Accendo Reliability

Your Reliability Engineering Professional Development Site

  • Home
  • About
    • Contributors
    • About Us
    • Colophon
    • Survey
  • Reliability.fm
  • Articles
    • CRE Preparation Notes
    • NoMTBF
    • on Leadership & Career
      • Advanced Engineering Culture
      • ASQR&R
      • Engineering Leadership
      • Managing in the 2000s
      • Product Development and Process Improvement
    • on Maintenance Reliability
      • Aasan Asset Management
      • AI & Predictive Maintenance
      • Asset Management in the Mining Industry
      • CMMS and Maintenance Management
      • CMMS and Reliability
      • Conscious Asset
      • EAM & CMMS
      • Everyday RCM
      • History of Maintenance Management
      • Life Cycle Asset Management
      • Maintenance and Reliability
      • Maintenance Management
      • Plant Maintenance
      • Process Plant Reliability Engineering
      • RCM Blitz®
      • ReliabilityXperience
      • Rob’s Reliability Project
      • The Intelligent Transformer Blog
      • The People Side of Maintenance
      • The Reliability Mindset
    • on Product Reliability
      • Accelerated Reliability
      • Achieving the Benefits of Reliability
      • Apex Ridge
      • Field Reliability Data Analysis
      • Metals Engineering and Product Reliability
      • Musings on Reliability and Maintenance Topics
      • Product Validation
      • Reliability by Design
      • Reliability Competence
      • Reliability Engineering Insights
      • Reliability in Emerging Technology
      • Reliability Knowledge
    • on Risk & Safety
      • CERM® Risk Insights
      • Equipment Risk and Reliability in Downhole Applications
      • Operational Risk Process Safety
    • on Systems Thinking
      • Communicating with FINESSE
      • The RCA
    • on Tools & Techniques
      • Big Data & Analytics
      • Experimental Design for NPD
      • Innovative Thinking in Reliability and Durability
      • Inside and Beyond HALT
      • Inside FMEA
      • Institute of Quality & Reliability
      • Integral Concepts
      • Learning from Failures
      • Progress in Field Reliability?
      • R for Engineering
      • Reliability Engineering Using Python
      • Reliability Reflections
      • Statistical Methods for Failure-Time Data
      • Testing 1 2 3
      • The Manufacturing Academy
  • eBooks
  • Resources
    • Accendo Authors
    • FMEA Resources
    • Glossary
    • Feed Forward Publications
    • Openings
    • Books
    • Webinar Sources
    • Podcasts
  • Courses
    • Your Courses
    • Live Courses
      • Introduction to Reliability Engineering & Accelerated Testings Course Landing Page
      • Advanced Accelerated Testing Course Landing Page
    • Integral Concepts Courses
      • Reliability Analysis Methods Course Landing Page
      • Applied Reliability Analysis Course Landing Page
      • Statistics, Hypothesis Testing, & Regression Modeling Course Landing Page
      • Measurement System Assessment Course Landing Page
      • SPC & Process Capability Course Landing Page
      • Design of Experiments Course Landing Page
    • The Manufacturing Academy Courses
      • An Introduction to Reliability Engineering
      • Reliability Engineering Statistics
      • An Introduction to Quality Engineering
      • Quality Engineering Statistics
      • FMEA in Practice
      • Process Capability Analysis course
      • Root Cause Analysis and the 8D Corrective Action Process course
      • Return on Investment online course
    • Industrial Metallurgist Courses
    • FMEA courses Powered by The Luminous Group
    • Foundations of RCM online course
    • Reliability Engineering for Heavy Industry
    • How to be an Online Student
    • Quondam Courses
  • Calendar
    • Call for Papers Listing
    • Upcoming Webinars
    • Webinar Calendar
  • Login
    • Member Home
  • Barringer Process Reliability Introduction Course Landing Page
  • Upcoming Live Events
You are here: Home / Articles / Risk of Ransomware Attacks on Local Government

by Greg Hutchins Leave a Comment

Risk of Ransomware Attacks on Local Government

Risk of Ransomware Attacks on Local Government

Guest Post by James Kline (first posted on CERM ® RISK INSIGHTS – reposted here with permission)

In several previous Risk Insights, I discussed the need to view state and local government computer network as part of the national infrastructure.  This was needed because of the importance of the networks in providing and supporting basic services.  Further, by viewing these networks as part of the national infrastructure they become an important part of the overall federal effort to protect and defend the nation’s computer infrastructure.  This issue is so important that another paper is appropriate.  This piece extends the prior two pieces.

