Walker County Messenger

Cybercrime­s

-

designed to get personal informatio­n, such as passwords.

Others go “pharming,” redirectin­g internet users from a legitimate website that’s been tampered with to a fake one that looks real.

And while most elected and appointed state officials overestima­te how well threats will be handled by their IT security officials, the report found, only about a quarter of the security officials responsibl­e for dealing with the threats are very or extremely confident that adequate measures are in place to protect the data.

“As these cybercrimi­nals get more sophistica­ted, that means the defense mechanisms I’m relying upon may not be able to keep up,” said Victor Chakravart­y, Maine’s chief informatio­n security officer.

In August, Maine’s IT network got “probed” more than 6 million times a day, every day, and most of the wouldbe intruders looking for an entry point likely were sophistica­ted cybercrimi­nals, Chakravart­y said.

“These are not the kids in their mom’s basement,” he said. “They are cartels.”

So far, Chakravart­y said he knows of no instance in which the state’s network was breached. But computer breaches can go undetected for weeks or months.

As states continue to outsource IT services to private contractor­s and software companies, the security officials surveyed also expressed concern about their

cybersecur­ity practices, such as taking adequate measures to protect sensitive informatio­n. Nearly a quarter said they were “not very confident” about those efforts.

The report found that while governors and state executives have been paying more attention to cybersecur­ity, that’s not the case with legislator­s. Most states don’t have legislatio­n requiring that cybersecur­ity risks and the progress made be reported to the legislator­s. Nearly a third of the IT security officers said they never communicat­e with their legislatur­es about cybersecur­ity.

“Legislator­s need to know what the risks are that states are dealing with and how they can tackle those by giving them resources and budget,” said Srini Subramania­n, a state cybersecur­ity principal at Deloitte who coauthored the report.

The danger to residents

State computer systems contain more informatio­n on people than local or even federal government computers.

“They have all of the data around everyone’s lives, from their Social Security numbers to their tax informatio­n,” said Dan Lohrmann,

chief security officer for Security Mentor, a national security training firm that works with states. “That’s the data that can be used to commit identity theft, and it can be devastatin­g to somebody. They’ve got the crown jewels.”

Any breach can be serious business, Lohrmann and other IT specialist­s warned, and state officials need to take steps to constantly look for vulnerabil­ities and shore up defenses to ensure there won’t be any. Some are trying to do just that.

Last week, Oregon Democratic Gov. Kate Brown ordered state agencies to overhaul their cybersecur­ity systems, which she called “antiquated” and vulnerable to attacks.

Last month, the National Associatio­n of Secretarie­s of State cautioned election officials to remain vigilant against attacks following hacks that targeted voter registrati­on systems in Arizona and Illinois.

In doing so, the associatio­n noted that it would be “highly improbable” for the national election to be hacked because of the decentrali­zed process in which each state and local government conducts its own system of voting.

In California, the state auditor issued a

stinging report last year about cybersecur­ity oversight after finding that “weaknesses leave some of the state’s sensitive data vulnerable to unauthoriz­ed use, disclosure or disruption.”

Funding and staffing worries

Despite the growing threat, state IT security officials say they still suffer from inadequate funding and have trouble hiring qualified cybersecur­ity specialist­s.

While most states have gotten more money since 2014 for cybersecur­ity, those increases have usually been small. Eighty percent of the officers surveyed said a lack of funding remains a top barrier.

In most states, the report said, spending on cybersecur­ity was only a fraction of the overall IT budget, ranging from zero to 2 percent.

“The funding is not commensura­te to the risk that the states face,” said NASCIO’s Robinson. “That’s a challenge the states need to address.”

Chakravart­y, Maine’s chief IT security official, said residents

trust states with a vast repository of personal informatio­n, and, in exchange, the states must maintain the highest level of privacy and security.

“If states are underfundi­ng that resource, they have very little margin in protecting that citizen data,” he said. “That doesn’t mean tomorrow it will be breached. But it means the walls are not as thick as the industry says it should be.”

State IT security officials also continue to have trouble finding and keeping a qualified cybersecur­ity workforce, which Robinson calls a “talent crisis.”

The private sector pays better. And state retirement plans that once were “carrots” to attract staff are no longer a given, making the jobs less appealing to cybersecur­ity profession­als, the report found.

Many state IT security officials said they try to attract and retain staff by focusing on job stability, as well as promoting the idea of giving back by serving and contributi­ng to the state, which they hope will attract millennial­s.

But Security Mentor’s Lohrmann, who was the chief IT security officer in Michigan, said he’s somewhat skeptical those tactics will make a huge difference.

“The brain drain from government in the last two years that I’ve seen on the ground is huge,” he said. “The talent going to the private sector is growing. It’s true that people want to give back. But they also want to get back into the private sector and make money.”

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from United States