-fueled automation turns it into a net advantage by making it into a unified collection platform that can sense potential malicious activity, assess its significance, and both respond to it at the point of attack and preemptively inoculate the rest of the network. These capabilities can be deployed pervasively across the network to determine a baseline for normal behavior so any changes can be responded to and sophisticated threats disabled before they can execute their payloads. </p> <h2>Cybersecurity Threats to Governments: The Need for Complete Protection</h2> <p>Government agencies provide essential services and have valuable data which citizens and partners rely on it to secure on their behalf. This is a primary reason why government networks are targeted by both persistent and sophisticated actors and by criminals looking for low-hanging fruit and easy gain. </p> <p>It's critical for government networks to both do the basics in terms of cybersecurity and vulnerability management. They must embrace zero trust security principles and employ powerful and versatile tools such as EDR and deception technology. Threat actors and their attack methods are getting faster and more sophisticated, but by pursuing an integrated and automated approach to visibility and control, governments can better secure their assets. </p> <p>The challenge is that locating these assets and the users and devices who need them is changing, and agencies must provide connectivity and security for on-premise computing, in the data center, in the cloud, or at the edge. Smart planning, doing the cybersecurity basics, and leveraging the increasing <a href="https://www.fortinet.com/blog/industry-trends/convergence-of-networks-and-security-for-evolving-infrastructures?utm_source=blog&amp;utm_campaign=convergence-of-networks-and-security-for-evolving-infrastructures">convergence of networking and security</a> are keys to ensuring that organizations can operate efficiently and securely.</p> </div> <div class="raw-import aem-GridColumn aem-GridColumn--default--12"> <div class="text-container"><div id="om-b2dxtopzidsdt3fkzfsv-holder"></div></div> </div> </div> </div> <div class="b16-blog-tags aem-GridColumn aem-GridColumn--default--12"> <div class="b16-blog-tags__container text-container" style="display:none"> <span class="b16-blog-tags__headline">Tags:</span> <p class="b16-blog-tags__tag-links"> <a href="https://www.fortinet.com/blog/tags-search.html?tag=it-leadership">IT Leadership</a> </p> </div> </div> <section class="b12-related aem-GridColumn aem-GridColumn--default--12"> <div class="b12-related__container text-container"> <h3>Related Posts</h3> <div class="b12-related__posts"> <a href="/blog/ciso-collective/three-tips-for-enhancing-security-with-zero-trust" class="b12-related__post b12-related__post-0"> <div class="b12-related__image" style="background-image:url(/content/dam/fortinet-blog/article-images/ciso-zero-tips-img.png.thumb.319.319.png);"> <img class="ratio" alt="Three Tips for Enhancing Security with Zero Trust" aria-hidden="true" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAQAAAADCAQAAAAe/WZNAAAADklEQVR42mNkgAJGDAYAAFEABCaLYqoAAAAASUVORK5CYII="/> </div> <div class="b12-related__text"> <p class="b12-related__category"> CISO Collective </p> <h5 class="b12-related__title">Three Tips for Enhancing Security with Zero Trust</h5> </div> </a> <a href="/blog/ciso-collective/5-elements-of-secure-sd-wan-success" class="b12-related__post b12-related__post-1"> <div class="b12-related__image" style="background-image:url(/content/dam/fortinet-blog/article-images/ciso-elements-sdwan-img.jpg.thumb.319.319.png);"> <img