by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : October 2012
OCTOBER 2012 4 GCN OCTOBER 2012 • GCN.COM Inside Departments 6 NEWS ANALYSIS Trade-offs of turning to cloud broker. 7 DATAPOINT A survey reveals agencies' top security concerns. 7 EXPLAINER What is "sparse data"? 8 HOW IT WORKS How to block a high-level DDOS attack 8 INDEX Most citied challenges in moving to the cloud. 10 DATAPOINT Half of federal agencies miss IPv6 transition deadline. Features 12 ANALYSIS What Windows 8 can do for your agency Security and cross-platform interface top the list of appealing features for government. 20 CASE STUDY How to keep mobile from flooding 311 How Minneapolis used Open311 tool to ease the brunt of non- emergency calls and speed up response times. 23 CASE STUDY Energy's steps to email security Energy Department offers a solution to email encryption through the thickets of mobile and PIV cards. 26 CASE STUDY How NCI picked its mobile path The National Cancer Institute's painstaking method for choosing a mobile platform. [the index] The real threat to government information The most common threat to govern- ment data is human error rather than malicious hackers or code, according to an analysis of reported data breaches by the security intelligence company Rapid7. Unintended disclosure was responsible for 29 percent of incidents reported by agencies over the last three years, putting it in first place in terms of number of breaches. In terms of number of records exposed, loss or theft of portable devices was number one, exposing more than 80 million records, for a whopping 86 percent of that total. Hacking and malware came in well down the list, with 40 incidents exposing about 1 million records. The data was culled by Rapid7 from the Chronology of Data Breaches main- tained by the Privacy Rights Clearing- house. -- William Jackson Top 5 causes of government data breaches January 2009 to May 2012 1. Unintended disclosure Incidents: 78 Records exposed: 11.8 million 2. Loss of theft or portable device Incidents: 52 Records exposed: 80.7 million 3. Loss of physical records Incidents: 46 Records exposed: 297,000 4. Hacking or malware Incidents: 40 Records exposed: 1.1 million 5. Insider Incidents: 39 Records exposed: 177,000 Commentary 18 INTERNAUT Replacing IT? Consider starting over from scratch. 19 CYBERYE Lessons from a telework stress test 28 EMERGING TECH DOD lets loose the digital dogs of war 12 2012 GCN AWARDS BEST TEAMS & TOP EXECS PAGE 29