Cyber Connections News Roundup: December 17

Get the latest cybersecurity news from leading companies, news outlets and blogs.

Cyber Connections News Roundup is a bi-weekly brief of online links to news stories and commentary of interest to the cybersecurity community, delivered on the second and fourth Tuesday of each month. Articles are selected for their newsworthiness, timeliness, potential impact, and reach.

December 17, 2019

Recent Cyber Attack in New Orleans Highlights Vulnerability of State and Local Governments

According to a report on and elsewhere, the City of New Orleans  suffered a cybersecurity attack serious enough for Mayor LaToya Cantrell to declare a state of emergency. A cybersecurity incident was detected around 11 a.m on Friday, December 13. As a precautionary measure, the city’s IT department gave the order for all employees to power down computers and disconnect from wi-fi. All city servers were also powered down, and employees were told to unplug any of their devices. This attack follows another that targeted the state of Louisiana in November, at which time school district computers were taken offline, and a state of emergency declared. Read more.

New Strategy Game from Circadence Aims to Stem Rise in Cyber Attacks During the Holiday Season

A recent article on warns of a rise in cybersecurity attacks during the holiday season. Predictably, a spike in online shopping will lead to a larger field of targets and, likely, more opportunities for stolen data, particularly credit card information. “If you’re saying ‘save my credit card information’, that is a risk that you’re taking for that convenience and it might not be worth it,” said Bradley Hayes, chief technology officer of Circadence, a cybersecurity education and training company. To help educate consumers, Circadence has rolled out InCyt, a web-based battle strategy game that allows users to experience the cyber world from both an offensive and defensive point of view. Read more.

Many Businesses Are Using NDAs to Hide Data Breaches

According to recent article on, European companies are covering data breaches and possibly avoiding multi-dollar fines under the guise of non-disclosure agreements (NDAs). Citing a recent report on, the article said that Europe’s GDPR (General Data Protection Regulation) legislation came into effect in May 2018 and has since then already led to landmark fines, such as that of British Airways— close to US$230 million— while Marriott was handed a US$123 million fine. NDAs, however, allow companies employing the services of cybersecurity firms to keep breaches confidential, as it is not a requirement for cybersecurity firms to report any incidents of data breaches on behalf of their clients. Read more.

Is Privacy Overshadowing Cybersecurity in Our National Debate?

A recent article on asks if cybersecurity has taken a backseat to privacy in our current national debate, mainly as a result of policy makers conflating the two issues and claiming to be addressing both. The article notes that privacy and cybersecurity are distinct. Privacy provides users with control over how businesses collect, use, and share their information. Cybersecurity prevents unauthorized parties from accessing, altering, or rendering unavailable their data, information systems, or connected devices. While congress focuses on passing a national privacy law, the U.S. lacks a comprehensive set of laws to protect information and critical systems from hackers. Read more.

New Cybersecurity Requirements from DoD Aim to Secure Supply Chain

According to the Department of Defense (, by June 2020, industry will see cybersecurity requirements included as part of new requests for information, which typically serve as one of the first steps in the awarding of new defense contracts. According to Ellen Lord, the undersecretary of defense for acquisition and sustainment, a new cybersecurity maturity model certification (CMMC) program will help ensure that companies doing business with the department meet important cybersecurity requirements. The goal is a unified standard to secure the entire DoD supply chain. Read more.


Cyber Connections News Roundup: December 3

Get the latest cybersecurity news from leading companies, news outlets and blogs.

Cyber Connections News Roundup is a bi-weekly brief of online links to news stories and commentary of interest to the cybersecurity community, delivered on the second and fourth Tuesday of each month. Articles are selected for their newsworthiness, timeliness, potential impact, and reach.

December 3, 2019

Cybersecurity Among Top Challenges for U.S. Postal Service

Cybersecurity ranks among the top critical management challenges of the United States Post Office (USPS), according to a recent article on The USPS’s Semiannual Report to Congress, released on Nov. 25, warns that IT modernization leaves the agency vulnerable to cyber threats. “As information technology and the cyber threat landscape evolves, security continues to be an ongoing challenge,” according to the report. Read more.

