Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Doug Matthews - Ransomware threats on political organizations

By Maria Henriquez
5 mins with Doug Matthews
November 5, 2020

While the first thing that may come to mind is attacks on voter booths and polling data, hackers were expected to hit more vulnerable targets first, such as community-based organizations and systems supporting political campaigns.

These networks are rarely designed to withstand the ransomware threats much larger, established political bodies face, and hackers know it.

Here, we talk to Doug Matthews, Vice President of Product Management for Veritas, about the conditions impacting data protection during the election period.

 

Security magazine: Why were hackers expected to hit more vulnerable targets first, such as community-based organizations and systems supporting political campaigns?

Matthews: Attacking a political organization before the election and freezing data with ransomware is often low-hanging fruit for hackers and hacktivists looking to make money – or trouble.  Tools that help canvass voters, deliver campaign information, or influence voting rarely enjoy the same level of data protection – making them a top hacking opportunity.  Organizations responsible for those systems should have acted before the election to ensure they are available when needed and that data is protected holistically – no matter where it resides.

In addition, this is the first Presidential election to take place with a significant number of people working remotely or from home. Since election-themed social content can evoke a highly emotional response and lower people’s guard against clicking suspicious links, it is prime fodder to bait unsuspecting employees into a phishing attack – putting organizations at risk of attacks too.

It’s estimated that about 95 percent of cybersecurity breaches result from human error, such as an employee clicking an email link they have no business opening. Organizations must educate employees on the newest techniques hackers use to trick users into being the weakest link in a ransomware attack.

 

Security magazine: Are these networks designed to withstand cyberattacks such as ransomware? Why or why not?

Matthews: Organizations can be as buttoned up as possible when it comes to having the right protection and security requirements, but the remote work landscape is something hackers are considering when deploying their attacks. We’ve entered the age of ‘always-on’ employees where the lines between work and personal time are increasingly blurred. This accelerated online time is a prime opportunity for hackers to exploit the weakest link in a company’s security infrastructure – the employee.

 

Security magazine: What are the current conditions impacting data protection during the election period?

Matthews: In addition to the inherent security risks associated with a remote workforce, there are a number of other considerations that are heightening awareness around a potential attack.

While Presidential elections are always global news, this election is gaining unprecedented international visibility. As a result, there is a lot more election-based content coming from international sources that may be less familiar to US audiences. While Americans may easily spot a fake link to a reliable news source like The Washington Post, can they accurately identify a fake link to The Telegraph in the UK? Hackers are already spinning up a heady mix of tantalizing content, hard-to-spot scams and malicious malware to create ideal conditions for ransomware attacks. Businesses must act to ensure their data protection policies and tools are ready to handle this heightened threat, protecting against phishing and ransomware before they compromise corporate data.

This Presidential election is also likely to be one of the most emotional votes ever – which also means it can be one of the most dangerous elections for digital security. The election process is tribal and divisive, and playing out in real time across social media. Hackers are well aware of the opportunity this creates – building the ‘perfect storm’ for social engineering. Playing off voters’ emotions, hackers can easily orchestrate a successful ransomware attack – all they need to do is convince voters to click a link. It’s important for businesses and their employees to avoid letting emotions get in the way of smart digital security.

 

Security magazine: In the event of an attack, what can smaller regional governments and political organizations do to prepare and plan for recovery?

Matthews: We recommend five actions for organizations to take now to ensure their data is protected in the event of a ransomware attack:

  1. Communicate the risk of election-based hacking to all employees / staff
  2. Remind them of the organization’s security policy
  3. Ensure the personal / acceptable use policy is well understood. Be specific about how staff can use social media for personal interests such as election research and news.
  4. Push out regular updates to all remote devices – ensuring the latest security patches are in place.
  5. Assume that, no matter how good your defenses are, someone will eventually click a rogue link and the corporate network will be compromised. Ensure all information is protected through comprehensive backup – so it’s recoverable after an attack takes place.

 

Security magazine: How can the private sector support smaller regional governments in their efforts to provide a secure voting experience, during this voting period and future elections?

Matthews: No matter where you sit on the political spectrum, it’s extremely important for organizations to ensure information is always available and protected. They can engage with companies who provide holistic data protection and resiliency of applications and infrastructure to avoid any attack that might wreak havoc on the political system

Private sector companies also have expertise in knowing when hackers will attack – and the key to a successful attack is to strike at the very moment when data is needed. The target can be anything related to the campaign – whether it’s mailing lists, volunteer driving schedules, or canvassing data. All this information can be critical in the weeks running up to election – and hackers know it. That’s why organizations must have off-site, encrypted copies of information to protect against leading threats such as ransomware. And why they must be backed up by a solution that unifies data protection across the infrastructure.

KEYWORDS: cyber security election security ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 minutes with

    5 minutes with Satya Gupta: The surge of remote work and its impact on critical infrastructure organizations

    See More
  • 5 mins with

    5 minutes with Mark Kedgley – Minimizing security threats of alert fatigue

    See More
  • 5mw Dooley

    5 minutes with Doug Dooley - Full-stack application attacks

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing