Otto  background

Weak Cybersecurity Threatens Government at All Levels

Connect With Us

Start now, and patch, configure, and control all your endpoints in just 15 minutes.

In today’s increasingly-connected digital age, almost every industry struggles with cybersecurity. While massive breaches of mega corporations attract headline news, the U.S. government unfortunately has its own share of vulnerabilities in cyberspace.

In the wake of Russian interference during the 2016 U.S. elections and the breach of the Office of Personnel Management (OPM) in 2015, it is painfully obvious that the federal government — all levels of government, really — need to enhance their focus on cybersecurity.

Today, sophisticated attacks exploit vulnerabilities to steal information and money, and hackers are developing capabilities to disrupt, destroy or threaten the delivery of essential government services. Because government agencies are often responsible for protecting the personally identifiable information of millions of Americans, they serve as tantalizing targets for hackers, bad actors, and nation-states seeking to to damage.  

According to the U.S. Department of Homeland Security in its newly published cybersecurity strategy released earlier this year, cyber incidents reported to the DHS by federal agencies increased more than tenfold between 2006 and 2015, culminating in the 2015 OPM breach that compromised personal data of 4 million employees and 22 million people overall.

Despite the fact that incidents are on the rise, government agencies continue to struggle to secure their most sensitive data. And while the Trump administration passed an executive order centered around cybersecurity in May, it also eliminated its top two cybersecurity policy and management leadership roles, including one that specifically oversaw federal government cybersecurity.

Reinforcing the need for an increased focus on cybersecurity by government agencies, a recent report issued by the White House's Office of Management and Budget, 74 percent of the 96 federal agencies assessed are deemed either "At Risk" or "High Risk," meaning that they need crucial and immediate improvements when it comes to cybersecurity.

Worse yet, in addition to so many agencies being vulnerable, more than half of them lack even the ability to determine what software runs on their systems, and only one in four agencies could confirm that they even have the capability to detect and investigate signs of a data breach, which means the vast majority are essentially operating in the dark.

Maybe most problematic of all, in 38 percent of government cybersecurity incidents, the relevant agency is never able to identify the "attack vector," meaning it never learns how a hacker carried an attack out. If government agencies aren’t able to mitigate the gaps in their security, attackers will continue exploiting the vulnerability.

Likely the most sizable and significant issue facing government agencies is the use of legacy technology systems. Some agencies are using five different versions of Windows that date back 10 years and are running multiple versions of third-party applications like Java and Flash. Managing all of that risk without simplification and standardization becomes next to impossible — there aren’t enough qualified security pros in the world.

While any software is prone to technical vulnerabilities, thousands of software vulnerabilities are discovered and reported every year, meaning that the older the system is, the more likely it is to have unmatched vulnerabilities. The government’s ongoing use of outdated legacy systems — mainly due to long procurement processes and budget constraints — increases the importance of staying up to date with patch management.

In fact, following the WannaCry ransomware attack that disabled hundreds of thousands of computers in 150 countries, U.S. Senator Mark Warner issued a press release pressing federal agencies on patch management. Unfortunately, in spite of the rise of malicious code targeting known vulnerabilities on unpatched systems and the resultant negative effects incurred, government agencies still struggle with patch management.

In the end, our daily lives, our nation’s economic vitality and our national security all depend on a stable, safe and resilient cyberspace. However, without responsible leadership coming from the top of each agency and from the White House, many people doubt the possibility that big changes will be made in the near future. The U.S. government should continue to focus on securing its own network while working with the private sector and international communities to better protect itself and millions of Americans from harmful cyber attacks.

About Automox

Facing growing threats and a rapidly expanding attack surface, understaffed and alert-fatigued organizations need more efficient ways to eliminate their exposure to vulnerabilities. Automox is a modern cyber hygiene platform that closes the aperture of attack by more than 80% with just half the effort of traditional solutions.

Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.

Experience modern, cloud-native patch management today with a 15-day free trial of Automox and start recapturing more than half the time you're currently spending on managing your attack surface. Automox dramatically reduces corporate risk while raising operational efficiency to deliver best-in-class security outcomes, faster and with fewer resources.