by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : November 2013
Federal agencies are moving to the next stage of cybersecurity maturity. With growing frequency, they are making cybersecurity an integral part of their IT acquisitions and operations --- the baked-in rather than added-on model. Cybersecurity means much more than traditional network perimeter defense, although that remains critical. Because agencies are deploying cloud computing and mobility in a variety of architectures, they need deeper and more exible approaches to cybersecurity. The threats themselves are constantly growing more varied and complicated. The government s big challenge today is to deploy comprehensive security solutions within its limited budgets. The old approach --- buying cybersecurity as an "insurance policy" rather than making it integral to systems design and procurement --- is just rolling the dice. The cost of one successful cyber attack will always dwarf the cost of the managed security services that could have prevented it. We d like to suggest a new, four-pronged approach: 1. Take advantage of government-wide offerings such as the Department of Homeland Security s Intrusion Prevention Security Services (IPSS). 2. Consider your agency s cybersecurity posture in every procurement of communications infrastructure. 3. Train your employees in security best practices and policies --- they are your rst line of defense against security breaches. 4. Obtain a professional assessment of your current situation and develop a roadmap that addresses your individual agency needs. Cloud-based products reduce new agency investments Cloud-based security services are one of the key weapons in the arsenal of cybersecurity protections. As with all cloud-based offerings, you get proven solutions that undergo continuous improvements, eliminating the need to make costly upgrades on your own. In choosing a cloud-based cybersecurity solutions provider, agencies should look for a company like CenturyLink with its carrier-grade infrastructure and unparalleled reliability. We provide multiple lines of defense against attacks. Our cloud-based security services include distributed denial of service mitigation services, managed trusted IP service (MTIPS) and intrusion detection and prevention services. In addition, agencies need to provide continuous training for the internal teams who set their cybersecurity policies and practices. CenturyLink s exibility in its offerings can provide the training necessary to keep agency teams current. Similar exibility is available in our deployment models, including our suite of services on premises, as a managed service in the cloud, or in a hybrid arrangement. One thing we know for sure -- the cyber threat environment is challenging and is constantly changing. But CenturyLink s solutions are up to the challenge. New cyber threats demand new approach SPONSORED CONTENT For more information about CenturyLink's government services and offerings, please contact your agency's representative or email us at CTLfederal.firstname.lastname@example.org For more information on CenturyLink, please go to: CenturyLink.com/gov CENTURYLINK S COMPREHENSIVE CYBERSECURITY PORTFOLIO