New China Cryptography Law Raises Concerns Over Data Protection

A recent report on has enumerated several concerns about China’s Cryptography Law, which becomes effective on January 1, 2020. The new law demonstrates Beijing’s “determination to seize from foreign companies all their communications, data, and other information stored in electronic form in China.” Under the new law, Chinese officials will be permitted to share seized information with state enterprises, which has given rise to questions about how these enterprises will be able to use that information against their foreign competitors. Read more.

Healthcare Data Breaches Cost Industry $4 Billion, 2020 Will Be Worse

According to a new survey by Black Book Market Research LLC, 96% of IT professionals agree that data attackers are outpacing their medical enterprises, holding providers at a disadvantage in responding to vulnerabilities. The company surveyed more than 2,876 security professionals from 733 provider organizations to identify gaps, vulnerabilities and deficiencies that persist in keeping hospitals and physicians vulnerable to cyber attacks. Thus far in 2019, healthcare providers continued to be the most targeted organizations for industry cybersecurity breaches with nearly 4 out of 5 breaches, whereas successful attacks on health insurers and plans maintained with more sophisticated information security solutions with little change year to year. Read more.

New Bipartisan Cybersecurity Bill Aims to Improve Coordination Between States and DHS

On November 21, the Senate unanimously passed the State and Local Government Cybersecurity Act, a bill that directs the Department of Homeland Security to assist state and local governments with cybersecurity. According to an article on, the bill, introduced by Sens. Gary Peters, D-Mich, and Rob Portman, R-Ohio, aims to improve cybersecurity coordination between states and DHS through the department’s National Cybersecurity and Communications Integration Center (NCCIC). It allows the NCCIC to provide state and local officials with access to security tools and procedures, as well as participation in joint cybersecurity exercises. Read more.

Misaligned Market Incentives Are Main Roadblock to Satellite Cybersecurity

The satellite sector is under constant cyber attack, according to a recent article on covering a panel at the recent CyberSat 2019 conference. Panelists at a session on “emerging threats to the satellite sector” claim that Nation-state hackers aim to degrade U.S. space capabilities in order to cripple its economy or defeat its military when they need to. But the panelists agreed that the hardest thing to combat is misaligned market incentives in the sector. “Cybersecurity is costly and the incentive structure in the industry often doesn’t reward investments in it,” said Andrew D’Uva, president of the Providence Access Company, a communication satellite services firm. Read more.


Cyber Connections News Roundup: November 19

Get the latest cybersecurity news from leading companies, news outlets and blogs.

Cyber Connections News Roundup is a bi-weekly brief of online links to news stories and commentary of interest to the cybersecurity community, delivered on the second and fourth Tuesday of each month. Articles are selected for their newsworthiness, timeliness, potential impact, and reach.

November 19, 2019

Retail Industry Is Under Cyber Attack According to New Report

The retail industry is experiencing more breaches than any other industry in 2019, according to a new report by threat intelligence company IntSights, titled Cyber(attack) Monday: Hackers Target the Retail Industry as E-Commerce Thrives. High employee turnover, online and in-store locations, and increasing regulations guiding the sector toward protecting consumers are contributing factors for a high –pressure state, according to the report. Some of the top challenges to the retail industry in 2019 include: emerging dark web underground communities targeting retailers; and point-of-sale (POS) malware, web apps, and ransom ware. Read more.

FDA Works with Patients and Experts to Strengthen Device Cybersecurity

In a recent article on, Amy Abernethy, principal deputy commissioner and acting chief information officer and Suzanne B. Schwartz, deputy director, Office of Strategic Partnerships and Technology Innovation, Center for Devices and Radiological Health, discuss how the U.S. Food and Drug Administration is working to address the cybersecurity risks associated with medical devices that are increasingly more advanced and interconnected. Over the past six years, the FDA has strengthened its relationships with cybersecurity experts, manufacturers and other federal government agencies to ensure security. More recently, the FDA has been engaging with patients and patient advocacy groups in order to balance patient needs with cybersecurity concerns. Read more.

