From Public Safety to Parks and Recreation, city governments have a lot to manage with minimal resources. Unfortunately for the already-busy officials, cyber security needs to be a top priority as well, a fact made evident by the recent 9 day attack on Atlanta, Georgia.
People in all walks of life rely on digital recordkeeping, and the government is no exception. Cutting off this flow of information is like severing a main artery. Catastrophic! A lot is at stake.
This past week, ransomware used to encrypt and lock files in Atlanta city offices crippled the city’s ability to access their critical records – sending government staff members back in time as they had to resort to pen and paper. No longer business-as-usual, some staff members lost as much as 16 years worth of data; keeping them from serving the public.
Humans are another hurdle
Let’s face it. We can’t stop cybercrime by outsmarting the bad guys with ‘next-generation’ firewalls or other traditional security technologies. Why? Most security products require a small army of skilled IT pros. Case in point. Firewalls typically require between 100 and 1,000 entries for configuration, and each entry is an opportunity to introduce an error. As more and more devices come online and the demand for security increases by one or two orders of magnitude, there is simply not enough people to do the job, and existing practices will fail to keep up.
Albert Einstein famously said, "We cannot solve our problems with the same level of thinking that created them.” If the root cause of Internet insecurity is the reliance on a trust-based model that is inherently insecure and can’t be properly managed, how do we fix it? Ideally, we’d design a new, secure Internet that isn’t based on TCP/IP, but it’s too late for that. The TCP/IP ship has sailed, and we’re all onboard. But make no mistake: we absolutely need a fundamental change in our approach to security.
Redefining trust with the Host Identity Protocol (HIP)
We can fix the problems associated with IP communications by shifting the model from IP address routing to a simple system based on trust between cryptographic identities. Enter HIP (Host Identity Protocol), an open IETF standard for encrypted communications. At Tempered Networks, we’re building the foundational elements of a secure private Internet and are doing this by inserting a cryptographic identity into the communications stack: the Host Identity. This on its own only gets us so far. Orchestrating trust, at scale, between these identities is where it gets interesting. We must do this today to ensure business critical infrastructure, data, systems, and other high value assets are safe.
The smart approach is to be secure by default, rather than relying on bolted-on components to become secure. We’ll show you how simple it is to not only get started, but also create a sustainable and scalable way to stay on the right track with micro-segmentation that works.
Contact us at email@example.com to learn how IDN can keep hackers (and paper record keeping) out of your office.