{"id":27843,"date":"2017-08-12T15:01:05","date_gmt":"2017-08-12T22:01:05","guid":{"rendered":"https:\/\/www.careersingovernment.com\/tools\/?p=27843"},"modified":"2017-08-13T15:41:53","modified_gmt":"2017-08-13T22:41:53","slug":"information-governance-insights-cyber-security","status":"publish","type":"post","link":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/","title":{"rendered":"Information Governance Insights: Cyber Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; padding_mobile=&#8221;off&#8221; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.0.62&#8243; background_image=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/08\/cybersecurity3.jpg&#8221;][et_pb_row custom_padding=&#8221;6px|0px|91px|0px&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;on&#8221;][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.0.47&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;on&#8221;][et_pb_text max_width=&#8221;620px&#8221; _builder_version=&#8221;3.0.62&#8243; text_font=&#8221;PT Sans||||&#8221; text_font_size=&#8221;72&#8243; text_font_size_tablet=&#8221;52&#8243; text_font_size_last_edited=&#8221;on|tablet&#8221; text_text_color=&#8221;#ffffff&#8221; text_line_height=&#8221;1.1em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;0px||0px|&#8221;] Information Governance Insights: Cybersecurity [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; padding_mobile=&#8221;off&#8221; _builder_version=&#8221;3.0.47&#8243;][et_pb_row use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; custom_padding=&#8221;20px||0px|&#8221; custom_padding_tablet=&#8221;0px|||&#8221; column_padding_mobile=&#8221;on&#8221; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; admin_label=&#8221;row&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/03\/robin-woolen.jpg&#8221; animation=&#8221;off&#8221; sticky=&#8221;on&#8221; align=&#8221;center&#8221; disabled_on=&#8221;on|on|&#8221; _builder_version=&#8221;3.0.47&#8243;][\/et_pb_image][et_pb_text text_orientation=&#8221;center&#8221; max_width=&#8221;140px&#8221; disabled_on=&#8221;on|on|&#8221; _builder_version=&#8221;3.0.47&#8243; text_font=&#8221;PT Sans|on|||&#8221; text_font_size=&#8221;20&#8243; text_text_color=&#8221;#02b875&#8243; text_line_height=&#8221;1.2em&#8221; header_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;20px||0px|&#8221;] <span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.careersingovernment.com\/tools\/author\/robinw\/\" target=\"_blank\" rel=\"noopener noreferrer\">ROBIN WOOLEN<\/a><\/span> [\/et_pb_text][et_pb_text text_orientation=&#8221;center&#8221; max_width=&#8221;140px&#8221; disabled_on=&#8221;on|on|&#8221; _builder_version=&#8221;3.0.47&#8243; text_font=&#8221;PT Serif||on||&#8221; text_font_size=&#8221;16&#8243; text_text_color=&#8221;#363636&#8243; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;10px||60px|&#8221;] The Records Guru [\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_text max_width=&#8221;720px&#8221; _builder_version=&#8221;3.0.62&#8243; text_font=&#8221;PT Serif||||&#8221; text_font_size=&#8221;24&#8243; text_font_size_last_edited=&#8221;on|tablet&#8221; text_text_color=&#8221;#363636&#8243; text_line_height=&#8221;1.5em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;0px||0px|&#8221;]<\/p>\n<p class=\"Body\">Every day there&#8217;s another report on a cyber breach, so much so that it doesn\u2019t get reported on unless it massive in scale. What this means is that these breaches are so common that the news media is getting bored with reporting them and so people become complacent to this very serious issue. Therein lies the problem.<\/p>\n<p class=\"Body\">Hacks, Malware and Ransomware is such an issue that companies are starting to adjust their hiring practices for their information technology staffing so that every position include some element of cyber security skill set as a basic requirement to even be considered for an interview. This is a reasonable and practical response to the current environment we face today, but I believe it is short sighted. I am a firm believer that an organization will get hacked no matter how good their precautions are. This is not pessimistic on my part, it\u2019s simple math: Today\u2019s hacks are automated to the point where there are thousands if not millions of attempts to infiltrate an organization&#8217;s systems every day. They only need to work once. In fact, the latest ransomware virus was so successful not because of a failure of the information technology folks to do their job, but because of others in the organization not doing theirs. Entire organizations around the world were shut down because someone opened a phishing email and exposed their systems, which were not current with the latest operating system or security patches, to the attack. So in reality it was a lack of training and deferred maintenance that caused the problem. These are the types of issues Information Governance professionals must deal with every day.