{"id":15249,"date":"2019-08-21T00:00:00","date_gmt":"2019-08-20T23:00:00","guid":{"rendered":"https:\/\/identifi-global.eu.applyflow.com\/key-cybersecurity-threats-in-the-public-sector\/"},"modified":"2022-12-09T06:16:42","modified_gmt":"2022-12-09T06:16:42","slug":"key-cybersecurity-threats-in-the-public-sector","status":"publish","type":"post","link":"https:\/\/www.identifiglobal.com\/news\/key-cybersecurity-threats-in-the-public-sector\/","title":{"rendered":"Key cybersecurity threats in the public sector"},"content":{"rendered":"<p class=\"p1\">\n\t<span class=\"s1\"><img decoding=\"async\" alt=\"Cybersecurity Threats\" src=\"\/media\/identifiglobal\/client\/Blog images\/Cyber Security threats.png\" style=\"width: 600px; height: 447px\"><\/span><\/p>\n<p class=\"p1\">\n\t&nbsp;<\/p>\n<p class=\"p1\">\n\t&nbsp;<\/p>\n<div>\n\tThe public sector is not the private sector. So far, so obvious. But the difference isn\u2019t just about the definitions \u2013 it\u2019s in the details. Public sector organisations face different challenges around responsibility, funding, profitability and (wait for it) cybersecurity.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tFormer US military CISO Gary Hayslip moved into the private sector in 2016, and <a href=\"https:\/\/www.techwire.net\/news\/a-career-cisos-7-observations-on-public-vs-private-sector.html\">describes those crucial differences<\/a> in quite some detail. Public sector organisations accept cybersecurity directives as a necessity, but they don\u2019t always have the budget or the mindset to implement them; they don\u2019t have the corporate culture that makes fast change in large doses possible.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tOf course, many cybersecurity professionals are looking to go back the other way, moving into the public sector. Public sector organisations are often well aware they have a skills gap to close and a talent shortage to meet. If either of these descriptions sounds like you, it helps to understand why the public sector is so vulnerable to cyberattacks, and what challenges face those who would prevent them.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tWhy is the public sector a target?<\/h2>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tIn October 2018, <a href=\"https:\/\/www.telegraph.co.uk\/technology\/2018\/10\/11\/wannacry-cyber-attack-cost-nhs-92m-19000-appointments-cancelled\/\">a ransomware attack called WannaCry<\/a> shut down 200,000 computers across the world, including machines in the NHS infrastructure. The hack caused 19,000 appointments to be cancelled, costing the NHS \u00a320 million in a week and \u00a372 million in cleanup and upgrades. It\u2019s important to understand this wasn\u2019t an attack on the NHS specifically; this was a sweeping attack on any vulnerable computer, which happened to include a good-sized chunk of the NHS\u2019 machines. The public sector doesn\u2019t have to be a target in order to be affected.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h4 style=\"text-align: center\">\n\t<strong>&#8220;A medical record is worth ten times as much as a credit card number on the black market.&#8221;<\/strong><\/h4>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tThis isn\u2019t to say that cybercriminals don\u2019t find the health sector worth going after. A medical record is worth ten times as much as a credit card number on the black market. That\u2019s why <a href=\"https:\/\/www.idtheftcenter.org\/2018-data-breaches\/\">34.5% of data breaches<\/a> around the world take place in healthcare, compared to 4.8% in banking. (Education and the military hover between the two, at 9% and 6.6% respectively.)&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tCyber attacks on public sector bodies also come from <a href=\"https:\/\/www.information-age.com\/rise-hacktivism-where-does-law-stand-and-can-we-protect-ourselves-123461215\/\">hacktivists <\/a>&#8212; people using cyber attacks to protest, promote or demonstrate a political point, like the hackers who shut down <a href=\"https:\/\/www.databreaches.net\/hacktivists-attack-uk-police-sites-to-protest-arrest-of-julian-assange\/\">UK police websites and distributed stolen police data to oppose the arrest of Julian Assange<\/a> in April 2019. These may be small acts of protest against schools and employers, whistleblowers casting an unwelcome light on the inner workings of the public sector, or international movements targeting corporations and governments on a grand scale.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tThen, of course, there are state-sponsored cyber attacks \u2013 the \u201cRussian hackers\u201d you hear about on the news. In 2018, the National Cyber Security Centre identified a <a href=\"https:\/\/www.gov.uk\/government\/news\/uk-exposes-russian-cyber-attacks\">dozen cyber attackers<\/a> as sponsored and supported by the Russian military intelligence service, and<a href=\"https:\/\/www.independent.co.uk\/news\/uk\/crime\/uk-cyber-attack-emergency-gchq-hacking-hostile-russia-china-category-1-ncsc-a8585751.html\"> NCSC leader Ciaran Martin predicts <\/a>that \u201cwe will be tested to the full, as a centre and as a nation, by a major incident at some point in the years ahead; what we would call a category 1 attack.