DHS Offers Cybersecurity Recommendations for Small Healthcare Providers

The Department of Homeland Security Cybersecurity and Infrastructure Agency (CISA) has released best-practice cybersecurity recommendations to help small healthcare provider organizations bolster their security programs, according to a recent article on The guidelines are aimed at helping small- and medium-sized provider organizations with basic security mechanisms, given their limited resources. CISA developed the recommendations in partnership with small businesses and smaller government agencies. Read more.

AT&T Poll on 5G Cybersecurity Challenges Points to Shared Security Model

Software-defined networking, authentication and a shared security model were the key takeaways from a new report from AT&T Cybersecurity on 5G. The ninth annual Cybersecurity Insights Report was based on interviews with 704 cybersecurity professionals across various markets (from North America, India, Australia, and the United Kingdom), all from companies with over 500 employees and all interviewed in August and September 2019. According to the survey, 72.5% of the respondents said their level of concern about 5G security was high or medium-high. According to an article on, a big reason for a shared security model for 5G is the number of IoT devices–billions–that will be connected. Read more.

TikTok Under Increasing Cybersecurity Scrutiny

TikTok, the Chinese-owned social media platform, has experienced a meteoric rise in popularity over the past two years, but now competitors and lawmakers are calling the app a potential threat to national security. According to a recent report on, Kiersten Todt, a former cybersecurity advisor to President Obama, said she believes those concerns are warranted. Todt attributes the risk to the near-unilateral control the Chinese government holds over local companies and its demonstrated interest in collecting peoples’ data. Read more.


Cyber Connections News Roundup: November 5

Get the latest cybersecurity news from leading companies, news outlets and blogs.

Cyber Connections News Roundup is a bi-weekly brief of online links to news stories and commentary of interest to the cybersecurity community, delivered on the second and fourth Tuesday of each month. Articles are selected for their newsworthiness, timeliness, potential impact, and reach.

November 5, 2019

Chinese APT Group Hacked State Institutions in Six Countries

A Chinese-speaking advanced persistent threat (APT) group, Calypso, has actively been targeting state institutions in six countries, hacking network perimeters and injecting a program to gain access to internal networks, according to a report from researchers at Positive Technologies Expert Security Center. According to an article on, in one attack, the malfeasants, who are believed to have originated in Asia, used PlugX malware, a signature of APT groups from China and some of the attackers inadvertently revealed their IP addresses from Chinese providers. Institutions in India were hit the hardest, followed by Brazil and Kazakhstan, Russia and Thailand and Turkey. Read more.

Military Cybersecurity Market Expected to Grow to $16 Billion by 2023

According to a new Frost & Sullivan study titled “Global Military Cybersecurity Market, Forecast to 2023,” that market is projected to increase at a compound annual growth rate (CAGR) of 3.6% to reach $16.01 billion by 2023. This growth, according to the report, will be the result of global defense industry investment in disruptive technologies and platforms that are driving changes in military cybersecurity requirements. “Militaries across the globe are budgeting for and pursuing the development of new enabling, next-generation technologies for cybersecurity,” said Ryan Pinto, Research Analyst, Frost & Sullivan. Read more.

R Street Offers Free Resource for Measuring Cybersecurity

Cybersecurity experts often complain about the lack of a well-defined system for measuring cybersecurity in an objective, quantifiable, and comparative manner. R Street, a non-profit, nonpartisan, public policy research organization, has published a compendium (a downloadable PDF) of sources to fill this gap. R Street’s Institute National Security and Cybersecurity Program has developed a partial bibliography that compiles a baseline of existing disparate measurement efforts. The goal of the document is to provide a systematic overview of the field that is both technically literate and of use to decision-makers in the public and private sectors. Read more.

Will the EU Seize the Global Lead On Cybersecurity?

The European Union (EU) has undertaken cybersecurity activities over the past six years that make the case that it is about to usurp the U.S.’s presumed role as the global leader on cybersecurity, according to a recent article on Notably, it has already established cybersecurity requirements for Operators of Essential Services (OES – essentially critical infrastructure companies) and digital service providers (DSPs), and it has launched a certification framework for digital products, services, and processes. Read more.

