CNCounty News

Cyber attacks don't take breaks for holidays

Author

Image of Rita-Reynolds-2.png

Rita Reynolds

Chief Information Officer & Managing Director, County Tech Xchange

Upcoming Events

Conference

NACo AI Regional Forum Series

Conference

NACo AI Northeast Regional Forum

Related News

County News

Podcast: The CIO Reserves

Image of GettyImages-1331943958.jpg

Key Takeaways

One would think that over the holidays, the hacking community might take a break! On the contrary, they are capitalizing on the opportunity to exploit a new vulnerability found in an open- source logging utility widely used by enterprise applications and cloud services. Many counties have already started addressing this exposure, but in case you have not heard about it, here are six key points along with remediation guidance on addressing the situation for you to share with your IT departments or support.

Situation

Remediation

The Cyber Security and Infrastructure Security Agency (DHS-CISA) has been hosting various calls as well as providing online guidance to help identify and remediate this exposure. The CISA has compiled a great set of resources to assist (located at Apache Log4j Vulnerability Guidance | CISA ). Further, the Multi-State Information Sharing and Analysis Center (MS-ISAC) has developed a guiding playbook located at https://www.cisecurity.org/log4j-zero-day-vulnerability-response/. The playbook starts with having the County IT answer the question “Is my county application impacted by this vulnerability”? The playbook then contains additional steps that will help you answer that question and respond appropriately. If you determine that your county is impacted, then it is imperative that vendor patches are applied immediately followed by testing. In some cases that may involve reaching out to a third-party provider who controls or owns the application or platform you are using. The playbook contains a very helpful flowchart (see below)

Image of Log4jImage.JPG

In closing, you will want to make sure that your end user security is in place and working properly. This includes having monitoring tools in place that will alert your IT for suspicious or unusual activity.

Resources 

For more information and guidance, here is a summary of valuable of resources

For additional information or assistance, you can reach out to Rita Reynolds, NACo CIO at rreynolds@naco.org.

Attachments

Related News

2094689803
County News

Podcast: The CIO Reserves

Greenbrier County, W.Va. Commissioner Tammy Tincher, Cook County, Ill. CIO Tom Lynch and NACo CIO Rita Reynolds discuss the pilot CIO Reserves program, which offers IT experts to help rural counties assess their technology and cybersecurity needs.

Image of edit_GettyImages-832282452_cyber card resized.jpg
Advocacy

Multi-State Information Sharing and Analysis Center (MS-ISAC) loses federal funding

On March 11, the Cybersecurity and Infrastructure Security Agency (CISA) announced a $10 million cut in funding for the Multi-State Information Sharing and Analysis Center (MS-ISAC), which provides critical local assistance for cybersecurity threat detection and analysis resources and support.

Fred Humphries (right), corporate vice president of U.S. Government Affairs for Microsoft, describes how a novice county should approach its introduction to artificial intelligence during the March 3 General Session at NACo’s Legislative Conference. Travis County, Texas Judge Andy is to the left. Photo by Denny Henry
County News

Risk mitigation, education top counties’ AI prep goals

Members of NACo’s Artificial Intelligence Exploratory Committee spent a year considering the capabilities, opportunities, threats and best practices that the rapidly developing technology sector poses for county governments.