A report by Check Point and GovInsider advises officials to take four steps to secure government and citizen data.

  • Officials must first protect their smartphones and tablets as these could be used to enter government networks through WiFi.
  • Emails are another entry point for hackers. Typical virus scanning software may not be smart enough to detect malware quickly.
  • Agencies must also be able to detect and take down more sophisticated malware. New variants are capable of mutating to go undetected by traditional anti-virus software. Advanced sandboxing techniques can help detect them early.
  • The Internet of Things is a growing area. Many everyday objects which are now being connected together were not designed to deal with data. Cloud technologies can provide a solution to this challenge.

If you would like to know more about about how to tackle these challenges, download the full report below.