The Construction Industry Must Pay Attention to Cybersecurity Risks

A recent article on points out that while technology, energy, and healthcare industries seem to regularly make headlines relating to massive, nationwide cyber breaches, construction companies are exposed to the same risks. Temporary workspaces where employees and contractors commonly use project management software to track job status and collaborate with external vendors maybe at risk. In these workspaces, highly confidential plans, blueprints, bids, financial information, and even personally identifiable information (PII) – like full names and social security numbers – are vulnerable. Read more.




Cyber Connections News Roundup: October 22

Get the latest cybersecurity news from leading companies, news outlets and blogs.

Cyber Connections News Roundup is a bi-weekly brief of online links to news stories and commentary of interest to the cybersecurity community, delivered on the second and fourth Tuesday of each month. Articles are selected for their newsworthiness, timeliness, potential impact, and reach.

October 22, 2019

It’s National Cybersecurity Awareness Month: UMGC Students, Alumni and Faculty Experts Share Their Tips for Staying Safe

Check out our University of Maryland Global Campus three-part video series offering tips and insights to help you understand and secure your digital profile at home and at work. Read more.

Making the Case for a Risk-Based Approach to Cybersecurity in the Financial Services Industry

We have no definable network perimeter to protect, according to a recent article on With thousands of mobile devices connecting to networks through cloud-based applications that access critical and sensitive data from a variety of hybrid cloud environments, the article supports the argument that it’s time to adopt a truly risk-based approach to cybersecurity to enable us to focus on protecting data itself, rather than on endpoints, networks, and identity. Read more.

Supply Chain Hacks Are On the Rise for Phishing Scams

According to Verizon’s latest Data Breach Investigations Report, email is the channel used in 94% of attacks where hackers target executives for phishing schemes. A recent article on describes how hackers are now employing creative approaches to what are known as “supply chain” attacks, which use an organization’s associates, like outsourcing companies, to spread their attacks across that entity’s network of partners and vendors. Read more.

Is Insurance a Viable Solution to Growing Cybersecurity Challenges?

A recent article on makes the case. Given the increasing frequency of cyber breaches, along with the presence of more varied and evolving threats, how do we address the perpetual uncertainty about whether the cybersecurity industry can protect us? The article argues that since cybersecurity providers can’t guarantee the effectiveness of a cyber solution, and since it is difficult to accurately quantify the cost/benefit of a cyber strategy, then cybersecurity insurance may provide the path toward a way to reduce risk and incentivize clients to take preventative measures. Read more.

Open Cybersecurity Alliance Aims to Unite a Fragmented Landscape with Common, Open Source Code and Practices

On October 8, 2019, the OASIS international consortium announced the Open Cybersecurity Alliance (OCA), an industry initiative to bring interoperability and data sharing across cybersecurity products. IBM and McAfee have contributed the initial open source content and code. Formed under the auspices of OASIS, OCA brings together organizations and individuals from around the world to develop open source security technologies, which can freely exchange information, insights, analytics, and orchestrated responses. Read more.

Cybersecurity Challenges Lie Ahead for Next Generation 9-1-1 in Maryland

By Balakrishnan Dasarathy

The state of Maryland, along with many other states, is in the process of evolving its current largely telephony based 9-1-1 emergency handling systems to the Next Generation 9-1-1 (NG9-1-1) systems, as described in the final report by the Commission to Advance NextGen 9-1-1 Across Maryland. Although the benefits to a digital emergency handling system are vast, the migration to a more open IP-based system also raises a number of security threats that must be addressed to ensure success.

Current 9-1-1 services typically operate over standard telephone networks and, as such, mainly support requests through a voice call. The NG9-1-1 systems will all operate on a nation-wide digital network using the Internet Protocol (IP) technology, enabling interconnection with a wide range of public and private networks supporting emergency assistance from regular phone networks, wireless networks and the Internet.

One of the main benefits of the migration to NG9-1-1 systems is that they will allow Public Safety Answering Point (PSAPs) staff to accept and process a range of information from the public and responders, including text, images, video and voice. Moreover, non-humans such as collision detection systems in automobiles and home health monitoring IoT devices will be able to initiate requests not in the too distant future.

Overall, NG9-1-1 will be able to enable more situational awareness for dispatchers and responders. Because of the connectedness of the Internet, PSAPs can be consolidated and backups for a PSAP can be dynamically called upon nationally (not just regionally) to handle large-scale emergency situations, as encountered during the attacks of September 11, 2001. PSAP IT resources such as logging and recording and location look up services can be shared. In short, emergency handling will be far more resilient and economical with NG9-1-1 than they are today.

Although cyber attacks such as Telephony Denial of Service (TDoS) and Radio Frequency (RF) jamming attacks have compromised current 9-1-1 systems, the migration to NG9-1-1 systems invites a host of additional threats. As NG9-1-1 networks and systems are more open and connected than today’s closed telephony-based 9-1-1 systems, their attack surfaces are much larger.

NG9-1-1 systems can be subject to several types cybersecurity attacks that would hamper their availability, and affect confidentiality and integrity of data critical to the handling of emergencies. These new threats include:

  • Telephone Denial of Service Attacks (TDOS): Calls jam a PSAP administrator line or 9-1-1 lines. This type of attack already happened in October 2016 via compromised cell phones.
  • Ransomware. Use of malware to prevent access to computer systems for the purpose of extorting a ransom. The City of Baltimore emergency 9-1-1 system dispatch and recording servers were subject to this attack in March 2018.
  • Malware attacks. More generally, a malware in the form of a worm spreading from systems in one PSAP to its neighboring ones compromising the ability to respond in a state or a region of the country.
  • Swatting. Swatting is essentially tricking an emergency dispatcher with false or misleading information; for example, through the manipulation of fields such as Caller ID and location information in IP packets in an emergency request to indicate the call is originating from a location at which a serious emergency is taking place, thus directing scarce law enforcement (and medical responders) to that location. This could be just a revenge, or the manipulator could be committing a serious crime somewhere else. This happened in 2017 in California and resulted in an innocent person shot by the police.

With well-known technical and policy controls in place in the IT and network infrastructure and in various emergency handling applications, as well as the support of a well-trained staff, these types attacks can be largely prevented and the damage contained.

The Department of Homeland Security (through its Office on Emergency Communications), the Federal Communications Commission (through its task force on Optimal PSAP Architecture), the National Emergency Number Association (NENA), and the Association of Public-Safety Communications Officials (APCO) are all involved in the rollout of NG9-1-1 and have produced guidelines to address cybersecurity issues among other directives (e.g., specification of functional components and their interfaces for procurement purposes, IP network based architecture, deployment alternatives, budget and cost sharing among various government entities).

A simplified IP network-based “three-tier” architecture is shown below. The key aspect of the architecture is the Emergency Services IP Networks (ESInets), to carry all types of traffic with intelligence to route to appropriate PSAPs and support functions such as location information and subscriber information services.


Source: Office of Emergency Communication: Cyber Risks to Next Generation 9-1-1, Nov. 2018

What’s Happening in Maryland?

In Maryland, a statewide task force known as the ENSB (Emergency Number System) Cybersecurity was formed during the summer of 2019 to address the cybersecurity issues related to NG9-1-1. The task force consists of public safety managers and IT professionals from various counties and vendors in the space. Emergency handling in Maryland is largely provided at the county level. I am representing University of Maryland Global Campus to provide cybersecurity expertise. The current focus areas of this committee are to:

  • Develop minimum standards and requirements to address cybersecurity concerns for products serving PSAPs and ESINet components, and
  • Cybersecurity best practices for PSAPs and IT organizations supporting the underlying infrastructure and applications

Standards and recommendations from several organizations and related industries are currently under review so as adopt them to hit the ground running, including:

  • NENA (National Emergency Number Association) Security for Next-Generation 9-1-1 standard
  • Next Generation 9-1-1 Security (NG-SEC) Audit Checklist
  • FCC Task Force on Optimal PSAP Architecture: Final Report
  • NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations (and its compliance)
  • NENA Detailed Functional and Interface Standards for the NENA i3 Solution (for various vendor products)

Next Steps

We expect to issue standards and an auditing process to verify how well the standards are followed by the end of 2019, so that the various PSAP entities in the state can complete their gap analysis. Beginning on January 1, 2020, the ENSB will begin approving projects for improving their cybersecurity posture.

