Busniess View Magazine - September 2024

OPENING LINES GOVERNMENTS SHOULD LOOK UNDER THE HOOD TO MAKE SURE THEIR IT SYSTEMS ARE SAFE FROM CYBER CRIMINALS Source:https://www.americancityandcounty.com/ , Michael Keating, First Published Sept 12th, 2024 Cities and counties should take a close look at their entire IT setup to ensure security against cyber threats, says Josh Koenig, co-founder & chief strategy officer at Pantheon, a website operations platform that offers tools that enable building Drupal and WordPress cloud-based sites with streamlined workflows, scalable infrastructure, and a fast, efficient content delivery network. The company provides web-hosting solutions to governments. “The first step is to assess the current state of security: the surface area, the technical situation and the practices and processes that govern the human elements of security. Unless this has been done recently, or there’s been zero change or staff turnover since the last audit, the most important thing is to know where to focus. In all likelihood, there are multiple issues to address,” Koenig tells Co-op Solutions. The surface area, which can be susceptible to digital attack, encompasses all the equipment and software that connect to an organization’s network. These include applications, code, ports, servers and websites. It also encompasses unauthorized applications or devices that team-members and other users may install without management’s permission. Koenig says that if IT leaders don’t have a comprehensive picture of the state of security, they risk neglecting something that is important. “They might focus on the first thing they find and leave open other unknown gaps that could be far more critical.” Koenig says public-facing systems like websites have a much larger attack surface. “As more public services move online, the criticality of these systems goes up. A static website being knocked offline is embarrassing, but one that’s compromised can facilitate identity theft, spread misinformation and do other harmful activities.” He adds that another area of vulnerability is anything that’s Internet-connected but still managed via a legacy or on-premise approach. “While there’s psychological comfort in knowing where the systems are, the truth is that in most organizations, this infrastructure is the most likely to be outdated or suffer from human error in terms of maintenance.” A third area of vulnerability, according to Koenig, is where organizations have “moved to the cloud” but with a pure lift-and-shift approach, swapping out virtual for physical hardware. “Unless they have a very strong devops (development and operations) or cloud management practice, it’s very easy for human error and oversight to result in under-governed systems or orphaned nodes on the network.” 11 BUSINESS VIEW MAGAZINE VOLUME 11, ISSUE 09

RkJQdWJsaXNoZXIy MTI5MjAx