<\/p>\n<p class=\"Body\">In fact, the latest ransomware virus was so successful not because of a failure of the information technology folks to do their job, but because of others in the organization not doing theirs. Entire organizations around the world were shut down because someone opened a phishing email and exposed their systems, which were not current with the latest operating system or security patches, to the attack. So, in reality, it was a lack of training and deferred maintenance that caused the problem. These are the types of issues Information Governance professionals must deal with every day.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; background_color=&#8221;#f7f7f4&#8243; custom_padding=&#8221;0px||0px|&#8221; _builder_version=&#8221;3.0.47&#8243;][et_pb_row make_fullwidth=&#8221;on&#8221; custom_width_px=&#8221;680px&#8221; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; custom_padding=&#8221;0px||0px|&#8221; make_equal=&#8221;on&#8221; column_padding_mobile=&#8221;on&#8221; background_color_2=&#8221;#efefe9&#8243; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/08\/information-governance-cyber-security.jpg&#8221; animation=&#8221;off&#8221; sticky=&#8221;on&#8221; _builder_version=&#8221;3.0.62&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; background_color=&#8221;#efefe9&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/08\/cyber-security-banner.jpg&#8221; animation=&#8221;off&#8221; sticky=&#8221;on&#8221; _builder_version=&#8221;3.0.62&#8243;][\/et_pb_image][et_pb_text text_orientation=&#8221;center&#8221; disabled_on=&#8221;off|off|&#8221; _builder_version=&#8221;3.0.62&#8243; text_font=&#8221;PT Serif||||&#8221; text_font_size=&#8221;24&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_text_color=&#8221;#818178&#8243; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;20%|10%||10%&#8221; custom_margin_tablet=&#8221;|10%||10%&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221;] Cybersecurity is really everyone\u2019s business. The information technology department can only do so much to keep the wolves at bay. [\/et_pb_text][et_pb_text text_orientation=&#8221;center&#8221; _builder_version=&#8221;3.0.47&#8243; text_font=&#8221;PT Sans|on|||&#8221; text_font_size=&#8221;12&#8243; text_text_color=&#8221;#888888&#8243; text_letter_spacing=&#8221;2px&#8221; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;20px||20%|&#8221; custom_margin_tablet=&#8221;20px|||&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221;] ROBIN WOOLEN [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding=&#8221;0px||0px|&#8221; _builder_version=&#8221;3.0.47&#8243;][et_pb_row use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;4&#8243; custom_padding=&#8221;20px||0px|&#8221; custom_padding_tablet=&#8221;0px|||&#8221; column_padding_mobile=&#8221;on&#8221; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; parallax_method_3=&#8221;off&#8221; parallax_method_4=&#8221;off&#8221; admin_label=&#8221;row&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_text _builder_version=&#8221;3.0.62&#8243; text_font=&#8221;PT Serif||||&#8221; text_font_size=&#8221;20&#8243; text_font_size_last_edited=&#8221;on|tablet&#8221; text_text_color=&#8221;#363636&#8243; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;60px||0px|&#8221; custom_margin_tablet=&#8221;40px||0px|&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221;]<\/p>\n<p>Let&rsquo;s start by addressing the training issue first: Nobody wants to be the one that takes down their entire organization due to something they did, but they can&rsquo;t help out if they don&rsquo;t know how to spot malicious emails that make through the firewall. This takes constant training and reminders to what is going on in the cyber world, how it can affect them and what they can do to deal with it effectively. Training is one of the easiest and most cost effective ways to deal with cyber attacks because most attacks are aimed at the individual rather than a system. If you can educate your staff to these threats you will go a long way to plugging the holes in your security program. Now let&#8217;s talk about the real elephant in the room &#8211; deferred maintenance.<\/p>\n<p>The WannaCry virus exposed a dirty little secret that many, if not all, organizations have been dealing with forever. As odd as it may seem entire international organizations were taken down because they are still running on the Microsoft Vista operating system. This really shouldn&#8217;t be so unfamiliar when you think that most organizations have an old system that runs some critical functions with customization done over time that now simply can&#8217;t be upgraded without a substantial financial commitment nobody is willing to make.<\/p>\n<p>To be honest, deferred maintenance is something that has always happened and probably always will. As long as Information Technology can keep it going there never was an issue. It is only now with these attacks that an organization may have to rethink how they plan their upgrade schedule because of the risk these systems represent. It is the responsibility of the information technology department to inform Management of these vulnerabilities, but it is Management&rsquo;s responsibility to take these warnings seriously and budget accordingly. So as you can see, To be honest, deferred maintenance is something that has always happened and probably always will. As long as Information Technology can keep it going there never was an issue. It is only now with these attacks that an organization may have to rethink how they plan their upgrade schedule because of the risk these systems represent.<\/p>\n<p>It is the responsibility of the information technology department to inform Management of these vulnerabilities, but it is Management&rsquo;s responsibility to take these warnings seriously and budget accordingly. So as you can see, cyber security is really everyone&rsquo;s business. The information technology department can only do so much to keep the wolves at bay. It is up to everyone to be aware of tactics being used, how to respond to them and for Management to understand that the risk of deferred maintenance has become more critical.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding=&#8221;75px|0px|30px|0px&#8221; _builder_version=&#8221;3.0.47&#8243;][et_pb_row use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;780px&#8221; custom_padding=&#8221;0px|0px|73.90625px|0px&#8221; column_padding_mobile=&#8221;on&#8221; parallax_method_1=&#8221;off&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_text text_orientation=&#8221;center&#8221; _builder_version=&#8221;3.0.47&#8243; text_font=&#8221;PT Serif||||&#8221; text_font_size=&#8221;36&#8243; text_font_size_tablet=&#8221;26&#8243; text_font_size_last_edited=&#8221;on|tablet&#8221; text_text_color=&#8221;#363636&#8243; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;||70px|&#8221;] Want new articles before they get published? Subscribe to our Awesome Newsletter. [\/et_pb_text][et_pb_contact_form captcha=&#8221;off&#8221; module_id=&#8221;et_pb_contact_form_0&#8243; _builder_version=&#8221;3.0.47&#8243; custom_button=&#8221;on&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#02b875&#8243; button_border_width=&#8221;8&#8243; button_border_color=&#8221;#02b875&#8243; button_border_radius=&#8221;4&#8243;][et_pb_contact_field field_id=&#8221;E-mail Address&#8221; field_title=&#8221;E-mail Address&#8221; field_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;3.0.47&#8243; form_field_font=&#8221;PT Sans||||&#8221; form_field_font_size=&#8221;20&#8243; form_field_font_size_tablet=&#8221;20&#8243; form_field_font_size_phone=&#8221;20&#8243; form_field_text_color=&#8221;#adadab&#8221; form_field_line_height=&#8221;1.4em&#8221; form_field_line_height_tablet=&#8221;1.4em&#8221; form_field_line_height_phone=&#8221;1.4em&#8221; use_border_color=&#8221;on&#8221; border_color=&#8221;#adadab&#8221; border_width=&#8221;1&#8243; border_style=&#8221;solid&#8221; custom_css_main_element=&#8221;height:64px;&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;First Name&#8221; field_title=&#8221;First Name&#8221; field_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;3.0.47&#8243; form_field_font=&#8221;PT Sans||||&#8221; form_field_font_size=&#8221;20&#8243; form_field_font_size_tablet=&#8221;20&#8243; form_field_font_size_phone=&#8221;20&#8243; form_field_text_color=&#8221;#adadab&#8221; form_field_line_height=&#8221;1.4em&#8221; form_field_line_height_tablet=&#8221;1.4em&#8221; form_field_line_height_phone=&#8221;1.4em&#8221; use_border_color=&#8221;on&#8221; border_color=&#8221;#adadab&#8221; border_width=&#8221;1&#8243; border_style=&#8221;solid&#8221; custom_css_main_element=&#8221;height:64px;&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; background_color=&#8221;#222222&#8243; custom_padding=&#8221;78px||78px|&#8221; _builder_version=&#8221;3.0.47&#8243;][et_pb_row make_fullwidth=&#8221;on&#8221; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; custom_padding=&#8221;0px|0px|0px|0px&#8221; padding_mobile=&#8221;on&#8221; background_color=&#8221;#f5f5f5&#8243; column_padding_mobile=&#8221;on&#8221; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; parallax_method_3=&#8221;off&#8221; parallax_method_4=&#8221;off&#8221; module_class=&#8221;border-hover&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2016\/11\/typing.jpg&#8221; animation=&#8221;off&#8221; sticky=&#8221;on&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.0.47&#8243;][\/et_pb_image][et_pb_cta title=&#8221;CAREER ADVICE&#8221; button_url=&#8221;https:\/\/www.careersingovernment.com\/tools\/gov-talk\/career-advice\/&#8221; button_text=&#8221;CAREER ADVICE&#8221; use_background_color=&#8221;off&#8221; _builder_version=&#8221;3.0.47&#8243; header_font_size=&#8221;30px&#8221; body_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;] Advice from top Career specialists [\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2016\/11\/news-cig.jpg&#8221; sticky=&#8221;on&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.0.47&#8243;][\/et_pb_image][et_pb_cta title=&#8221;GOV TALK&#8221; button_url=&#8221;https:\/\/www.careersingovernment.com\/tools\/gov-talk-page\/&#8221; button_text=&#8221;Government Updates&#8221; use_background_color=&#8221;off&#8221; _builder_version=&#8221;3.0.47&#8243; header_font_size=&#8221;30px&#8221; body_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;] Articles about the Public Sector [\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2016\/11\/public-secot-trends.jpg&#8221; animation=&#8221;off&#8221; sticky=&#8221;on&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.0.47&#8243;][\/et_pb_image][et_pb_cta title=&#8221;TRENDS&#8221; button_url=&#8221;https:\/\/www.careersingovernment.com\/tools\/hr-tips-and-strategies\/&#8221; button_text=&#8221;TRENDS&#8221; use_background_color=&#8221;off&#8221; _builder_version=&#8221;3.0.47&#8243; header_font_size=&#8221;30px&#8221; body_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;] Public Sector Trends [\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is really everyone\u2019s business. The information technology department can only do so much to keep the wolves at bay. It is up to everyone to be aware of tactics being used, how to respond to them and for Management to understand that the risk of deferred maintenance has become more critical<\/p>\n","protected":false},"author":3025,"featured_media":27848,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_cbd_carousel_blocks":"[]","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[13],"tags":[38],"class_list":["post-27843","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-about-gov","tag-management-government-administration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Governance Insights: Cyber Security - Careers in Government<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Governance Insights: Cyber Security - Careers in Government\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is really everyone\u2019s business. The information technology department can only do so much to keep the wolves at bay. It is up to everyone to be aware of tactics being used, how to respond to them and for Management to understand that the risk of deferred maintenance has become more critical\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Careers in Government\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CareersInGovernment\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-12T22:01:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-13T22:41:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/08\/cybersecurity3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robin Woolen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TheRecordsGuru\" \/>\n<meta name=\"twitter:site\" content=\"@careersingov\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robin Woolen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/\"},\"author\":{\"name\":\"Robin Woolen\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/person\\\/ec95718fa854647f303538bd817f572f\"},\"headline\":\"Information Governance Insights: Cyber Security\",\"datePublished\":\"2017-08-12T22:01:05+00:00\",\"dateModified\":\"2017-08-13T22:41:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/\"},\"wordCount\":2389,\"publisher\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/cybersecurity3.jpg\",\"keywords\":[\"management. government administration\"],\"articleSection\":[\"About the Public Sector\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/\",\"name\":\"Information Governance Insights: Cyber Security - Careers in Government\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/cybersecurity3.jpg\",\"datePublished\":\"2017-08-12T22:01:05+00:00\",\"dateModified\":\"2017-08-13T22:41:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/cybersecurity3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/cybersecurity3.jpg\",\"width\":500,\"height\":250,\"caption\":\"Digital representation of security: a glowing binary code (0s and 1s) forms vertical lines against a dark, blurred background. A ribbon with the word \\\"SECURITY\\\" spirals around the binary lines, embodying the concept of information governance and cybersecurity or digital protection.