Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementAccess ManagementGovernment: Federal, State and Local

Safeguarding municipalities against rising cyber threats

By Amanda Berlin
Busy city intersection with many fast moving cars

Image via Unsplash

February 22, 2024

In an era marked by the escalating frequency of cyberattacks across industries, the public sector emerges as a particularly enticing target for cybercriminals due to its historical vulnerabilities. This susceptibility poses potentially costly consequences, making it imperative for municipalities to bolster their defenses.

IBM underscores the severity of the issue by reporting that each cybersecurity incident in the public sector carries an average toll of $2.6 million. Additionally, insights from the 2023 Verizon Data Breach Investigations Report (DBIR) reveal that Public Administration led in both the total number of incidents and breaches last year.

Essential city services, including water supply, emergency services, public transportation and waste management, depend heavily on interconnected digital systems that house high volumes of sensitive information. The looming threat of cyberattacks, particularly in the form of ransomware, has the potential to disrupt these vital services, causing inconvenience and posing safety issues for residents.

Key measures for defending municipalities against cyber threats 

The stakes are undeniably high when it comes to protecting municipalities' data. However, amidst this always-changing landscape, there is room for optimism. With strategic planning, monitoring, and the implementation of necessary precautions, municipalities can avoid the potentially devastating repercussions of cyberattacks and fortify themselves against data breaches.

Strengthen asset management

Establishing robust asset management processes, policies and technologies is pivotal in addressing information security incidents and preventing organizational damage. 

Embracing principles such as classification, organization, automation and continuous monitoring facilitates the maintenance of a current and accurate inventory. Municipalities can enhance short-term troubleshooting and make informed decisions for long-term planning and procurement by consolidating information about endpoints and infrastructure devices. Successful asset management is not a one-time endeavor but an ongoing cycle of improvement and adaptation.

Effective management and monitoring of access

Identity and Access Management (IAM) is crucial because it addresses notable weak spots in many organizations, account compromise due to publicly available breach data as well as the potential for insider threats. In fact, Verizon indicates that internal actors contribute to 30% of reported breaches in this sector. 

For municipalities, having this framework of policies, technologies and processes ensures that the right individuals have the appropriate access to resources within an organization's information technology (IT) environment. IAM best practices include:

  1. Least privilege: This concept involves providing users access only to the necessary items and nothing beyond that. In the context of zero trust — which is a security framework challenging traditional models relying on network trust and perimeter defenses — adopting the least privilege concept is a fundamental aspect of the overall security strategy. The least privilege concept involves customizing access permissions for each specific instance by incorporating contextual factors and risk calculations. Instead of granting broad or unnecessary access, this approach ensures that users and entities are given the minimum level of access required for their specific tasks. By considering factors such as user identity, device status and the sensitivity of the accessed resource, the least privilege concept enhances security, minimizing the potential impact of security breaches and unauthorized access. 
  2. Centralization: Streamlining access management and centralized authentication, especially with Single Sign-On (SSO) implementation, alleviates worries surrounding high-privilege users. This is achieved by guaranteeing a thorough log-off process, thereby reducing the potential for overlooking access points. With SSO, users can utilize a single access token across multiple systems, enhancing security by minimizing the need for multiple password inputs. SSO allows users to utilize a single access token across multiple systems, bolstering security measures by reducing the necessity for multiple password inputs.
  3. Removal of unwanted assets: Initiating robust security practices early in the process is crucial. This includes routine removal of unused accounts, timely software and hardware upgrades and efficient vendor management. The adoption of such practices is essential as it streamlines the defense and security workload, minimizing the presence of unnecessary items. Particularly in municipal contexts where dependence on vendors is prevalent, comprehensive vendor management becomes a critical component of cybersecurity. Conducting thorough due diligence in assessing vendors' cybersecurity practices is imperative to identify and mitigate potential risks, ensuring the selection of vendors with established and robust security measures.
  4. Password and MFA implementation: In the present digital landscape, depending solely on passwords for security proves inadequate. The proliferation of password-cracking tools, frequent data breaches and the complexity of managing multiple credentials underscore the imperative for supplementary security measures. Multi-factor authentication (MFA) addresses the limitations of passwords, providing a vital layer of defense against unauthorized access. Recognizing the inherent drawbacks of passwords and embracing MFA is a crucial component of a comprehensive security strategy considering evolving cyber threats. Despite the growing availability of MFA across various services, its comprehensive implementation often falls short in enterprise environments. Many companies adopt MFA reactively, typically in the aftermath of a significant breach. 

Tabletop exercises and incident response (IR) playbooks

Conducting tabletop exercises involves key stakeholders and staff in a low-stress environment, systematically walking through scenarios of disasters, malfunctions, attacks or other emergencies. The goal is to identify weaknesses in current processes before an actual incident occurs.

During tabletop exercises:

  • A moderator or facilitator delivers and navigates the scenario, answering "what if" questions, leading discussions and controlling the exercise's pace.
  • A designated member evaluates the overall performance, creates an after-action report and ensures accuracy by following a runbook.

Participants representing various departments (such as finance, HR, legal, security, management and marketing) actively engage in the exercise, challenging assumptions and contributing to the conversation. 

The tabletop exercise should include:

  • A handout with the scenario and space for notes.
  • Current runbooks detailing how security situations are handled.
  • Policy and procedure manuals.
  • A list of tools and external services.

Post-exercise actions and questions include evaluating what went well, identifying potential improvements, assessing missing services or processes and documenting issues for corrective action.

KEYWORDS: cyber threats multi-factor authentication municipal security tabletop exercises zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Amanda berlin headshot

Amanda Berlin is Lead Incident Detection Engineer at Blumira. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Hand holds phone using social media

    How to protect against rising social media threats

    See More
  • Elementary school supplies

    How Schools Can Use Strategic Communication to Tackle Rising Cyber Threats

    See More
  • Ukraine

    Protecting against cyber threats during the Russia-Ukraine conflict

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing