Cyber Security Warnings For US 2020 Election

US cyber security experts are warning that hacking on government institutions reached crisis levels in 2019 and that, based on what they've seen in early 2020, hackers will focus on the next Presidential election.

Ransomware has become a real threat to governments and potentially to future elections. Hackers launched 169 ransomware attacks on US government agencies from 2013 through the first four months of 2019, according to cybersecurity firm Recorded Future. Typically hackers infect the computers of government agencies before demanding that they pay a ransom for an encryption key that will free their locked files and records.

This month the US Cybersecurity Infrastructure and Security Agency (CISA) has released its cybersecurity plan for the run-up to the 2020 presidential election, outlining the agency's role as a facilitator that will assist federal, state and local agencies in protecting critical election infrastructure.

CISA is a unit of the US Department of Homeland Security, will focus on protecting the election infrastructure as well as the infrastructure used by campaigns and political parties; making sure voters are protected from disinformation campaigns; and issuing warnings and responses related to foreign influence and hacking. 

The agency will help identify cyber threats, share intelligence and assist in mitigating security issues that target government organisations as well as voters, according to the plan. It's also planning public awareness campaigns that will discusses issues that include foreign disinformation campaigns and threats such as phishing attacks, the plan notes.

CISA focuses on making sure that election infrastructure stakeholders have the skills and information necessary to assess and manage the risks they face.

Three years ago, the Department of Homeland Security classified election processes as "critical infrastructure," placing them in a highly protected category of operations considered vital to keep the United States functioning. Three years after the reclassification, the Federal Bureau of Investigation says it's now receiving a record number of complaints about internet scams and crimes.

In a new report the FBI's Internet Crime Complaint Center says it received 467,361 complaints in 2019, the highest number since the center was created in 2000. Florida ranked second in the nation among complaints per state, behind California, with a reported 27,178 calls to the crime center. 

But the numbers only reflect the organisations that publicly report they've been attacked. It is widely thought by experts that  80-90% of organisations do not disclose that their systems have been infected with malware, or worse, ransomware, to authorities. 

CISA:         FBI IC3:        GovTech:        Norton:        BankInfoSecurity

You Might Also Read: 

Fake News And The 2020 Presidential Election:

 

 

 

« 90% Of Breaches Are Caused By Human Error
The Cyber Security Workforce Must Grow 145% »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Templar Executives

Templar Executives

Templar Executives is a leading, expert and dynamic Cyber Security company trusted by Governments and multi-national organisations to deliver business transformation.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

LayerX Security

LayerX Security

LayerX's user-first browser security platform turns any browser into the most protected & manageable workspace, by providing real-time monitoring and governance over users’ activities on the web.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.