About the Author

DasMarch2018v6Balakrishnan Dasarathy, Ph.D. is collegiate professor and program chair for Information Assurance at University of Maryland Global Campus.

Cyber Connections News Roundup: October 8

Get the latest cybersecurity news from leading companies, news outlets and blogs.

Cyber Connections News Roundup is a bi-weekly brief of online links to news stories and commentary of interest to the cybersecurity community, delivered on the second and fourth Tuesday of each month. Articles are selected for their newsworthiness, timeliness, potential impact, and reach.

October 8, 2019

UMGC Celebrates Cybersecurity Awareness Month with Activities and Information Aimed at Helping You Stay and Secure Online

National Cybersecurity Awareness Month, which takes place every October, is a great time to review online security habits at home and at work. At University of Maryland Global Campus (UMGC), we will be busy this month getting information out on a variety of topics, including cyber hygiene, cyber careers and more. Check out what’s happening this month:

  • This year’s National Cybersecurity Awareness Month theme emphasizes personal accountability and stresses the importance of taking proactive steps to enhance cybersecurity at home and in the workplace. The overarching message – Own IT. Secure IT. Protect IT. – focuses on three key areas including citizen privacy, consumer devices, and ecommerce security. This month, UMGC cyber faculty, students and alumni have joined together for a video series that kicks off on Wednesday, October 8 on the UMGC Global Media Center. Faculty and students will share their insights into each of the NCSAM themes and offer tips on understanding and securing your digital profile at home and at work.
  • Earlier this month we teamed up with the Community College of Baltimore County (CCBC) to present “Decoding Your Cyber Career,” a one-day informational networking event on Oct. 2 to promote careers in cybersecurity. Attendees heard from cyber experts and educators about the demand for cybersecurity professionals, the latest trends within the industry, and the ways to best leverage knowledge, skills, and certifications for career success. Check out our coverage of the event, which featured keynote speaker Matt Dunlop, vice president and chief information security officer of Under Armour, Mike Janke, CEO and co-founder of DataTribe, as well as a panel of cybersecurity employers and students who shared their insights.
  • Finally, be sure to visit the Cyber Connections blog on Oct. 15 for a post from Balakrishnan Dasarathy, UMGC professor and program chair, cyber operations & information assurance, in which he discusses a state-wide effort in Maryland to convert its voice network-based 911 systems to IP and digital-based 911 systems. Dasarathy is involved in this effort and will share his insights into the associated cybersecurity challenges, such as ransom ware and denial of service attacks.

Happy National Cybersecurity Awareness Month. Stay safe and stay tuned!

Cyber Connections News Roundup: September 24

Get the latest cybersecurity news from leading companies, news outlets and blogs.

Cyber Connections News Roundup is a bi-weekly brief of online links to news stories and commentary of interest to the cybersecurity community, delivered on the second and fourth Tuesday of each month. Articles are selected for their newsworthiness, timeliness, potential impact, and reach.

September 24, 2019

Microsoft to Offer Free Security Support for Windows 7 Ahead of 2020 Election

According to a recent report on, Microsoft Corp. will offer state and local election officials free security support for Windows 7 operating systems used in voting systems through 2020. Microsoft has long planned to stop providing security updates for Windows 7 users in general in January 2020, but was allowing users to pay for those updates through January 2023. The offer of free services through next year’s U.S. presidential election represents an additional effort to make it easier to update operating software used in voting systems, such as the election management systems that format ballots. Read more.

Are Recent Saudi Oil Attacks a Sign of More Cyber Warfare to Come?

The recent attack against Saudi Aramco, claimed by U.S intelligence and the Saudi government to be the work of Iran, is a continuation of a long-simmering cyber war between the two countries, according to an article on In recent years, Iran has deployed destructive computer viruses against Saudi Arabia, which has been slow to strengthen its defenses. The report warns that investors should expect long-term cyber espionage and flare-ups of malicious activity, including the potential for destructive attacks that hurt companies in the region beyond Aramco. Read more.

