Page 9 - City of Marion Information Technology Strategic Plan 2019-2021
P. 9

Hackers focus their efforts on emails and business applications, a target of opportunity because
                                                                                                they are often accessible from the Internet. Hackers also know that compromising an application
                                                                                                can provide access to a treasure trove of backend data. Application security is extremely difficult
                                                                                                to get right. Securing applications is technically challenging and now requires sophisticated tools
                                                                                                                and training to avoid common pitfalls that hackers often exploit.

                                                                                                      The City of Marion IT department is        National headlines continue to tell the
                                                                                                      responsible for over 300 devices          stories of major data breaches and cyber
                                                                                                      with that comes with end users, the       attacks against government agencies, 5
                                                                                                      more users the higher the threat.          known attacks happened within a 200
                                                                                                      Our security initiatives will focus on       mile radius.  The City of Marion IT
                                                                                                      ensuring the confidentiality and              department approach is to be as
                                                                                                      integrity of our resources while             proactive as possible in helping the
                                                                                                      increasing the level of security          organization prevent, detect, respond to
                                                                                                      awareness and education of our end           and recover from targeted attacks.
                                                                                                      user community. We continue to             Firewalls, email protections, two factor
                                                                                                      enhance our data and network              authentication, access controls and many
                                                                                                      infrastructure and update our            other tools must be deployed with regular
                                                                                                      information security policies as           updates to help keep the network and
                                                                                                      needed.                                              applications secure.
                                                                                                            Key Strategies:


                                                                                                            •   Provide testing and training to raise employee awareness in an
                                                                                                                attempt to help prevent phishing and other cyberattacks.
            Security                                                                                        •   Include security considerations from the beginning in implementation


                                                                                                                of new business processes and software systems.

                                                                                                            •   Includes strategies to remain focused on department goals, data
            In one day we successfully held off 5,306 brute                                                     protection and security threats

            force cyberattacks.





                                                                                                                                                                         City of Marion      9
   4   5   6   7   8   9   10   11   12   13   14