State and local governments lack financial resources to address cyber security issues. The National Governors Association is urging governors to find alternative ways besides relying on regulatory processes, the most commonly used method for addressing cyber threats.
Cyber stalkers present serious threats to businesses, governmental entities and organizations of all types. The ever-present danger is said to be increasing at an alarming pace, and because the aftermath of any cyber attack is so devastating and costly, technology changes are occurring at a dizzying pace. In spite of that, most citizens do not believe that current cybersecurity efforts are adequate.
According to a recent study, 50 percent of state and local governments experienced six to 25 breaches in the prior 24 months, and 12 percent experienced more than 25 breaches. The federal government will spend approximately $17 billion to enhance cyber security in 2017 but state and local governments are being forced to address the same threats with much less when it comes to funding and resources. In a recent survey, 80 percent of state chief information officers (CIOs) indicated that the lack of funding for cyber security is their top challenge.
In spite of restrained resources, public officials at the state levels of government are currently involved in, or discussing and planning, cyber security enhancement projects. The National Governors Association (NGA) is trying to help and has issued recommendations for a number of basic actions that should be initiated.
The organization is urging governors and state legislators to analyze the cost and benefits of cyber security and to move beyond reliance on regulatory processes, the most common ways states have addressed cyber threats in the past. The suggestions for immediate action are interesting and helpful, but cyber security experts urge government leaders to do much more.
For instance, many states are investing in more data security training for state employees. And, it’s obvious that employees cannot perform well as the first line of defense if they are not painfully aware of the dangers of neglect or haste or inattention when dealing with critical information and network security. Security protocols should be standardized and monitored continually but old networks and legacy technology are almost like sitting ducks on a pond for cyber stalkers.
Private-sector firms own and operate 85 percent of critical infrastructure in the United States and some, but not all, rely on world-class technology experts to keep their data networks safe. State officials don’t have the funding to attract and retain world-class cyber security talent. As a result, almost all engage private-sector firms to help them address cyber threats. Interestingly enough, though, private-sector firms may be less interested in contracting with governmental entities. Demand for technology talent is so great that many companies are making their greatest efforts in the commercial sector.
Government procurement for goods and services has always been a lengthy process but that must change. Some public entities are addressing streamlining the acquisition process and that is particularly encouraging. Changes must occur or private-sector firms will lose interest in providing the best talent and technology advances to the government.
Government leaders are particularly focusing on power grids, utility cooperatives, transportation and water security. Governors have been urged to ensure adequate protection to even the smallest communities because so many are vulnerable. Cyber stalkers with even low levels of expertise are attracted to susceptible targets.
Taxpayers and citizens realize the risks but few individuals feel the need to reach out to elected officials and express their concerns. If ever there was a time for individuals to let their elected officials know of their concern for cyber security, surely it is now.
DISCLAIMER: This article expresses my own ideas and opinions. Any information I have shared are from sources that I believe to be reliable and accurate. I did not receive any financial compensation in writing this post, nor do I own any shares in any company I’ve mentioned. I encourage any reader to do their own diligent research first before making any investment decisions.
3 tips that will help you define your brand voice
How to use your kindness in the office to your advantage
Legendary American singer Aretha Franklin dies at 76
3 biggest myths about how to write a good business plan
Buying your next car? This legal advice will guide you
‘Phenomenal’ PotNetwork a ‘Strong Speculative Buy’ according to Harbinger Research
PepsiCo CEO Indra Nooyi to step down this October
How to invest in Bitcoin with your IRA
Multibillion-dollar mixed-use tourist center opens in Montenegro
5 ways you can save money by house sitting
Strengthening the cooperation among countries to generate inclusive growth
H&R Block and IBM Watson are revolutionizing tax preparation
IMF message: Interconnectedness needs to be preserved
Can we use smartphones while driving 100% safely?
Innovative electricity tech from ABB provides better life
Featured5 days ago
Investors seek help from academics to better understand sustainable investments
Business4 days ago
How technology is disrupting the metal fabrication industry
Crypto4 days ago
Survive the collapse of altcoins with these crypto investing tips
Commodities5 days ago
India may fall short of ambitious solar power capacity target by 2022: Ciril
Featured5 days ago
Jim Cramer believes US stocks stood their ground this year—here’s why
Agriculture4 days ago
Sugar, soybean and wheat prices down for the week
Featured3 days ago
10 lessons that every young entrepreneur should learn from Walt Disney
Featured3 days ago
Save your next mortgage with these handy tips