Los Angeles Becomes First City in Nation to Offer Public Threat-Sharing Platform

According to a recent article on, the city of Los Angeles has unveiled the Threat Intelligence Sharing Platform, as well as a free mobile app that will help people detect malicious email. This, according to Mayor Eric Garcetti, makes Los Angeles the first city in the nation to release a publicly available threat-sharing platform and cybersecurity app. The platform is the creation of the LA Cyber Lab, a nonprofit organization dedicated to protecting the public and businesses from cyber threats by facilitating and promoting innovation, education and information sharing between public and private sectors. Read more.

Citing Cybersecurity Concerns, Colorado Bans QR Codes on Ballots

Colorado has become the first state in the U.S. to ban the use of QR codes on ballots, according to a recent article on In announcing the change, Colorado Secretary of State Jena Griswold (D) said that cybersecurity experts have raised concerns around the security of using the QR codes on ballots. Griswold also cited findings by U.S. intelligence that Russian operatives attempted to interfere in the 2016 presidential election as a reason to enhance cybersecurity of elections. Colorado will now require that votes only be counted based on human-verifiable information, specifically the marked ovals on the printed ballot, and not based on the counting of votes embedded in QR codes. Read more.

Cyber Attacks Exploit People and Not Technology According to Proofpoint Report

According to the results of Proofpoint’s 2019 Annual Human Factor Report, virtually all successful email-based cyber attacks require the target to open files, click on links, or carry out some other action. Although a small fraction of attacks rely on exploit kits and known software vulnerabilities to compromise systems, the vast majority of campaigns, 99%, require some level of human input to execute. These interactions can also enable macros, so malicious code can be run. A recent article about the report on notes how increasingly difficult it is to distinguish a malicious email from a regular one, mainly because tailored attacks look as if they come from a trusted source, such as cloud service providers like Microsoft or Google, colleagues, or even the boss. Read more.

Cyber Connections News Roundup: September 10

Get the latest cybersecurity news from leading companies, news outlets and blogs.

Cyber Connections News Roundup is a bi-weekly brief of online links to news stories and commentary of interest to the cybersecurity community, delivered on the second and fourth Tuesday of each month. Articles are selected for their newsworthiness, timeliness, potential impact, and reach.

September 10, 2019

U.S. CISO Schneider: Federal Government Must Lead on Cybersecurity

U.S. Chief Information Security Officer (CISO) Grant Schneider, speaking at the recent Billington Cybersecurity Summit (Sept. 4-5 in Washington, D.C.), said that the federal government must lead by example for the private sector and American citizens in how to properly manage cybersecurity. In a recent conference summary on, Schneider’s argument for a U.S. leadership role stems from the federal government’s efforts to set cybersecurity policies and requirements and develop tools that bring agencies together in a unified posture against threats. “Private entities look at the requirements that we put upon federal agencies,” Schneider said. “Government agencies can also serve as an example for how you can best protect your information as a citizen or as a corporation,” he added. Read more.

Flagstaff Schools Close Due to Ransomware Attack

Flagstaff Unified School District officials worked over the weekend of Sept. 7-8 to resolve a cybersecurity issue that forced closures of all schools on September 5-6. According to a report on, officials from the school district said they were working to secure critical internet-based systems while investigating the origin and possible damage resulting from the ransomware in the district’s computer system discovered on Sept. 4. Officials cut off access to the internet and hundreds of teachers and other district employees on Friday turned in their Windows devices at a nearby middle school so they could be scanned for contamination and have new malware protection installed. Read more.

New Online Training Game Brings Cybersecurity to Life

According to a report on, ​ThreatGEN, a cybersecurity training and services company based in Houston, Texas, released what it claims to be the world’s first online multiplayer computer game designed to teach cybersecurity. Titled ThreatGEN®: Red vs. Blue, the game aims to create an immersive cybersecurity experience that teaches practical applications of cybersecurity concepts that have traditionally been more strategic or abstract, such as building a cybersecurity program and managing a budget. Read more.

