Close

See How Your Peers Are Moving Forward in the Cloud

New research from CDW can help you build on your success and take the next step.

Feb 04 2025
Security

Removing Technical Debt Is Crucial to Cybersecurity and Incident Response Plans

Technical debt is a barrier to timely cyberthreat detection and response. Strategies such as hyperconvergence can reduce vulnerabilities and improve visibility.

Technical debt continues to burden state and local government agencies, especially in the areas of HR, health services and corrections, according to the National Association of State Chief Information Officers.

Technical debt refers to the costs associated with needing to upgrade aging or defunct technologies and the financial toll of maintaining older IT assets. For state and local governments, technical debt often accumulates over time as a result of budget or personnel constraints.

While eliminating technical debt is challenging, it’s becoming increasingly important in the public sector, and not just because citizens are starting to expect consumerlike experiences during their state and local interactions. Technical debt can also result in cybersecurity weaknesses that inhibit rapid threat detection and response, ultimately leaving agencies at greater risk of cyberattacks.

Click the banner for more details on how infrastructure modernization improves agility and efficiency.

 

Technical Debt Limits Visibility Into Vulnerabilities

Legacy systems, and the IT teams that manage them, tend to be siloed, which makes incident response difficult. Organizations with limited visibility across an agency or department may have trouble discerning where a problem originated. That places an emphasis on troubleshooting, which all too often leads to finger-pointing, especially in situations where IT resources are being shared among agencies. The result is that mitigating threats can take that much longer.

“As threats evolve, technical debt becomes a roadblock,” says Jeffrey Olson, director of SD-WAN product and technical marketing at Aruba, a Hewlett Packard Enterprise company. “Security protocols and standards have advanced to address common threats, but if you have older technology, you’re at risk until you can upgrade your devices.”

Upgrades can prove challenging, however. Without a high-level view of what’s been deployed where, it’s difficult to manually patch every single laptop, device or network endpoint, Olson adds. Unfortunately, this vicious cycle leaves vulnerabilities in place.

READ MORE: Why is a good cyber resilience strategy essential to business success?

Reducing Technical Debt Needs To Be a Public-Sector Priority

The first step to reducing technical debt is to act now, Olson says. “Sweating it out” for another two or three years will only make it worse, as change in the public sector takes time. Waiting also stymies innovation, as state and local entities aren’t well positioned to leverage advanced technologies such as artificial intelligence.

Agencies should start with a deep-dive gap analysis that identifies the legacy technology in place and the limitations it presents. Scott Ragsdale, senior director of U.S. healthcare sales at Nutanix, recommends focusing on pain points that lead to complex workflows that don’t align with security or operational best practices.

The next step is prioritization, as not everything can be modernized overnight. Olson likens the process to triage. Agencies need to determine high-impact and high-risk systems, addressing the most critical issues first. 

“It needs to be a practical approach of enhancing what you have and putting layers of security in place,” Olson says.

EXPLORE: Integrate cybersecurity and asset management to strengthen security.

With Hyperconvergence Comes Security and Insight

Ragsdale says it’s common for organizations to reduce technical debt by combining storage, server and networking infrastructure and managing it through a single software layer. 

The resulting hyperconvergence brings three immediate security benefits.

  • Modern hardware is inherently more secure, whether that means the latest laptops or cloud-native servers. So are operating systems. “There are no hidden back doors,” Olson says. Automated security updates are much easier to manage than manual installs, as well.
  • Converged infrastructure requires less hardware in fewer locations, which vastly enhances overall observability. There are fewer attack vectors to manage, and fewer point solutions are needed to monitor them. For IT teams, Ragsdale says, “There’s one user experience, and one support number to call. The time to resolution is quicker.”
  • Running a converged hardware platform improves application performance. This cuts down on work-arounds that can compromise security, such as sharing passwords instead of waiting for new logins to start up.

Infrastructure convergence also makes it possible to create a data lake for managed detection and response, especially at the network level, Olson says. That enables behavioral analysis of devices, which can be applied to policies for managing devices and to detect anomalies.

For instance, there’s a baseline for where a connected device should be located, how often it transmits data and how much data it shares. If that baseline changes — or if, say, the device requests access to a security camera — IT teams can receive an alert of suspicious behavior and take the device offline before an attacker can move laterally through the network.

“You need modern infrastructure, with security built in at the network level, to take advantage of these powerful capabilities,” Olson says.

iStock/Getty Images Plus