class="ratio" alt="SD-WAN Implementation: 5 Elements of a Successful Plan" aria-hidden="true" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAQAAAADCAQAAAAe/WZNAAAADklEQVR42mNkgAJGDAYAAFEABCaLYqoAAAAASUVORK5CYII="/> </div> <div class="b12-related__text"> <p class="b12-related__category"> CISO Collective </p> <h5 class="b12-related__title">SD-WAN Implementation: 5 Elements of a Successful Plan</h5> </div> </a> <a href="/blog/ciso-collective/preparing-now-for-tomorrows-threats-predictions-for-2022-and-beyond" class="b12-related__post b12-related__post-2"> <div class="b12-related__image" style="background-image:url(/content/dam/fortinet-blog/article-images/ciso-collective-tmro-threats-img.jpg.thumb.319.319.png);"> <img class="ratio" alt="Preparing Now for Tomorrow&#39;s Threats: Predictions for 2022 and Beyond" aria-hidden="true" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAQAAAADCAQAAAAe/WZNAAAADklEQVR42mNkgAJGDAYAAFEABCaLYqoAAAAASUVORK5CYII="/> </div> <div class="b12-related__text"> <p class="b12-related__category"> CISO Collective </p> <h5 class="b12-related__title">Preparing Now for Tomorrow's Threats: Predictions for 2022 and Beyond</h5> </div> </a> </div> </div> </section> <div class="b13-comment-section aem-GridColumn aem-GridColumn--default--12"> <div class="b13-comment-section__container text-container"> </div> </div> <div class="b6-footer aem-GridColumn aem-GridColumn--default--12"> <div class="b6-footer__container text-container"> <div class="b6-footer__footer-info"> <div class="b6-footer__logo"> <a href="https://www.fortinet.com" target="_blank"> <img src="/content/dam/fortinet-blog/fortinet-logo-white.svg" alt="Fortinet"/> </a> </div> <div class="b6-footer__social-footer"> <ul> <li class="social-icon linkedin"> <a href="https://www.linkedin.com/company/fortinet" target="_blank"> <svg viewBox="0 0 16 16" xmlns="http://www.w3.org/2000/svg"> <path d="M15.934 15.835H12.55v-5.712c0-.897-1.008-1.64-1.905-1.64s-1.48.743-1.48 1.64v5.712H5.78V5.68h3.385v1.693c.558-.905 1.996-1.49 2.96-1.49 2.116 0 3.81 1.727 3.81 3.817v6.135zm-11.846 0H.703V5.68h3.385v10.155zM2.395.605c.935 0 1.693.757 1.693 1.69 0 .936-.758 1.694-1.693 1.694S.703 3.23.703 2.29C.703 1.36 1.46.6 2.395.6z" fill-opacity=".8" fill="#fff" fill-rule="evenodd"></path> </svg> </a> </li> <li class="social-icon twitter"> <a href="https://www.x.com/Fortinet" target="_blank"> <svg width="1200" height="1227" viewBox="0 0 1200 1227" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M714.163 519.284L1160.89 0H1055.03L667.137 450.887L357.328 0H0L468.492 681.821L0 1226.37H105.866L515.491 750.218L842.672 1226.37H1200L714.137 519.284H714.163ZM569.165 687.828L521.697 619.934L144.011 79.6944H306.615L611.412 515.685L658.88 583.579L1055.08 1150.3H892.476L569.165 687.854V687.828Z" fill="white"/> </svg> </a> </li> <li class="social-icon youtube"> <a href="https://www.youtube.com/channel/UCJHo4AuVomwMRzgkA5DQEOA?sub_confirmation=1" target="_blank"> <svg viewBox="0 0 18 14" xmlns="http://www.w3.org/2000/svg"> <path d="M7.472 11.027V3.412L12.55 7.22l-5.08 3.806zM15.934.787C15.426.62 12.294.45 9.164.45c-3.13 0-6.26.16-6.77.322-1.32.44-1.69 3.4-1.69 6.447 0 3.03.37 6 1.69 6.43.51.17 3.64.33 6.77.33 3.13 0 6.262-.16 6.77-.33 1.32-.43 1.692-3.4 1.692-6.44 0-3.047-.372-6-1.692-6.43z" fill-opacity=".8" fill="#fff" fill-rule="evenodd"></path> </svg> </a> </li> <li class="social-icon instagram"> <a href="https://www.instagram.com/fortinet/" target="_blank"> <svg viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg"> <path class="st0" d="M16,3.7c4,0,4.5,0,6.1,0.1c1.5,0.1,2.3,0.3,2.8,0.5c0.7,0.3,1.2,0.6,1.7,1.1c0.5,0.5,0.8,1,1.1,1.7 