Proliferation of Augmented Reality Applications Exposes Security Risks

A recent article on examines the cybersecurity implications of augmented reality (AR), a technology that enhances objects that reside in the real world through computer-generated information. AR technology is advancing rapidly as commercial applications are being implemented in manufacturing, industry, shipping and logistics. But the growth of AR applications brings with it an expanding landscape of new cybersecurity vulnerabilities as adoption often outpaces a thorough vetting of any associated security risks, particularly as it involves wearable or tablet-based AR applications that require Wi-Fi. Read more.

Nearly 40% of Enterprises Lose Business Due to Cybersecurity Performance

According to a new commissioned study conducted by Forrester Consulting on behalf of BitSight, titled “Better Security And Business Outcomes With Security Performance Management,” nearly two in five enterprises admit that they have lost business due to either a real or perceived lack of security performance within their organization. The study, based on a survey of 207 security decision makers, evaluates how executives understand and effectively measure their cybersecurity performance and adequately communicate it to the board, senior executives, customers, and critical stakeholders. Read more.


Cyber Connections News Roundup: August 27

Get the latest cybersecurity news from leading companies, news outlets and blogs.

Cyber Connections News Roundup is a bi-weekly brief of online links to news stories and commentary of interest to the cybersecurity community, delivered on the second and fourth Tuesday of each month. Articles are selected for their newsworthiness, timeliness, potential impact, and reach.

August 27, 2019

How Do You Measure Cybersecurity Effectiveness?

A recent blog post on examines the lack of universally recognized metrics to measure cybersecurity improvements. As a result, decision-makers “are left to make choices about cybersecurity implementation based on qualitative measures rather than quantitative ones.” The article seeks to understand the importance of a balance between quantitative and qualitative metrics in order to also address role of processes and procedures. “Cybersecurity is a matter not just of the equipment and tools in place but also of how the equipment and tools are used by people.” Read more.

Microsoft Leads All Brands in Phishing Attacks

A recent article on estimates that phishing attacks account for up to 90% of cyberattacks by volume. And the Microsoft brand has a clear lead when it comes to these attacks. According to a recent Vade Secure survey based on its AI engine activity, more than 20,000 unique Microsoft phishing URLs were detected for an average of more than 222 per day. The 180 million Office 365 business users provide a playing field rife for attack. And once an attacker steals Office 365 credentials the whole world of a Microsoft user’s account opens up. PayPal occupies the second spot. Read more.

More than Half of Industrial Cybersecurity Incidents Caused by Human Error

A recent Kaspersky report titled “State of Industrial Cybersecurity 2019” found that errors or unintentional actions were behind 52% of incidents affecting operational technology and industrial control system (OT/ICS) networks in 2018. An article about the report on cites the top five most common types of vulnerabilities within industrial control systems as: misconfigurations (34.7 percent); vulnerabilities, patches and updates (26.7 percent); identity and access management (12.9 percent); insecure services enabled (7.9 percent); architecture and network segmentation (7.9 percent). Read more.

Nearly One Third of Healthcare Employees Have Never Received Cybersecurity Training

Employees of healthcare organizations in the U.S. and Canada are lacking cybersecurity education and awareness in three main areas: regulation, policy and training, according to a new report from Kaspersky titled “Cyber Pulse: The State of Cybersecurity in Healthcare Part 2.” According to an article on, the report established several findings that correlate to the increasing number of hacking and IT-related incidents occurring in healthcare organizations across North America. For example, nearly a fifth of U.S. respondents to the survey (18%) reported they didn’t know what the HIPAA security rule meant. In Canada, nearly half of respondents (49%) said they didn’t know if Canadian PHI needed to stay in Canada. Read more.

Reformed Con Man Frank Abagnale Offers Tips on Preventing Identity Theft

Frank Abagnale, the subject of the movie “Catch Me If You Can” starring Leonardo DiCaprio, sat down recently with TechRepublic to offer his tips on avoiding identity theft. First, he advises to freeze your credit, which reduces the ability for someone to create a fraudulent credit account in your name. Abagnale also advises to avoid writing checks because most often they include your name, address, and phone number, as well as your bank’s name and address, account number, routing number and signature. Moreover, everyone can see your physical check, which exposes it to more risk. Read more.