\u201d That is to say, an attack which causes sustained disruption of essential services or affects national security on such a large scale, and with such severe economic or social consequences, that people die as a direct result.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tThe public sector is vulnerable not only because it\u2019s a politically and financially rewarding target, but also because the data it holds is so sensitive. Public sector organisations handle records of care, vulnerability and abuse; they hold intellectual property related to cutting-edge research; they represent a state body and its operations, and a successful attack on them is a successful attack on the state.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tWhat are the challenges specific to the public sector?<\/h2>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tBudget constraints are a constant issue across the public sector. In this age of austerity and disruption, IT managers are often told to do everything with nothing \u2013 move with the times and bring in the latest technology on a budget which is at best frozen and at worst being cut.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tThere\u2019s also the known skills gap around cybersecurity. Industry estimates suggest there could be<a href=\"https:\/\/www.informationsecuritybuzz.com\/articles\/under-lock-and-key-how-can-the-public-sector\/\"> three million unfilled vacancies<\/a> in the cybersecurity sector by 2021. Demand, bluntly speaking, is outstripping supply.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tThen there\u2019s a misconception around cybersecurity\u2019s value to public sector institutions. As institutions are forced to prove return on investment in order to secure funding, their leaders start to look for profitable ventures rather than preventative technologies and training.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tFinally, there\u2019s the <a href=\"https:\/\/www.informationsecuritybuzz.com\/articles\/under-lock-and-key-how-can-the-public-sector\/\">public sector\u2019s attitude to new technology<\/a>. As society undergoes a digital transformation, as more data is stored, more applications run from the cloud, and more work is done virtually, public sector networks need to grow by 15-25% per year. Existing hardware struggles with the scale and complexity of user demand. It\u2019s a problem because the public sector has historical concerns about the security of new technology, and tends to lock down data, restrict network expansion, and rely on proven solutions. This isn\u2019t sustainable, even in the short term, as users will demand mobile access to government services and to their own data.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tThe good news is that cybersecurity isn\u2019t just a preventative approach. The cultural changes and tech investments necessary to bring public sector bodies\u2019 cybersecurity up to snuff also make daily operations more efficient and organisations more agile. Resulting improvements in productivity could save the NHS <a href=\"https:\/\/start.paloaltonetworks.com\/securing-nhs-data-in-the-digital-age\">\u00a314.8 million a year<\/a>.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tWhat can the public sector do to protect itself against cybersecurity threats?<\/h2>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tNow we know the threats, what does the industry need to do about them?<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tWannaCry was <em>preventable<\/em> \u2013 the ransomware program only spread through the NHS because the people using machines didn\u2019t install software patches, and the people buying machines didn\u2019t spring for a newer operating system.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h4 style=\"text-align: center\">\n\t<strong>&#8220;General carelessness and staff failing to follow policies are primary contributors to poor cybersecurity practice.&#8221;<\/strong><\/h4>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<a href=\"https:\/\/www.comptia.org\/resources\/international-trends-in-cybersecurity\">60% of cybersecurity breaches<\/a> in the UK are attributed to human error; general carelessness and staff failing to follow policies are primary contributors to poor cybersecurity practice. It\u2019s not enough to have a policy. The institution needs to follow that policy, investing time and money in both newer, more secure technologies and appropriate training to keep those technologies secure. The people at the top of a public sector institution need to understand that, sooner or later, cybercrime will cause deaths. It\u2019s not an IT problem that they don\u2019t have to worry about.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tOnce institutional leaders start to take cybersecurity seriously, they can make concrete changes by bringing in the right talent to protect their institutions. The government is aware of the cybersecurity skills gap, and is rolling out initiatives like the <a href=\"https:\/\/www.gov.uk\/guidance\/cyber-schools-programme\">Cyber Schools Programme<\/a> and the new <a href=\"https:\/\/qufaro.uk\/news\/global-knowledge-apprenticeships-bletchley-park-qufaro-launch-level-four-cybersecurity-apprenticeship\">cybersecurity apprenticeships<\/a> &#8211; a collaboration between private and public sector bodies.