in ,

SolarWinds’ Joel Dolisy: Agencies Should Adopt Policies, Tools to Avoid Shadow IT-Related Breach

SolarWinds' Joel Dolisy: Agencies Should Adopt Policies, Tools to Avoid Shadow IT-Related Breach - top government contractors - best government contracting event
https://executivebiz-media.s3.amazonaws.com/2022/08/19/30/9f/c3/a0/b7/6f/d4/64/Executive-Biz.png

operational security1Federal information technology leaders can avoid the potential security risks of shadow IT activities within their agencies by implementing multiple strategies, Joel Dolisy, chief information officer and chief technology officer of SolarWinds, wrote in an opinion piece published Friday on GCN.

Dolisy recommended that agency IT managers create a watch list of suspicious or unauthorized devices and use Internet protocol management and user device tracking tools to identify who and what are accessing the network.

He also urged agencies to monitor system anomalies, bandwidth usage and log files with automated platforms.

It is also important that agency employees are informed about policies concerning the use of unsanctioned IT devices and systems in the workplace, according to Dolisy.

He added that agencies should limit access to hosted services for enterprise data sharing, applications and email because they can put their infrastructure at risk.

ExecutiveBiz Logo

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Industry News

mm

Written by Mary-Louise Hoffman

is a writer of news summaries about executive-level business activity in the government contracting sector. Her reports for ExecutiveBiz are focused on trends and events that drive the GovCon industry to include commercial technologies that private companies are developing for federal government use. She contributes news content to ExecutiveBiz’s sister sites GovCon Wire and ExecutiveGov.

FireEye: Advanced Phishing Campaign Targets Asian Diplomatic, Border Conflict Data - top government contractors - best government contracting event
FireEye: Advanced Phishing Campaign Targets Asian Diplomatic, Border Conflict Data
Scott Gaydos: Services-Based IT Governance to Drive 'Shadow IT' Benefits in Govt - top government contractors - best government contracting event
Scott Gaydos: Services-Based IT Governance to Drive ‘Shadow IT’ Benefits in Govt