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Tools\",\"item\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Government Talk\",\"item\":\"https:\\\/\\\/www.careersingovernment.com\\\/newdesign\\\/tools\\\/gov-talk\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"About the Public Sector\",\"item\":\"https:\\\/\\\/www.careersingovernment.com\\\/newdesign\\\/tools\\\/gov-talk\\\/about-gov\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Information Governance Insights: Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#website\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/\",\"name\":\"Careers in Government\",\"description\":\"Oldest and largest, award-winning site for finding jobs in government, education and other public sector agencies. Valuable tools for job seekers and employers.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#organization\",\"name\":\"Careers in Government\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/CIG-horizontal-dark-v2.png\",\"contentUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/CIG-horizontal-dark-v2.png\",\"width\":\"708\",\"height\":\"480\",\"caption\":\"Careers in Government\"},\"image\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CareersInGovernment\",\"https:\\\/\\\/x.com\\\/careersingov\",\"https:\\\/\\\/www.instagram.com\\\/careersingov\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/person\\\/ec95718fa854647f303538bd817f572f\",\"name\":\"Robin Woolen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g\",\"caption\":\"Robin Woolen\"},\"description\":\"Robin Woolen, MBA, IGP has worked in the field of information lifecycle management since 1994 with a specialty in strategic consulting focused on enterprise-scale information management systems. His career includes both Public and Private sectors with a client list from the nation\u2019s top 25 cities and the Fortune 500. Mr. Woolen is a recognized leader in the field of information governance and a national speaker teaching others how to improve their own programs. Mr. Woolen holds a Masters of Business Administration in Management of Information Systems from Park University and is a certified Information Governance Professional from ARMA International, the authority on governing information as a strategic asset.\",\"sameAs\":[\"http:\\\/\\\/www.TheRecordsGuru.com\",\"https:\\\/\\\/x.com\\\/TheRecordsGuru\"],\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/author\\\/robinw\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Governance Insights: Cyber Security - Careers in Government","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Information Governance Insights: Cyber Security - Careers in Government","og_description":"Cybersecurity is really everyone\u2019s business. The information technology department can only do so much to keep the wolves at bay. It is up to everyone to be aware of tactics being used, how to respond to them and for Management to understand that the risk of deferred maintenance has become more critical","og_url":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/","og_site_name":"Careers in Government","article_publisher":"https:\/\/www.facebook.com\/CareersInGovernment","article_published_time":"2017-08-12T22:01:05+00:00","article_modified_time":"2017-08-13T22:41:53+00:00","og_image":[{"width":500,"height":250,"url":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/08\/cybersecurity3.jpg","type":"image\/jpeg"}],"author":"Robin Woolen","twitter_card":"summary_large_image","twitter_creator":"@TheRecordsGuru","twitter_site":"@careersingov","twitter_misc":{"Written by":"Robin Woolen","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/"},"author":{"name":"Robin Woolen","@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/person\/ec95718fa854647f303538bd817f572f"},"headline":"Information Governance Insights: Cyber Security","datePublished":"2017-08-12T22:01:05+00:00","dateModified":"2017-08-13T22:41:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/"},"wordCount":2389,"publisher":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#organization"},"image":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/08\/cybersecurity3.jpg","keywords":["management. government administration"],"articleSection":["About the Public Sector"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/","url":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/","name":"Information Governance Insights: Cyber Security - Careers in Government","isPartOf":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/08\/cybersecurity3.jpg","datePublished":"2017-08-12T22:01:05+00:00","dateModified":"2017-08-13T22:41:53+00:00","breadcrumb":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/#primaryimage","url":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/08\/cybersecurity3.jpg","contentUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/08\/cybersecurity3.jpg","width":500,"height":250,"caption":"Digital representation of security: a glowing binary code (0s and 1s) forms vertical lines against a dark, blurred background. A ribbon with the word \"SECURITY\" spirals around the binary lines, embodying the concept of information governance and cybersecurity or digital protection."},{"@type":"BreadcrumbList","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Tools","item":"https:\/\/www.careersingovernment.com\/tools\/"},{"@type":"ListItem","position":2,"name":"Government Talk","item":"https:\/\/www.careersingovernment.com\/newdesign\/tools\/gov-talk\/"},{"@type":"ListItem","position":3,"name":"About the Public Sector","item":"https:\/\/www.careersingovernment.com\/newdesign\/tools\/gov-talk\/about-gov\/"},{"@type":"ListItem","position":4,"name":"Information Governance Insights: Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.careersingovernment.com\/tools\/#website","url":"https:\/\/www.careersingovernment.com\/tools\/","name":"Careers in Government","description":"Oldest and largest, award-winning site for finding jobs in government, education and other public sector agencies. Valuable tools for job seekers and employers.","publisher":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.careersingovernment.com\/tools\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.careersingovernment.com\/tools\/#organization","name":"Careers in Government","url":"https:\/\/www.careersingovernment.com\/tools\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/logo\/image\/","url":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2024\/11\/CIG-horizontal-dark-v2.png","contentUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2024\/11\/CIG-horizontal-dark-v2.png","width":"708","height":"480","caption":"Careers in Government"},"image":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CareersInGovernment","https:\/\/x.com\/careersingov","https:\/\/www.instagram.com\/careersingov\/"]},{"@type":"Person","@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/person\/ec95718fa854647f303538bd817f572f","name":"Robin Woolen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g","caption":"Robin Woolen"},"description":"Robin Woolen, MBA, IGP has worked in the field of information lifecycle management since 1994 with a specialty in strategic consulting focused on enterprise-scale information management systems. His career includes both Public and Private sectors with a client list from the nation\u2019s top 25 cities and the Fortune 500. Mr. Woolen is a recognized leader in the field of information governance and a national speaker teaching others how to improve their own programs. Mr. Woolen holds a Masters of Business Administration in Management of Information Systems from Park University and is a certified Information Governance Professional from ARMA International, the authority on governing information as a strategic asset.","sameAs":["http:\/\/www.TheRecordsGuru.com","https:\/\/x.com\/TheRecordsGuru"],"url":"https:\/\/www.careersingovernment.com\/tools\/author\/robinw\/"}]}},"_links":{"self":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts\/27843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/users\/3025"}],"replies":[{"embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/comments?post=27843"}],"version-history":[{"count":7,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts\/27843\/revisions"}],"predecessor-version":[{"id":27957,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts\/27843\/revisions\/27957"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/media\/27848"}],"wp:attachment":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/media?parent=27843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/categories?post=27843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/tags?post=27843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}