Cyber Security Warnings For US 2020 Election

US cyber security experts are warning that hacking on government institutions reached crisis levels in 2019 and that, based on what they've seen in early 2020, hackers will focus on the next Presidential election.

Ransomware has become a real threat to governments and potentially to future elections. Hackers launched 169 ransomware attacks on US government agencies from 2013 through the first four months of 2019, according to cybersecurity firm Recorded Future. Typically hackers infect the computers of government agencies before demanding that they pay a ransom for an encryption key that will free their locked files and records.

This month the US Cybersecurity Infrastructure and Security Agency (CISA) has released its cybersecurity plan for the run-up to the 2020 presidential election, outlining the agency's role as a facilitator that will assist federal, state and local agencies in protecting critical election infrastructure.

CISA is a unit of the US Department of Homeland Security, will focus on protecting the election infrastructure as well as the infrastructure used by campaigns and political parties; making sure voters are protected from disinformation campaigns; and issuing warnings and responses related to foreign influence and hacking. 

The agency will help identify cyber threats, share intelligence and assist in mitigating security issues that target government organisations as well as voters, according to the plan. It's also planning public awareness campaigns that will discusses issues that include foreign disinformation campaigns and threats such as phishing attacks, the plan notes.

CISA focuses on making sure that election infrastructure stakeholders have the skills and information necessary to assess and manage the risks they face.

Three years ago, the Department of Homeland Security classified election processes as "critical infrastructure," placing them in a highly protected category of operations considered vital to keep the United States functioning. Three years after the reclassification, the Federal Bureau of Investigation says it's now receiving a record number of complaints about internet scams and crimes.

In a new report the FBI's Internet Crime Complaint Center says it received 467,361 complaints in 2019, the highest number since the center was created in 2000. Florida ranked second in the nation among complaints per state, behind California, with a reported 27,178 calls to the crime center. 

But the numbers only reflect the organisations that publicly report they've been attacked. It is widely thought by experts that  80-90% of organisations do not disclose that their systems have been infected with malware, or worse, ransomware, to authorities. 

CISA:         FBI IC3:        GovTech:        Norton:        BankInfoSecurity

You Might Also Read: 

Fake News And The 2020 Presidential Election:

 

 

 

« 90% Of Breaches Are Caused By Human Error
The Cyber Security Workforce Must Grow 145% »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

DoSarrest Internet Security Ltd

DoSarrest Internet Security Ltd

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base.

Komodo Consulting

Komodo Consulting

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Intigriti

Intigriti

Intigriti helps companies protect themselves from cybercrime. Our community of ethical hackers provides continuous, realistic security testing to protect our customer’s assets and brand.

Cyber Octet

Cyber Octet

Cyber Octet is an IT Solution, Security, Training and Services company. We provide training and services from Web Application Security to ISO 27001 implementation.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.