3 Ways to Address Developers鈥 Productivity Concerns

From modernizing software development to creating Zero Trust cybersecurity architectures, the federal government has ambitious plans for 2023. But those plans will only reach fruition by removing the barriers that get in the way of developer productivity.

Government agencies have made great strides to bring IT teams, including developers, closer together over the past few years. For example, they鈥檝e made significant investments in that are rooted in DevOps cultures. And the Department of Defense clearly recognizes the benefits of collaboration between cybersecurity and development teams, making it a core facet of the agency鈥檚 .

But as a recent Mattermost survey discovered, more must be done to break down communication and collaboration barriers that inhibit developer productivity.

Mattermost Developer Productivity Concerns Blog Embedded Image 2023For , 300 software developers were surveyed to find out what鈥檚 keeping them from being as productive as possible, and what can be done to accelerate productivity. Their responses showed that although organizations have tried to build more collaborative development cultures, there鈥檚 still some work to be done in certain areas.

Let鈥檚 dig into some of the challenges鈥攁nd what you, as a government IT professional, can do to address them.

鈥淧oor communication across teams鈥 is a big productivity challenge

Poor communication practices are the biggest obstacles to productivity and collaboration, with 29% of survey respondents citing 鈥減oor communication across teams鈥 as an inhibitor. Their biggest issues are around 鈥渓ack of process and documentation鈥 (27%) and 鈥渓ack of clarity around project prioritization鈥 (25%).

General-purpose collaboration platforms that other teams use aren鈥檛 helping. Thirty-seven percent of respondents said there are 鈥渢oo many distractions from non-developers鈥 using those tools while 25% said they 鈥渄on鈥檛 fit their workflows well.鈥

鈥淚nformation spread across too many tools鈥 (46%) and lack of integration with other tools鈥 (45%) are making it tough to collaborate and find information

Having to work with different tools is also making it difficult for developers to collaborate. Indeed, the developers surveyed said that information silos were among their biggest concerns.

These silos are making it frustrating for developers to find what they need when they need it. Thirty-two percent of respondents said they spend 3 to 5 hours per week hunting down information while 18% spent 6 to 8 hours.

Remote work 鈥渟omewhat improves collaboration鈥 but continues to be a source of tension among some developers

Remote work might be the norm, but developers aren鈥檛 entirely taken with it. Forty-three percent of respondents stated that remote work 鈥渟omewhat improves collaboration鈥 while 33% believe it makes collaboration worse.

That number is down from our 2021 survey, where more than half of respondents said that remote work was a net gain. The fact that the number has fallen is likely a reflection of the deterioration of communications practices and lack of integration, both of which contribute to poor project clarity.

What government agencies can do to improve developer productivity

Our survey respondents sent a clear message: Give us tools and processes that allow us to collaborate more effectively, break up information silos, and share knowledge easily. There are three things you can do to satisfy these needs.

  1. Invest in software built for developer workflows.

Since open source is easily customizable, it鈥檚 simple to integrate different development tools. This will make it easier for developers to share code and resources, manage workflows, and communicate with each other without interference from other teams.

  1. Create a central repository for knowledge sharing.

Having a 鈥渟ingle source of truth鈥 that developers can refer to when looking for information can save enormous time. Invest in a repository that pulls information from different teams and tools. Provide developers with greater visibility and access to the information they need to do their jobs more efficiently.

  1. Automate information sharing and workflow management.

Automatically input new information into the repository once it鈥檚 received so developers don鈥檛 have to look for it. Automate workflow processes, too, by using a system that automatically checks off tasks when they鈥檙e done, alerts developers when it鈥檚 their time to work on a project, and more. Help your developers spend less time focusing on these tasks and more time building applications.

The success of accelerated investments in software factories and modernization initiatives in 2023 will depend in large part on developers鈥 abilities to be productive. Right now, there are obstacles getting in the way of that productivity. But you can eliminate those obstacles by improving collaboration and information sharing.

 

Want to learn more about developers鈥 productivity concerns and what you can do to address them? Check out .

Ransomware on the Rise

News story after news story, cyberattack after cyberattack has demonstrated the rampant presence of ransomware in today鈥檚 society taking down all shapes and sizes of companies in both the public and private sectors. By 2026, Gartner predicts that unstructured data storage, which is very susceptible to ransomware, will triple in size, and with that, an inevitable increase in the attack surface. Currently 80% of enterprises鈥 data is made even more vulnerable by the number of daily users, its distributed nature across devices and servers and overall lack of secure protection.[]

Experts have arrived at this bottom-line conclusion鈥攅veryone is vulnerable to a ransomware attack and cybersecurity measures have become an absolute necessity, not an option.

RANSOMWARE DEFINITION

探花视频 Ransomware Cybersecurity Blog Series Blog 1 Embedded Image 2023 Ransomware is a form of extortion through malware exploiting cyber vulnerabilities to infiltrate systems and capture vital operating or private data. The cybercriminals require payment, often in the form of cryptocurrency, for the release, restoration or decryption of the files or the assurance of not blackmailing individuals with the information accessed. Only 2% of organizations within healthcare get their full data back even after paying the ransom, with the majority of organizations receiving about 65% of their information back.[] Currently, the situation has escalated to the point where bad actors are demanding multiple ransoms, one to restore the data and others to not publish the information on the black market.

