THANK YOU FOR SUBSCRIBING
Government CIO Outlook | Thursday, December 05, 2019
Ensuring cybersecurity is turning out to be a problematic task year after year, as cybercriminals invent new ways of attacks, exploit new vulnerabilities, and execute innovative attacks consistently.
Fremont, CA: Today's interconnected cyberattacks have become a popular feature. With time, more organizations are transitioning their data operations online. The number of attacks has increased. Government departments are not exempted from cyberattacks. The Energy Department is using the same cybersecurity practices year after year, exposing unclassified systems in the nation's nuclear facilities and various vital infrastructure disclosed to digital attacks.
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
As said by the Energy Inspector General, primarily, the Energy Department is efficient in fixing vulnerabilities after they are uncovered. Now, the officials have strived to place the policies in place to avoid the repetition of the same mistakes. In the event of the departments' annual audit for the cybersecurity program, multiple recurring weaknesses related to configuration management, personal training programs, access controls, and security testing was unveiled by the investigating officers. The investigators additionally uncovered substantial shortcomings in the Energy department's vulnerability management practices, that left tens of thousands of "critical and high-risk” vulnerabilities unattended in its digital environment.
The report put up by the auditors stated that the departments' information system and data might be at high risk of compromise, loss, and modification if the department does not take the necessary steps to ward off the weaknesses identified during their evaluation. The report further added that the vulnerabilities concerning developing, updating, and implementing policies and procedures are harming the departments', the potential to secure its information system efficiently, and data is continuously identified in the auditor and other independent review surveys.
In 2018, the department addressed 21 out of the 25 recommendations made, but several vulnerabilities cropped up this year, from which the majority were identical to the type discovered during prior evaluations, said the IG.
Diverse locations went through different security lapses, but there were widespread poor vulnerability management practices. The auditors concluded the absence of effective vulnerability management practices, the apps that lack security patches for known vulnerabilities are on high alert for computer viruses and various malicious attacks, which might provide attackers the control of the applications or even the entire server.
Check out: Top Security Analytics Solution Companies
More in News