c0.2,0.5,0.4,1.3,0.5,2.8c0.1,1.6,0.1,2.1,0.1,6.1s0,4.5-0.1,6.1c-0.1,1.5-0.3,2.3-0.5,2.8c-0.3,0.7-0.6,1.2-1.1,1.7 c-0.5,0.5-1,0.8-1.7,1.1c-0.5,0.2-1.3,0.4-2.8,0.5c-1.6,0.1-2.1,0.1-6.1,0.1s-4.5,0-6.1-0.1c-1.5-0.1-2.3-0.3-2.8-0.5 c-0.7-0.3-1.2-0.6-1.7-1.1c-0.5-0.5-0.8-1-1.1-1.7c-0.2-0.5-0.4-1.3-0.5-2.8C3.7,20.5,3.7,20,3.7,16s0-4.5,0.1-6.1 c0.1-1.5,0.3-2.3,0.5-2.8C4.6,6.5,4.9,6,5.4,5.4c0.5-0.5,1-0.8,1.7-1.1c0.5-0.2,1.3-0.4,2.8-0.5C11.5,3.7,12,3.7,16,3.7 M16,1 c-4.1,0-4.6,0-6.2,0.1C8.2,1.2,7.1,1.4,6.2,1.8c-1,0.4-1.8,0.9-2.7,1.7C2.7,4.4,2.2,5.2,1.8,6.2c-0.4,1-0.6,2-0.7,3.6 C1,11.4,1,11.9,1,16c0,4.1,0,4.6,0.1,6.2c0.1,1.6,0.3,2.7,0.7,3.6c0.4,1,0.9,1.8,1.7,2.7c0.8,0.8,1.7,1.3,2.7,1.7 c1,0.4,2,0.6,3.6,0.7C11.4,31,11.9,31,16,31s4.6,0,6.2-0.1c1.6-0.1,2.7-0.3,3.6-0.7c1-0.4,1.8-0.9,2.7-1.7c0.8-0.8,1.3-1.7,1.7-2.7 c0.4-1,0.6-2,0.7-3.6C31,20.6,31,20.1,31,16s0-4.6-0.1-6.2c-0.1-1.6-0.3-2.7-0.7-3.6c-0.4-1-0.9-1.8-1.7-2.7 c-0.8-0.8-1.7-1.3-2.7-1.7c-1-0.4-2-0.6-3.6-0.7C20.6,1,20.1,1,16,1L16,1z" fill-opacity=".8" fill="#fff" fill-rule="evenodd"></path> <path class="st0" d="M16,8.3c-4.3,0-7.7,3.4-7.7,7.7s3.4,7.7,7.7,7.7s7.7-3.4,7.7-7.7S20.3,8.3,16,8.3z M16,21c-2.8,0-5-2.2-5-5 s2.2-5,5-5s5,2.2,5,5S18.8,21,16,21z" fill-opacity=".8" fill="#fff" fill-rule="evenodd"></path> <circle class="st0" cx="24" cy="8" r="1.8" fill-opacity=".8" fill="#fff" fill-rule="evenodd"></circle> </svg> </a> </li> <li class="social-icon facebook"> <a href="https://www.facebook.com/fortinet" target="_blank"> <svg viewBox="0 0 9 18" xmlns="http://www.w3.org/2000/svg"> <path d="M8.934.758v3.385H7.24c-.583 0-.845.685-.845 1.27v2.114h2.54v3.385h-2.54v6.77H3.01v-6.77H.472V7.527H3.01V4.143c0-1.87 1.516-3.385 3.385-3.385h2.54z" fill-opacity=".8" fill="#fff" fill-rule="evenodd"></path> </svg> </a> </li> <li class="social-icon rss"> <a href="https://www.fortinet.com/rss-feeds.html" target="_blank"> <svg viewBox="0 0 18 18" xmlns="http://www.w3.org/2000/svg"> <path d="M3.072 17.68c-1.27 0-2.37-1.1-2.37-2.368 0-1.27 1.1-2.37 2.37-2.37s2.37 1.1 2.37 2.37-1.016 2.37-2.37 2.37zM.702.76v2.538c7.955 0 14.386 6.43 14.386 14.385h2.538C17.626 8.336 10.05.76.703.76zm0 5.162V8.46c5.078 0 9.224 4.146 9.224 9.223h2.54c0-6.514-5.248-11.76-11.763-11.76z" fill-opacity=".8" fill="#fff" fill-rule="evenodd"></path> </svg> </a> </li> </ul> </div> </div> <div class="b6-footer__footer-links"> <div class="b6-footer__footer-links-column"> <h4 class="b6-footer__header">News &amp; Articles</h4> <ul> <li> <a href="https://www.fortinet.com/corporate/about-us/newsroom/press-releases.html" target="_self">News Releases</a> </li> <li> <a href="https://www.fortinet.com/corporate/about-us/newsroom/news.html" target="_blank">News Articles</a> </li> </ul> </div> <div class="b6-footer__footer-links-column"> <h4 class="b6-footer__header">Security Research</h4> <ul> <li> <a href="https://www.fortinet.com/fortiguard/threat-intelligence/threat-research.html" target="_self">Threat Research</a> </li> <li> <a href="https://fortiguard.com/" target="_self">FortiGuard Labs</a> </li> <li> <a href="https://www.fortinet.com/fortiguard/threat-intelligence/threat-map.html" target="_self">Threat Map</a> </li> <li> <a href="https://www.fortinet.com/solutions/ransomware.html" target="_self">Ransomware Prevention</a> </li> </ul> </div> <div class="b6-footer__footer-links-column"> <h4 class="b6-footer__header">Connect With Us</h4> <ul> <li> <a href="https://community.fortinet.com/" target="_blank">Fortinet Community</a> </li> <li> <a href="https://www.fortinet.com/partners/partner-program/become-a-fortinet-partner" target="_blank">Partner Portal</a> </li> <li> <a href="https://investor.fortinet.com/" target="_blank">Investor Relations</a> </li> <li> <a href="https://www.fortinet.com/corporate/about-us/product-certifications" target="_blank">Product Certifications</a> </li> </ul> </div> <div class="b6-footer__footer-links-column"> <h4 class="b6-footer__header">Company</h4> <ul> <li> <a href="https://www.fortinet.com/corporate/about-us/about-us" target="_blank">About Us</a> </li> <li> <a href="https://www.fortinet.com/corporate/about-us/executive-management" target="_self">Exec Mgmt</a> </li> <li> <a href="https://www.fortinet.com/corporate/careers" target="_self">Careers</a> </li> <li> <a href="https://www.fortinet.com/nse-training" target="_self">Training</a> </li> <li> <a href="https://www.fortinet.com/corporate/about-us/events" target="_self">Events</a> </li> <li> <a href="https://www.fortinet.com/corporate/about-us/industry-awards" target="_self">Industry Awards</a> </li> <li> <a href="https://www.fortinet.com/corporate/about-us/corporate-social-responsibility" target="_self">Social Responsibility</a> </li> <li> <a href="/resources/cyberglossary" target="_self">CyberGlossary</a> </li> <li> <a href="https://www.fortinet.com/sitemap" target="_self">Sitemap</a> </li> <li> <a href="https://www.fortinet.com/blog/blog-sitemap" target="_self">Blog Sitemap</a> </li> </ul> </div> <div class="b6-footer__contact-info"> <h4 class="b6-footer__header">Contact Us</h4> <ul> <li>(866) 868-3678</li> </ul> </div> </div> <div class="b6-footer__copyright"> <div class="b6-footer__copyright-info"> <p class="b6-footer__copyright-text">Copyright © 2024 Fortinet, Inc. All Rights Reserved</p> <a class="b6-footer__copyright-link" href="https://www.fortinet.com/corporate/about-us/legal.html" target="_blank">Terms of Services</a> <a class="b6-footer__copyright-link" href="https://www.fortinet.com/corporate/about-us/privacy.html" target="_blank">Privacy Policy</a> <span class="ot-ftnt-cookie-settings"> | <a href="#" onclick="Optanon.ToggleInfoDisplay()">Cookie Settings</a></span> </div> </div> </div> <!-- Launch COnfiguration --> <!-- END Launch COnfiguration --></div> </div> </div> <script src="/etc.clientlibs/fortinet-blog/clientlibs/clientlib-base.min.ba4f082a77dabb2c6baf715d9eb61c22.js"></script> <!-- BE IXF: The following <div> block needs to be placed in the location where the link block will be displayed BE IXF: For your website, the location is above/below ...--> <div class="be-ix-link-block"> <div class="be-related-link-container container"><div class="be-label">Also of Interest:</div><ul class="be-list"><li class="be-list-item"><a class="be-related-link" href="https://www.fortinet.com/blog/ciso-collective/cybersecurity-challenges-for-governments">Cybersecurity Challenges for Governments in 2022</a></li><li class="be-list-item"><a class="be-related-link" href="https://www.fortinet.com/blog/industry-trends/paying-ransomware">Pay Ransomware Settlements?</a></li><li class="be-list-item"><a class="be-related-link" href="https://www.fortinet.com/blog/ciso-collective/six-key-cybersecurity-metrics-for-your-board-of-directors-that-will-show-value">6 Key Cybersecurity Metrics for Your Board of...</a></li><li class="be-list-item"><a class="be-related-link" href="https://www.fortinet.com/blog/ciso-collective/emerging-cybersecurity-threats-and-attack-tactics">New and Emerging Cybersecurity Threats and...</a></li></ul> </div> <!-- be_sdkms_pub:link-block; link-block_1.0.0.0; bodystr; be_sdkms_date_modified:pn_tstr:Fri Nov 22 09:41:22 UTC 2024; pn_epoch:1732268482665; be_sdkms_timer: 0; --> </div> <!-- BE IXF: Footer End --> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10