The primary four ways ransomware infects a system are through:

  1. Phishing emails and malicious links
  2. Insecure network ports, devices and services
  3. Backdoors left by other malware
  4. Network vulnerabilities such as poor password hygiene with little user authentication, too many legacy systems, missing software patches and updates etc.[]

The rise of ransomware as a service (RaaS) has increased the ease of carrying out a cyberattack with practically no technical knowledge necessary for a criminal to execute the attack.[] One group creates the malware program code and then sells it for other groups to initiate the attack on specific victims.[] X-Force head Charles Henderson said these crime affiliations have created a condition in which “criminals are more collaborative than the cybersecurity industry.”[]

All the shifts and advancements in ransomware require a frank review of the past few years and the statistics to understand the situation, properly form the best course of action and minimize the repercussions on American citizens through critical infrastructure.

RANSOMWARE LANDSCAPE

Ransomware has existed since 1989; however, the past two years have seen a dramatic spike in quantity and impact of cyberattacks. All areas of government, business and healthcare are susceptible regardless of their size and relative importance.[] In recent years, the landscape has changed from individual domestic hackers exploiting opportunities to organized groups of professional criminals based in and often funded by adversarial nations to strategically disrupt critical functions and achieve financial and political goals.[]

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified 16 major critical sectors whose capabilities directly impact the national public health, safety, security and economy of America, most of which (14 out of 16) have fallen under heavy ransomware attack in the past two years.[] By targeting these essential infrastructures across financial, industrial, transportation and healthcare institutions, bad actors can disrupt nation-wide and global supply chains. CISA executives stress the importance of universal action to improve cybersecurity and combat the widespread ransomware threat. Because of the interconnectivity of U.S. infrastructure, they warn that if one organization is compromised, cybercriminals could gain access and infiltrate other larger vital service providers and ultimately spread out of control.[]

Government agencies and critical businesses are not the only groups seeking to improve through tech modernization. The ransomware landscape has changed drastically due to advances in cybercriminal activity as well.

探花视频 Ransomware Cybersecurity Blog Series Blog 1 Infographic Image 2023

The timeline of these attacks has also accelerated. In 2019, the average time between the initial system infiltration to malware deployment was over two months but in 2021 it dropped 94% to an average of less than four days.[] Every 10 seconds, a new victim is attacked by ransomware. Not only are attacks and ransom demands increasing and their deployments faster, the majority (60%) of companies do not feel prepared if their company were to be faced with a similar threat in the next 12 months.[] This problem is expected to continue to grow over the next decade, with ransomware cost predictions of more than $265 billion in total damage by 2031.[] Agencies and organizations must evaluate their cybersecurity standing and make improvements to ensure that they can withstand these escalating attacks.

RANSOMWARE 鈥 ACTION REQUIRED

Contrary to public opinion, most cybercriminals do not primarily target organizations based on the perceived importance of their data, but rather the ease of access to infiltrate the system and the probability that the company will pay the ransom. Critical infrastructure in particular has an obligation to strengthen and reinforce their cybersecurity to prevent disruption and protect these vital functions for the American people. With the increasing trends, officials point to the new harsh reality that ransomware is not a question of if a company will be attacked through malware, but when. Based on the current landscape, organizations must act or risk being swept away by the growing tide of ransomware.

 

探花视频 and its partners offer cybersecurity solutions to defend against ransomware and mitigate the risks. Reach out to discover how 探花视频 can make an impact for your organization. Dive deeper into how ransomware is affecting U.S. critical infrastructures such as healthcare and utilities in our Ransomware in Healthcare and Utilities Blog. Find our full Ransomware Series here.

 

Resources:

[1] 鈥淧rotect, Detect & Recover: The Three Prongs of a Ransomware Defense Strategy for Your Enterprise Files,鈥 Nasuni,

[2] 鈥淭he State of Ransomware in Healthcare 2022,鈥 Sophos,

[3] 鈥淪ecurity Primer 鈥 Ransomware,鈥 Center for Internet Security,

[4] 鈥淩ansomware: In the Healthcare Sector,鈥 Center for Internet Security,

[5] 鈥淗ealth Care Ransomware Strains Have Hospitals in the Crosshairs,鈥 Security Intelligence,

[6] 鈥淩ansomware Attacks on Hospitals Have Changed,鈥 AHA Center for Health Innovation,

[8] 鈥淐ritical Infrastructure Sectors,鈥 Cybersecurity & Infrastructure Security Agency,

[9] 鈥淩ansomware Hackers Will Still Target Smaller Critical Infrastructure, CISA Director Warns,鈥 Nextgov,

[12] 鈥淩ansomware in 2022: Evolving threats, slow progress,鈥 TechTarget,

[13] 鈥淕lobal Data Protection Index 2021,鈥 Dell Technologies,

[14] 鈥淩ansomware in the Utilities Sector,鈥 ThirdPartyTrust and BitSight,

Infographic Resources:

[7] 鈥淩ansomware Threat March 2022: Special Report鈥 Nextgov,

[10] 鈥淟ooking Back at the Colonial Pipeline Ransomware Incident,鈥 Government Technology,

[11] 鈥淢uch to Do About Ransomware: Report Highlights a Path Forward,鈥 Government Technology,