The Commission on Enhancing National Cybersecurity established by President Obama recently released a 90-page Report on Securing and Growing the Digital Economy, a report whose explicit purpose was to make recommendations that would strengthen cybersecurity in both the public and private sectors. The report makes specific and excellent recommendations to address urgent cybersecurity challenges, including the obsolescence of the “classic concept of the security perimeter” brought about by mobile devices. Cybersecurity pros are urging the incoming Trump administration to heed the recommendations of the report.
“When it comes to cybersecurity, organizations cannot operate in isolation. It is impossible to stop all attacks. Resilience must be a core component of any cybersecurity strategy,” the commissioners said in their report. The report lays out actions that government, industry and consumers can take to better address cybersecurity threats, emphasizing the importance of collaboration in preventing and responding to cybersecurity events.
Specific recommendations in the report include:
President Obama issued a press release on the Report, outlining the various cybersecurity initiatives taken by his administration and how the Report builds upon that progress, as “there is much more to do” to “stay ahead of the cybersecurity curve” as a National security priority. The release states that the Obama Administration will “take additional action wherever possible” to take the recommended steps in the report and asks Congress to fully fund these urgent cybersecurity needs. It is unclear, at this time, whether the Trump team will accept the commission’s advice or who will be appointed to cybersecurity policy positions within the new Administration.
Whether the new Administration follows-through on the report or not, much can be gleaned by the private sector about how to improve cybersecurity standards through a risk-based approach that prioritizes resilience for responding to and recovering from cyber attacks.
Absolute provides unprecedented visibility into the endpoint and the data contained therein. The Endpoint Data Discovery (EDD) feature of Absolute DDS allows you to see where your sensitive data is, at any time, on or off the network, even if it’s held in the cloud. Thanks to automated alerts and remote capabilities supported with Absolute persistence technology, you can maintain oversight over your endpoints: check the status of security software, receive alerts for unusual user or device activity, scan for sensitive data, and lock down or wipe devices that are deemed to be at risk. To learn more, visit Absolute.com