ARTICLE

Top 5 Cybersecurity Trends in State & Local Government

In the past five years, cyberattacks at the state and local level have increased by 50% due to the wealth of information governments possess making them prime targets for cybercriminals. Politicized attacks by nation-state actors have made news headlines but these threats aren’t just felt at a federal level. With the Biden administration’s announcement of more than $1 billion in federal cybersecurity funding over the next four years, and an explosion of cybercrime since the Covid-19 pandemic, there has never been a better time to look at your cybersecurity funding eligibility—and your cybersecurity posture.

With decades of technology, security, and compliance experience, we know how important strategic investment in cybersecurity is, and how damaging a situation can get should a cyberattack occur for state, local, and territorial government entities. Bulletproof was recently awarded with a GSA Multiple Award Schedule. This contract vehicle can be leveraged by State and Local governments as needed to simplify your procurement. As a Highly Adaptive Cybersecurity Services (HACS) holder and 2021 Global Security Partner of the Year Microsoft, you can trust the strong cybersecurity and IT work that our team is conducting across the U.S. and around the globe. 

State & Local Government Are Prime Targets

In today’s digital landscape, citizen behavior and the adoption of a hybrid workplace model have greatly changed the way state and local governments run their operations, making it an easier target for cybercriminals. This, combined with the fact that many state and local governments may not have salient cybersecurity plans or strategic roadmaps in place means more gaps and vulnerabilities in security exist.

Global cybercrime costs are expected to reach $10.5 trillion annually by 2025. To top it off, the average total cost of a breach in the public sector increased from $1.93 million to $2.07 million from 2021 to 2022. (Cost of a Data Breach Report, 2022, IBM)

Gone are the days of cybercrime being committed only by skilled hackers. They are savvy businesspeople who have successfully built a cybercrime gig economy by selling the tools needed to launch a cyberattack to anyone interested in doing so. Expert hackers make it easy by offering the tools as a Software as a service (SaaS)-style subscription service, delivered on a cloud-based platform. SaaS are any services that are connected to the cloud over the internet, such as Outlook, Salesforce, Dropbox, etc. Additionally, cybercriminals make it affordable for even a hobbyist to perform a cyberattack by purchasing a phishing kit for as low as $6/day. A bad actor can get everything he needs to attack your state and local government for as little as $20, thanks to the cybercrime gig economy.

Why are state and local agencies prime targets for cybercriminals?

  • Access to sensitive citizen data
  • Limited IT budgets and resources
  • Challenges staying up to date with emerging technologies and cyber threats
  • Legacy technologies that have not been updated or configured properly, leaving security gaps
  • Lack of employee cybersecurity awareness training
  • Lack of documented security processes and policies

Icon_Hacker Cyber Attacks Cyber Threats

Top 5 Cybersecurity Trends You Can Expect

Here are the key trends that we’re monitoring in the cybersecurity landscape that serve as perfect reasons to research available grants and carve out resources for establishing governance, identifying vulnerabilities, implementing mitigation measures, and working to develop a strong cybersecurity workforce.

1. Rise of Ransomware & Cyberthreats

“Cyberattacks have emerged as one of the most significant threats to our homeland,” says Secretary of Homeland Security Alejandro N. Mayorkas; and he’s not wrong. Through the cybercrime gig economy ransomware is now available for purchase as a service, meaning bad actors can purchase everything they need to infiltrate your organization and hold your data for ransom as easily as they can order takeout.

These attacks are threatening schoolshealthcare, even state governments and federal elections—and cybercriminals show no sign of slowing down. It is important to be prepared in the event of an attack, and you can start by asking yourself two mission-critical questions: Has your company evaluated its existing incident response protocols? How are you prepared to recover from a cyberattack? There are various security assessments that state and local governments can invest in such as a Ransomware Security Posture Assessment that will help you assess your tools, procedures, and overall ability to defend and mitigate the impact of a ransomware attack.

2. Remote Work & Endpoints Everywhere

The hybrid work trend isn’t going away and as state, local, and territorial government workforces become more remote and distributed, many more potential points of vulnerability are being generated.

By configuring your technology for remote work, you’re expanding your perimeter and increasing your security risk and attack footprint—especially if the transition is not properly implemented. Now that your workers and systems are no longer confined within walls, access control and secure remote solutions are critically important. It is crucial that you spend time evaluating the security of your cloud tenants (because cybercriminals certainly are!). State and local governments would benefit from cloud security posture assessments which would identify the gaps and vulnerabilities in their cloud-based technologies and infrastructure along with providing a remediation plan.

