Monday, July 28, 2014

Lajes Field receives 'excellent' in cyber inspection

by 1st Lt. Korey Fratini
65th ABW Public Affairs


7/28/2014 - LAJES FIELD, Azores  -- Over the course of 21-25 July the Defense Information Systems Agency inspection team conducted a Command Cyber Readiness Inspection here, resulting in a rating of excellent.

"I am extremely proud of all the hard work Airmen from Team Lajes and the 65th Communications Squadron accomplished to achieve an excellent rating during the CCIR. This exemplifies our ability to be a forward strategic communications base that is ready to provide full spectrum communications to our expeditionary forces, now," stated Col. Martin Rothrock, commander, 65th Air Base Wing.

A CCRI is the equivalent of an Operational Readiness Inspection of a base's networks and supporting security practices.

Leading the effort for Team Lajes was Maj. Jennifer Carns, commander, 65th Communication Squadron.

"The preparation for the inspection has definitely been a team effort across the base. All units were engaged to make this possible," said Carns. "We have made great progress and established processes that will ensure our network is secure, not just for the CCRI but post-CCRI as well.

The CCRI is a rigorous inspection-oriented process designed to validate network security compliance across Department of Defense networks. The team evaluates compliance with DOD security orders and directives, network vulnerabilities, current accreditations, traditional and physical security, assesses compliance with DOD information assurance policies and user education and awareness.

The communications squadron stresses that while it is important to be inspection ready, the base must always be prepared to defend our networks against potential enemy actions.

According to a 2014 report filed by Symantec, which provides internet security, cyber security threats are on the rise. The report stated that the odds of government networks being attacked are 1 in 3.1.

Those who wish to attack cyber networks have exploited numerous vulnerabilities through their increased activities. The network users must continue to detect, understand, and defend against these threats to the best of their ability. In order to protect the base against cyber threats users need to adopt an increasing defensive posture.

Carns also noted that "while the inspection is over, we need to ensure we sustain and improve upon the processes we put in place."

No comments: