Visualize Your Organizational Data Flow
Data mapping and network diagrams can identify data risk, showing what and how much data is collected and how it is used, stored and shared. A zero-trust approach calls for least privilege access control.
- Identify data sources. List every device, application and system that stores or processes data (e.g., Social Security numbers and personnel, tax and voter records).
- Classify data types. Categorize data as public, confidential or sensitive.
- Analyze data sharing. Map how data moves internally and externally.
- Review user access. Assess permissions and access to sensitive data.
- Apply controls. Implement privileged access management such as identity and access management and multifactor authentication.
Evaluate Existing Cybersecurity Measures
In addition to reviewing network security (e.g., firewall configurations, intrusion detection/prevention), endpoint security (e.g., anti-virus/malware protection) and data encryption practices, vulnerability and threat assessments can help pinpoint and remediate potential weaknesses.
- Discover vulnerabilities. Scan systems periodically for known vulnerabilities.
- Employ patch management. Apply patches and software updates in a timely manner.
- Consider local threats. Identify insider threats and social engineering tactics specific to the town’s environment.
- Evaluate third-party risk. Conduct due diligence on vendors with access to confidential data that may interact with networks and systems (e.g., credit card processing and payroll services).
DIVE DEEPER: Air-tight incident response is crucial to cyber resilience.
Assess Data Lifecycle Management Practices
Data retention and deletion best practices can help reduce the attack surface. Sensitivity and functional need should inform retention periods, taking into consideration legal and operational requirements and historical value.
Automated data management and protection tools can help rapidly back up data and automatically delete it once it reaches the end of its retention period. The most effective tools help ensure fast, reliable restores. Backups themselves should also be protected from malicious data encryption, modification or deletion, otherwise no reliable copy may exist from which to recover.
Consider Cyber Insurance Options
According to Public Technology Institute Executive Director Alan R. Shark, cyber insurers initially based insurance premium prices and coverage on guesswork about an emerging space. However, high payouts over time led some insurers to pull the plug on offering cyber coverage. Others now require more stringent security standards yet provide less coverage, sometimes at unaffordable costs.
While small towns can take steps to get properly insured, alternatives exist to traditional, private-market cyber insurance. Self-insuring through security bonds or other reserves is one option. Another is lower-cost cyber risk pools, consortiums of local governments where members have the added benefit of cybersecurity support.
Click the banner below to sign up for the StateTech newsletter for weekly updates.