You are on page 1of 3

WHITEPAPER

STATE & LOCAL


GOVERNMENTS:
PROTECT YOUR NETWORK
STATE & LOCAL GOVERNMENTS: PROTECT YOUR NETWORK WHITEPAPER 2

In today’s world, breaches are becoming a common One of the most recent breaches occurred in 2018, hitting
threat for both small and large organizations in every the City of Atlanta and costing the city millions of dollars.
industry. Government agencies are often the target of The SamSam ransomware attack crippled the city’s
sophisticated attacks, as they can house personal and online services like warrant issuances, water requests,
sensitive information that are ideal for hackers to steal Police Department records, court fees and online bill-pay
and sell. According to the 2018 Thales Data Threat Report, programs across 5 of the city’s 13 departments. The city
Federal Government Edition, 57% of federal respondents did not pay the ransom demanded, but the recovery
experienced a data breach in the last year, and 70% costs has risen exponentially from $2 million estimate
experienced a data breach in the past.1 While federal to over $10 million, with actual figures not yet known.
government breaches have made the news, state and The city is still recovering and is finding many records
local governments must also take action to protect their thought safe have been destroyed in the attack.
networks and sensitive information from attacks.

TOP GOVERNMENT BREACHES


Let’s take a look at some of the largest breaches to hit
both federal and state government agencies. The U.S.
Office of Personnel Management (OPM) breach is one
of the most newsworthy of 2015, affecting roughly 21.5
million people. The 2015 Georgia Secretary of State Office The most recent White House’s Office of Management
is one of the largest state breaches to occur, affecting and Budget report revealed that of the 96 federal
6.5 million people’s voter information, including social agencies assessed, 74% rated “At Risk” or “High Risk” on
security numbers.2 the scale of needing crucial or immediate improvements
to their cybersecurity awareness.5 Cybersecurity
awareness and protection is becoming more and more
important, not just for agencies at the federal level, but
also the smaller municipalities and local governments
that struggle with IT.

CHALLENGES
Government agencies of all sizes face similar
The largest government data breach to occur also
challenges when it comes to establishing network
happened in 2015, with the U.S. Voter Database that
security fundamentals. Funding and staffing for the IT
exposed 191 million records, including names, dates of
department are the two major issues. Nearly half of
birth, party affiliations, and more for all 50 states and
states don’t have a separate cybersecurity budget and
the District of Columbia.3 While both of these attacks
more than a third have seen no growth or reduction
targeted government agencies that housed personal
in those budgets. On a more frightening note, states
identifiable information (PII), hackers also target smaller
generally only spend 1-2% of their IT budgets on
government agencies. In April 2017, the emergency alert
cybersecurity. This is considerably lower than federal
system in Dallas, Texas was hacked, resulting in 156
agencies, who typically spend 5-12% of their IT budgets
emergency hurricane warning sirens to go off 15 times
on cybersecurity.6 Finding a solution that is affordable
over two hours.4
and easy to use is half the battle when government
agencies only have one IT employee to manage their
entire, sometimes distributed, network. Luckily, it seems
the awareness of cybersecurity risks is growing, as the
e.Republic research company reports that state and local
governments plan to spend $107.6 billion on IT.7

Lack of visibility into and control over network traffic is


another major challenge small government agencies deal
STATE & LOCAL GOVERNMENTS: PROTECT YOUR NETWORK WHITEPAPER 3

with on a day-to-day basis. Agencies need a solution that


can help them proactively measure their security posture.

Changing requirements like the need to offer guest Wi-Fi


leave some government agencies struggling with how to
enable secure, controlled access the network. This could
lead to guests accessing sensitive information, revealing
a vulnerability that could lead hackers to exploit the Untangle, Inc.
network, among other risks. 100 W. San Fernando St., Ste. 565
San Jose, CA 95113
www.untangle.com

ABOUT US
Untangle is an innovator in cybersecurity for
the below-enterprise market, safeguarding
Maintaining compliance with multiple regulations is people’s digital lives at home, work and
also a cumbersome task that agencies must grapple on-the-go. Untangle’s integrated suite of
with. From broad federal regulations like NIST, HIPAA, software and appliances provides enterprise-
CJIS, CIPA to smaller state regulations, keeping on grade capabilities and consumer- oriented
top of compliance is a daunting task for the small IT simplicity, bringing a new generation of
department. Agencies need a solution that not only smart security to homes and small-to-mid-
provides visibility into their network traffic, but also sized businesses. Untangle’s award-winning
provides audit logs for when compliance requirements network security solutions are trusted by over
come into question. 400,000 customers, protecting nearly 5 million
people, their computers and networks around
the world.
WHERE TO START
For sales information, please contact us by
If you manage a government agency with few IT
phone in the US at +1 (866) 233-2296 or via
resources, here are some steps you can take to start
e-mail at sales@untangle.com.
securing your network.

Train your staff - Human error is still the leading cause


of security breaches.8 Take the time to train your staff to
©2019 Untangle, Inc. All rights reserved. Untangle and the Untangle logo are
keep an eye out for suspicious emails or websites. registered marks or trademarks of Untangle, Inc. All other company or product
names are the property of their respective owners.
Separate guest Wi-Fi - Keep your internal network safe
by setting up a separate guest Wi-Fi. Use a captive
portal page to force users to acknowledge an
Acceptable Use Policy so IT can track and manage users. SOURCES
Encrypt sensitive information - Any PII information 1 https://dtr-gov.thalesesecurity.com/
2 https://digitalguardian.com/blog/top-10-biggest-us-government-
should be stored encrypted and only accessible to the data-breaches-all-time
appropriate personnel. 3 https://digitalguardian.com/blog/top-10-biggest-us-government-
data-breaches-all-time
Back up data offsite - In the event a ransomware attack 4 https://www.csoonline.com/article/3196989/security/how-smart-
hits, having a backup will allow you to get up and cities-push-iot-cybersecurity-for-state-and-local-it.html
5 https://www.whitehouse.gov/wp-content/uploads/2018/05/
running in no time, without paying the hackers any money. Cybersecurity-Risk-Determination-Report-FINAL_May-2018-Release.pdf
Gateway solution - Invest in a gateway solution to gain 6 https://www.pewtrusts.org/en/research-and-analysis/blogs/
visibility into and control over the entire network. See stateline/2018/10/23/state-cybersecurity-offices-need-more-money-
and-staff-report-finds
what devices are connecting, or trying to connect, 7 https://www.govtech.com/navigator/numbers/state--local-
to your network and take appropriate action to block government-it-spending-2019_178.html
8 https://www.itproportal.com/news/human-error-top-cause-of-self-
attacks and stop offensive users. reported-data-breaches/

You might also like