The Risk

The number of cyber-attacks on local government are not clear.  However, techtalk.pcpitstop.com found 34 ransomware attacks against local government occurred in the first seven months in 2018. The attacks have been on various aspects of local government.  For instance, in January the City of Sammamish Washington was attacked.  The same month the Salisbury Police Department of Maryland was also attacked.  In March 2018, Jackson County Georgia paid $400,000 to restore their networks. In March 2018, Lincoln County Communications Center North Carolina was also attacked. In the first four months of 2019 there were 21 attacks. In August 2019 22 local governments in Texas were the victims of a ransomware attack.  Since most attacks do not get reported or the attack is reported long after it happened, these figures should on the low end. (1)

The Cost

Across the board, cyber crimes cost the world economy at $600 billion in 2017. The amount cyber crimes cost local governments is not known. What is known is that cyber-attacks can be costly.  Riviera Beach Florida paid $600,000 in Bitcoin to recover its data.  It is estimated that the ransomware attack cost the city of Baltimore Maryland $18.2 million dollars.  The cost to the city of Atlanta Georgia was similar.

The Attackers

Who is attacking local governments, is a complex question. This is because there are many attackers.  Some are individuals out for a thrill, others are criminals and still others are state actors.  The Obama administration accused Russians of interfering with the 2016 election.  The U.S. Cyber and Infrastructure Security Agency (CISA) notes that the Chinese government has been active in malicious cyber activity.  The Chinese government is trying to exploit any gap between managed service providers and cloud service providers and customers like local governments. (2)  It is one of these gaps that resulted in 22 Texas local governments being victims of a cyber-attack. While there is no indication the Chinese Government was involved in this cyber-attack, it is worth noting that local governments are vulnerable to state sponsored attacks.

So far, cyber-attacks can be group into three main categories.

  1. Targeted attacks on a specific entity through business emails.
  2. Ransomware attacks which block access to the network, generally through phishing email, and encrypt the organization’s data using malware.
  3. A form of phishing where the attacker’s motive is to attain passwords to gain access to information like banking information, health data and social security numbers.

Reasons for Attack

Orange County North Carolina was the victim of cyber-attack.  Their network links numerous departments from health, criminal justice, transportation to real estate.  The data contained on the network is “a treasure trove” of personal information, including social security numbers, medical records and tax identification numbers. Further, since the County is part of the Research Triangle with links to numerous university and research facilities, intellectual property might also be available.   North Carolina’s State Chief Risk Officer refers to the data contained in government networks “that criminals are accessing” as low hanging fruit.  (3)

Protection

It is not the purpose of this article to provide technical cyber-security recommendations.  That is up to the organization’s IT specialists.  What is useful beyond that, is to generally take three basic actions.  The first is take the possibility of a cyber-attack seriously.  It is far to easy to believe that it will never happen to my organization.  Recognize attacks are occurring and a failure to take that possibility seriously, can create vulnerabilities that an attacker can exploit.  Second, recognize that the computer network connects the entire organization.  Experience demonstrates an attack can affect the entire organization. The last action is to develop an enterprise wide risk management approach to cyber-security.  The risk management approach should be integrated into the organization ERM process.

Conclusion

The prospect of continual cyber-attacks are extremely high.  Local governments are easy targets for thrill hackers, cyber criminals and state actors.  Local governments need to recognize this reality and act accordingly.  Local government must develop an enterprise wide cyber-security risk assessment process which is compatible with the organization’s ERM process.

 Endnotes

  1. Ransomware Attacks Are Testing Resolve of Cities Across America, 2019, August 22, www/newsonthe flipside.com/Americas/ransome-attacks-are-testing-resolve-of-cities-across-america/
  2. CISA, 2019, Chinese Malicious Cyber Activity, https://www.us-cert.gov/china.
  3. Kaplan, Jonah, 2019, Cyber attacks-both domestic and foreign-threaten North Carolina government agencies, November 9, https://abcll.com/technology/cyber-attacks-target-north-carolina-grovernment-agencies/5676476/

BIO:
James J. Kline, Ph.D., CERM, is the author of numerous articles on quality in government and risk analysis. He is a senior member of the American Society for Quality and Six Sigma Green Belt with experience consulting for the private sector and local governments. His recent book, Enterprise Risk Management in Government: Implementing ISO 31000:2018, is available on Amazon. He can be reached at jeffreyk12011@live.com.

Filed Under: Articles, CERM® Risk Insights, on Risk & Safety

About Greg Hutchins

Greg Hutchins PE CERM is the evangelist of Future of Quality: Risk®. He has been involved in quality since 1985 when he set up the first quality program in North America based on Mil Q 9858 for the natural gas industry. Mil Q became ISO 9001 in 1987

He is the author of more than 30 books. ISO 31000: ERM is the best-selling and highest-rated ISO risk book on Amazon (4.8 stars). Value Added Auditing (4th edition) is the first ISO risk-based auditing book.

« Why You Might Need a Break
Authors’ Note — RCM Re-engineered »

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

CERM® Risk Insights series Article by Greg Hutchins, Editor and noted guest authors

Join Accendo

Receive information and updates about articles and many other resources offered by Accendo Reliability by becoming a member.

It’s free and only takes a minute.

Join Today

Recent Articles

  • Gremlins today
  • The Power of Vision in Leadership and Organizational Success
  • 3 Types of MTBF Stories
  • ALT: An in Depth Description
  • Project Email Economics

© 2025 FMS Reliability · Privacy Policy · Terms of Service · Cookies Policy