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tOn the whole, public sector bodies in the UK are moving in the right direction. <a href=\"https:\/\/www.fujitsu.com\/uk\/microsite\/transforming-britain\">77% of public sector organisations<\/a> claim they\u2019re undergoing digital transformation, driven by concerns about efficiency and service provision. The public sector doesn\u2019t have to make a total pivot that it\u2019s not prepared for &#8211; this is more of an adjustment, a course correction on a journey that organisations are already taking.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tPublic sector organisations face a unique combination of cybersecurity threats. Being state bodies, they\u2019re attractive targets for hacktivists and state-sponsored hackers from abroad; holding sensitive data makes them lucrative targets for conventional cybercrime.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tTight budgets and a historical \u201cbest left alone\u201d approach to new technology mean the sector\u2019s falling behind the technology curve, while user demand and flexible working create a need for bigger, looser networks with more mobile and virtual devices included.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tPreparing to meet these threats isn\u2019t just a matter of spending money and upgrading machines, though. It demands a cultural shift toward taking cybersecurity seriously. To close the loopholes which human error leaves in cyber defence, public sector organisations need to sponsor and recruiting the right talent.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tLooking for cybersecurity jobs in the public sector? <a href=\"https:\/\/www.identifiglobal.com\/advancedsearch.aspx?search=1\">Start here<\/a>.<\/div>\n<div>\n\t&nbsp;<\/div>\n<p class=\"p1\">\n\t&nbsp;<\/p>\n<p><style type=\"text\/css\">p.p1 { margin: 0.0px 0.0px 0.0px 0.0px; line-height: 20.0px; font: 14.7px Arial; color: #000000; -webkit-text-stroke: #000000 }\np.p2 { margin: 0.0px 0.0px 0.0px 0.0px; line-height: 14.0px; font: 12.0px Times; color: #000000; -webkit-text-stroke: #000000; min-height: 14.0px }\np.p3 { margin: 0.0px 0.0px 0.0px 0.0px; line-height: 22.0px; font: 16.0px \"Trebuchet MS\"; color: #535353; -webkit-text-stroke: #535353 }\np.p4 { margin: 0.0px 0.0px 0.0px 0.0px; line-height: 17.0px; font: 14.7px Arial; color: #000000; -webkit-text-stroke: #000000 }\np.p5 { margin: 0.0px 0.0px 0.0px 0.0px; line-height: 23.0px; font: 17.3px \"Trebuchet MS\"; color: #000000; -webkit-text-stroke: #000000 }\nspan.s1 { font-kerning: none }\nspan.s2 { text-decoration: underline; font-kerning: none; color: #103cc0; -webkit-text-stroke: 0px #103cc0 }<\/style>\n<\/p>\n<style type=\"text\/css\">p.p1 { margin: 0.0px 0.0px 0.0px 0.0px; line-height: 17.0px; font: 14.7px Arial; color: #000000; -webkit-text-stroke: #000000 }\np.p2 { margin: 0.0px 0.0px 0.0px 0.0px; line-height: 14.0px; font: 12.0px Times; color: #000000; -webkit-text-stroke: #000000 }\np.p3 { margin: 0.0px 0.0px 0.0px 0.0px; line-height: 19.0px; font: 16.0px \"Trebuchet MS\"; color: #414141; -webkit-text-stroke: #414141 }\np.p4 { margin: 0.0px 0.0px 0.0px 0.0px; line-height: 20.0px; font: 17.3px \"Trebuchet MS\"; color: #000000; -webkit-text-stroke: #000000 }\nspan.s1 { font-kerning: none }\nspan.s2 { text-decoration: underline; font-kerning: none; color: #0e24b2; -webkit-text-stroke: 0px #0e24b2 }\nspan.s3 { text-decoration: underline; font-kerning: none; color: #0000e9; -webkit-text-stroke: 0px #0e24b2 }<\/style>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; The public sector is not the private sector. So far, so obvious. But the difference isn\u2019t just about the definitions \u2013 it\u2019s in the details. Public sector organisations face different challenges around responsibility, funding, profitability and (wait for it) cybersecurity.&nbsp; &nbsp; Former US military CISO Gary Hayslip moved into the private sector in&hellip;&nbsp;<a href=\"https:\/\/www.identifiglobal.com\/news\/key-cybersecurity-threats-in-the-public-sector\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Key cybersecurity threats in the public sector<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":14374,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[39],"tags":[],"class_list":["post-15249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/15249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/comments?post=15249"}],"version-history":[{"count":0,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/15249\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media\/14374"}],"wp:attachment":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media?parent=15249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/categories?post=15249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/tags?post=15249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}