Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Federal Cybersecurity Report Finds Antiquated Infrastructure = Alarming Risk of Breach

May 3, 2017

  • Blog
  • Archive
Federal Cybersecurity Report We’ve all seen the news. Federal agencies from the NSA to the IRS are being compromised by cyber criminals at an alarming rate. What’s going on? Why does this continue to happen? BeyondTrust recently commissioned a survey of senior Federal IT managers to find out.

Federal IT Forecast: Old and Risky with a High Chance for Breach

In the Federal Cybersecurity Threat Survey, we found ample examples of aging infrastructure. Truly antiquated technology is still in use more often than you might think. A surprising 27% of respondents reported that paper tape is still in use in their organizations. 11% still have systems using floppy disks. 47% are still using Windows XP.
81% of federal IT managers say aging infrastructure is concern with cybersecurity. Get this report and discover what to do when you can't modernize fast enough. GET THE REPORT
Why would agencies continue to use these outdated systems? 69% report that the concern over losing critical data in the conversion process makes the risk of modernization greater than the reward. On the flipside of that coin, an overwhelming majority of Federal IT managers (81%) say aging IT infrastructures have a somewhat to extremely large impact on their cybersecurity risk. Which risk is greater? The challenge of modernization or the very high risk of breach?

Federal IT Managers are Concerned about Antiquated Infrastructure

If you are a federal IT pro, this problem is no surprise to you or your peers. Modernization across the next 24 months is the top priority of survey participants. Unfortunately, three out of every four survey respondents report that modernization is hindered because “things take longer than expected”. Replacement of these legacy systems quickly is not a realistic probability. So, the threat of breach remains.

How to Address the Risk Today

Implementing modern security practices in aging systems is tough. Although federal IT managers report that practices like privileged access management and vulnerability management are most important to securing their environments, they also report that many are not employing best practices in these areas. This puts critical federal agency information and systems at a very high risk for breach. In the Federal CyberSecurity Threat Survey Report, there are four recommendations that agencies can put in place today to dramatically mitigate risk in federal legacy environments. These strategies will still be best practices when modern systems come on line.
  1. Manage privileged credentials with greater discipline, eliminate admin rights and enforce least privilege
  2. Isolate legacy systems to reduce attack surfaces
  3. Improve the maturity of vulnerability management through automated patching
  4. Unite threat intelligence from multiple sources to better prioritize risks across the environment
Check out the Federal Cybersecurity Threat Survey report to gain a better understanding of what federal IT managers are doing today to combat cyber risks, how often they are faced with breach and what the costs of those breaches are. In the report we expand on risk mitigation recommendations to help agencies address a critically high risk for breach. GET THE REPORT

Embed Infographic on Your Website

<a href="https://www.beyondtrust.com/resources/white-paper/federal-cybersecurity-threat-survey-report/"><img src="/assets/images/bt/infographic-federal-cyber-threat-survey-800.png" alt="Federal Cybersecurity Threat Survey Report" width="400px" border="0"; /></a><span>Please include attribution to BeyondTrust with this graphic.</span>

Scott Lang

Sr. Director, Product Marketing at BeyondTrust

Scott Lang has nearly 20 years of experience in technology product marketing, currently guiding the product marketing strategy for BeyondTrust’s privileged account management solutions and vulnerability management solutions. Prior to joining BeyondTrust, Scott was director of security solution marketing at Dell, formerly Quest Software, where he was responsible for global security campaigns, product marketing for identity and access management and Windows server management.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 25, 2021

Customer Tips & Tricks: Remote Support for Android

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.