Graphic_Endpoints BLOG SMB

 

3. Evolving Regulations and Laws Around Security Standards

We are seeing a higher focus placed on security requirements in the form of federally and state-mandated security standards. These mandated requirements recognize the landscape’s growing threat and strive to protect data privacy and security, as well as cybersecurity transparency. Some of these federally mandated regulations include Cybersecurity Maturity Model Certification (CMMC) and Minimum Acceptable Risk Standards for Exchanges (MARS-E). While there are organizations to support the development of these higher standards of security and compliance and those seeking to achieve them—like the National Institute of Standards and Technology (NIST) and the International Organization for Standardization (ISO)—there’s no denying that an investment of time and resources is necessary to excel in areas of regulations and compliance.

The State and Local Cybersecurity Grant Program (and the forthcoming Tribal Cybersecurity Grant Program) can be the backbone of your future plans to fortify your cybersecurity and the basis of projects rooted in regulatory requirements. Don’t be overwhelmed by increased regulations; trusted cybersecurity vendors and partners are here to help ease the burden and provide support.

4. information technology and cybersecurity skills gap

It has never been more challenging to fill an IT position, nor more important to have an all-star team on your roster to shore up your defenses against cyber threats. An increased need for qualified personnel combined with a skills gap in the workforce places a greater burden on existing IT teams. Establishing relationships with trusted vendors is one answer to this problem. An integrated, automated security stack and outsourcing IT projects and security operations are others.

Don’t let the pace of change and increase in cyber threats overwhelm you - support is there. Reach out to trusted partners to discuss how they can support you on your journey to cybersecurity. Partners such as Bulletproof can offer various solutions to help augment your IT teams or virtual CISO services to help provide you with security guidance where you need it most.

Icon_BLOG IT Resources

 

5. emerging technology and growth of AI

Cloud and AI technology have changed the way the world operates. Office employees can work remotely from anywhere with the right tools in place. Civilians can do just about anything online (e.g., transact payments on city websites, pay utilities online, renew their licenses, etc.) without ever having to leave their homes. The demand for digitalization shows no signs of slowing down. Government sectors that do not choose to invest in emerging technology can fall behind.  Governments should consider adopting the cloud, collaboration tools, and AI to help create efficiency, improve citizen services, make data-driven decisions, enhance their security, and remain competitive for growth.

While leveraging new technology and AI has many opportunities and advantages, there are also security risks to consider such as - proper configuration and integration, ongoing updates and monitoring, what data is being collected and stored, access and identity concerns, routine security tests to ensure gaps are identified and remediated timely, etc. To learn more, check out our similar AI articles on our resource library page. 

What's Next For You?

Apply for cybersecurity grants when they become available through FEMA.gov or other resources.

Get involved and talk to industry leaders and peers to better understand the government landscape challenges, trends, regulatory changes, etc.

Instill the importance of cybersecurity in your company culture – remember that your greatest line of defense is your employees. The more you can educate and encourage them to act and report suspicious activity, the less risk you’ll have.

Remember to schedule your regular security testing and audit. Identifying vulnerabilities and risks regularly will help you prevent any major breaches in the future.

Asking for help and guidance from trusted partners like Bulletproof, a GLI company who have the skills and resources to help you run and secure your government operations.
Businesswoman holding tablet pc entering password. Security concept

Learn how you can strengthen your security and compliance posture

Technology, security, and compliance are inextricable to the way state and local governments operate - which spells both challenges and opportunities. Bulletproof leverages our extensive industry experience and know-how to help entities reduce risk and improve their processes, systems, and business infrastructure. Book Your Consultation to Get Started.

 

city of saint john case study

If YOUR CITY WAS Hit by a Ransomware Attack, Would You Know What to Do? 

On Friday the 13th, in the middle of a pandemic, a cyberattack threatened to bring a city’s entire network—and crucial services—to a halt. Meet the city that refused to pay hackers and learn how quick action, teamwork, and the comprehensive visibility and security of our B365E solution saved the day.

“After we understood that we were indeed attacked we had Bulletproof on site and ready to support us in containment. When Bulletproof came on site, it was like they were part of the team; instant connection, working with them side by side.” -Stephanie Rackley-Roach, Chief Information Officer, City of Saint John

Call Us

1.866.328.5538