Aggressive Actions In Cyberspace

[vc_row][vc_column][vc_column_text]

On September 17, the United States Senate Committee on Armed Services released information describing an investigation on Chinese hackers.
“These peacetime intrusions into the networks of key defense contractors are more evidence of China’s aggressive actions in cyberspace,” said Sen. Carl Levin, D-Mich., the committee’s chairman. “Our findings are a warning that we must do much more to protect strategically significant systems from attack and to share information about intrusions when they do occur.”
The report found that Chinese hackers successfully broke into U.S. Transportation Command contractors’ computer systems at least 20 times this past year. The investigation found that TRANSCOM, which is responsible for moving troops and equipment around the world, was only aware of two of those security breaches. The committee included a provision in its version of the National Defense Authorization Act for Fiscal Year 2015 directed at addressing reporting gaps and improving the way in which the Department disseminates information about cyber intrusions into the computer networks of operationally critical contractors.
United States Senate Committee on Armed Services Press Release: SASC investigation finds Chinese intrusions into key defense contractors

Important Reminders:

- With cyber security threats constantly popping up in the news today, it is essential to have protocols in place to protect data
- Information-sharing rules can increase security and prevent a breach
- It’s important for IT security professionals to understand and explain all security policies to staff so suspicious behavior can be reported as soon as threats occur

More on security:

How can Managed Solution help? Managed Solution can partner with your IT staff or act as your IT team, making it easy to leverage us as little or as much as you need. We provide industry specific technology solutions that blend certified technology, best practices, and an extensive knowledge of compliance requirements. Fill out the form below or call us at 800-550-3795 to speak with an expert.

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_raw_js]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[/vc_raw_js][/vc_column][/vc_row]

Continued Reading

4 Steps to Prevent Retail Fraud

[vc_row][vc_column][vc_column_text] After the massive security breach that hit Target last […]

LEARN MORE

Technology Tools For Construction Challenges

[vc_row][vc_column][vc_column_text] Project managers employed in the construction business have reported […]

LEARN MORE

Contact us Today!

Chat with an expert about your business’s technology needs.