Build public trust by tightening security preparedness

 

Connecting state and local government leaders

By addressing issues of data governance and social responsibility, agencies can rebuild the public trust lost in recent security breaches.

Government agencies have been subject to criticism of late due to the ongoing struggles with data protection. While the public sector accounted for only 11 percent of all data breaches in 2014, according to a survey by the Identity Theft Resource Center, government data breaches are among the most highly criticized. In the private sector, the loss of trust after a data breach results in greater customer churn and reduced profits. In the public sector, relationships are not bound by the same economics; those affected by a data breach either have no fiscal resource to express their loss of trust or no alternative service provider. What we see instead is a loss of faith in the competency of governments as a whole. In order to bolster confidence among their constituents, government agencies need to dramatically increase their accountability towards data security.

According to the Government Accountability Office, data breaches at government agencies involving personally identifiable information have increased by 91 percent in the past eight years, rising from 5,503 data breaches in 2006 to a staggering 67,168 in 2014. This year, the series of data breaches at the Office of Personnel Management affected more than 21.5 million people. This breach places sensitive information such as military records at risk, triggering reactions throughout the government sector.

Despite the publicity surrounding the increased risk, government agencies are still demonstrating an alarming absence of oversight regarding data security. In the case of the OPM breach, reports as recent as March 2015 indicated “persistent deficiencies in OPM’s information system security program.” If weaknesses are identified and then ignored, at what point does insufficient IT security then become negligence?

Responding to the fallout of the OPM breach, and the ongoing rise in federal data breaches, Sen. Orrin Hatch (R-Utah) and Sen. Tom Carper (D-Del.) recently introduced the Federal Computer Security Act of 2015, a bill that encourages good “cyber hygiene” within federal government. The act would highlight whether agencies are using up-to-date security practices and software, but the act falls short of applying any accountability towards actual compliance. The same can be said for the current standards set by the Federal Information Security Management Act, which provides a framework for security standards, but which does not measure or fine for failure to implement security standards effectively. Currently, failure to comply with FISMA standards results in a poor public report card, which could lead to reduced agency funding or congressional testimony by the CIO.

While its own data security practices come under fire, the Third Circuit recently affirmed the Federal Trade Commission’s authority to regulate data security standards of commercial entities. FTC Chairwoman Edith Ramirez noted that “It is not only appropriate, but critical, that the FTC has the ability to take action on behalf of consumers when companies fail to take reasonable steps to secure sensitive consumer information.” The government has reaffirmed its dedication to enforcing security in the private sector, yet has not placed the same level of scrutiny on the public sector which shares in these same struggles.

In order to save face, and regain public trust, it’s important that agencies step up to ensure confidence in their own infrastructure. Despite the alarming statistics, there is a way to move forward and regain public trust. Numerous reports have indicated that many agencies fail to move beyond independent audits and reports into actionable plans. To be successful, they should consider the following:

1. Perform a risk assessment, to understand where data is, where it’s being used and by whom. This risk assessment must extend to vendors and contractors as well as data on the endpoint, including devices accessing sensitive data that may not be owned or secured by the agency directly. This review can be conducted internally or by an external auditor.

2. Create an actionable plan to address security risks with a combination of education, security policies and technologies that protect data, wherever it resides, and has the ability to detect and contain a data breach.

3. Automate, wherever possible, to avoid ‘putting off’ data security updates. This includes automated patching as well as automated alerts if data is put at risk. For example, if an agency’s endpoint device travels beyond a geographic zone or its encryption is offline, the device can be remotely secured to protect critical data and network access from that device.

4. Make security a top-down priority in every agency. If the government is going to hold private companies accountable for security, it needs to make security a priority in every agency of its own. The only way to do so is to ensure security becomes a top-down priority, backed by a strong security team, within every agency. This will help hold every agency accountable for its own security.

5. Leverage a layered security strategy to protect data, wherever it resides, for its entire lifecycle. A layered strategy better enables IT to cope with the rapid pace of change caused by mobility, the cloud and even the changing risk landscape. Leverage technologies that will help identify potential security threats and respond rapidly before they become damaging security incidents.

Unfortunately the public sector does not have a great track record when it comes to data protection. In order to reduce public cynicism, government agencies will need to demonstrate that they are addressing their own security affairs. Accountability plays a major role in this, with formalized security inspection and regulation required to order to hold agencies responsible for poor data security practices.

But until this has been mandated, government agencies can reconstruct trust in public administration by addressing issues of data governance and social responsibility.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.