Government workers are prime targets for social engineering attacks, according to Kaitlyn Levinson at GCN. Attackers use different tactics to target government employees in specific roles. Levinson quotes Rita Reynolds, Chief Information Officer for the National Association of Counties, as saying that customer-facing county employees might be more likely to assume that requests are legitimate, since they deal with so many people each day.
“Hackers prey upon the customer service aspect of county employees,” Reynolds said. “That desire to be prompt and successful in filling the request can oftentimes result in a county employee maybe not paying closer attention to the authenticity of the email.”
Reynolds added that county agencies should implement security best practices outlined by the Cybersecurity and Infrastructure Security Agency (CISA).
Levinson writes, “CISA advises organizations to use phishing-resistant multi-factor authentication, which goes beyond security measures such as one-time passwords and uses FIDO/WebAuthn authentication or PKI-based MFA, to close the gaps that bad actors could squeeze through.”
Arun Vishwanath, Chief Technology Officer of Avant Research Group, explained that even technical employees are vulnerable to phishing attacks. IT employees may become complacent and assume they’ll be able to recognize phishing emails.
Meredith Ward, director of policy and research for the National Association of State Chief Information Officers, told GCN that government organizations should ensure that their employees are aware of these types of attacks.
“The reality is that there is no one protection tool or technology that can prevent or respond to every cyberattack,” Ward said. “The human factor plays a large part in this discussion, and human awareness is but one tool states have to thwart cyberattacks.”
New-school security awareness training can give your organization an essential layer of defense by teaching your employees how to recognize social engineering attacks.
GCN has the story.