“Bad actors recognize that people are the most fruitful area to attack and target,” says Ryan Witt, vice president of industry solutions for Proofpoint. “And they aren’t just going after tax information; they also focus on people that they believe can yield a longer-term result.”
In other words, social engineering often begins in one department with the goal of infiltrating another, either to exfiltrate data or deliver a payload.
“Departments get attacked that you wouldn't normally associate with a threat actor focus,” Witt says. “We see attacks in the cafeteria function of some agencies, which isn’t an obvious target, but we don't always know why they’re attacking.”
End users’ ability to spot email scams early can save a lot of trouble later, Witt says.
2. Patching Completion and Time-to-Patch Metrics
Exploiting unpatched vulnerabilities is a leading cause of ransomware, and cyberattacks more broadly, according to experts.
“Whether it’s host-based or network-based, 76% of intrusions can be attributed to one of 10 common vulnerabilities,” Christopher Fielder, field CTO for Arctic Wolf, tells StateTech, citing in-house security research.
State and local IT leaders concur and have taken different approaches to tracking and quantifying patching.
“Metrics we look at continually include whether systems are up to date on their OS, and where there are other patching opportunities, depending on what software and applications they're running on those systems,” Coverdale says. “We ensure that our patching program is 100%.”
Time to patch is as important as patching completion, especially as new exploits are announced.
“One of Virginia’s key performance indicators is patching critical and high server vulnerabilities within 30 days of discovery,” Watson says.
Achieving 100% patching isn’t always possible in environments with legacy IT systems. In those cases, Fielder emphasizes the importance of being aware of those chinks in the armor and compensating for them.
“Keeping a list of currently unpatched systems in your environment or out-of-date patches is crucial for knowing how at risk you are and managing that risk.”
LEARN MORE: Patch management protects vital infrastructure and services.
3. Endpoint Protection, Firewall and Email Security Metrics
Analyzing firewall and endpoint protection data is valuable for identifying the most prevalent threats and making a case for more funding to defend against them.
“I'll take those metrics, analyze them and show leadership what people are trying to do to get into our environment,” Coverdale says.
Likewise, Watson flagged firewall data as a crucial indicator for Virginia’s cybersecurity efforts.
“We are continuously measuring and analyzing attack data throughout the environment in everything from our endpoint detection tools to our network firewalls,” he says.
Coverdale also closely monitors email security metrics obtained through Proofpoint.
“We've deployed tools that minimize what gets into the hands of our employees, and we also track those,” Coverdale says. “We tweak them as much as we can. I'd rather have more false alarms with email security than fewer false alarms because I want to be tight on my email hygiene.”