Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity NewsGovernment: Federal, State and Local

7 tips to combat government data breach risks

By Bal Heroor
government-building.jpg

Image via Unsplash

March 23, 2023

In the last four years, the average number of government data records compromised per breach increased by more than 400%. This upward trend demonstrates how the impact of any single attack is growing, and it reflects a grim reality in the cyber world — cybercrime is transitioning from targets of opportunity to focused targets of choice. The shift is bad news for government agencies.

For cybercriminals and hacker groups, government institutions are often lucrative victims, which means they’re also larger targets. More than 822 government organizations suffered from data breach incidents in the last eight years; a total of 174 million records were leaked, with a total financial impact of $26 billion.

Government data breaches can have severe consequences for both individuals and society as a whole. If hackers gain access to an agency with taxpayer information, such as the IRS, social security numbers and financial information can be stolen and used for identity theft. In addition to the financial risks, government data breaches can compromise national security by exposing sensitive information about government operations and infrastructure. 

To counteract cybercrime and its associated risks, government institutions must identify vulnerabilities in their networks and understand how any previous attacks occurred. But bureaucratic hurdles across and within a government entity mean that technological processes, including investments and changes toward cybersecurity improvements, could be slow, budget-limited and prone to human errors due to inadequate cybersecurity awareness and expertise in-house.

State-sponsored cybercriminals take advantage of these limitations as they leverage sophisticated attack vectors and exploit technology vulnerabilities. Considering the scale of operations across government entities, it may take time to employ transformative measures to fight against increasingly sophisticated cyberattacks.

Reducing and mitigating risk

To combat evolving attack methods, governments can take the following steps:

  1. Implement robust security measures to limit access to sensitive information, such as encryption and multi-factor authentication.
  2. Regularly conduct security audits and vulnerability assessments to identify and address potential weaknesses in government systems.
  3. Develop incident response plans to quickly and effectively respond to data breaches.
  4. Increase awareness and education among government employees and contractors about the risks of data breaches and the importance of proper data handling and security protocols.
  5. Establish laws and regulations to govern the handling of sensitive data and increase the accountability of organizations, including government agencies and partners that collect and store it.
  6. Encourage the reporting of suspected data breaches and provide robust support and protection for whistle-blowers.
  7. Develop a network of public-private partnerships to share intelligence and best practices for protecting against data breaches.

Overall, government agencies need to adopt a more proactive stance in protecting sensitive information, rather than just reacting to data breaches after they occur. This requires strong technical security measures, ongoing awareness and education, and a cohesive security culture within and across government organizations.

Modeling potential threats

Government entities can also reduce the risk of cybercrime and attacks by studying the STRIDE principles, an acronym used to understand and classify different attack methods and threats. It stands for:

  • Spoofing: impersonating another user or system to gain unauthorized access
  • Tampering: modifying or altering system configurations without authorization
  • Repudiation: denying that an action took place or denying responsibility for an action
  • Information disclosure: unauthorized disclosure of sensitive information
  • Denial of service: disrupting the availability of a service or system
  • Elevation of privilege: gaining unauthorized access to higher-level system privileges

STRIDE is typically used as a framework to identify and evaluate potential security risks during the threat modeling process, a process by which potential threats are identified and cataloged. Breaking potential threats into these categories allows security professionals to systematically assess and address each type of threat and prioritize the most critical risks.

Though STRIDE is a prevalent and effective methodology, several others are available, including PASTA, VAST, Trike, OCTAVE and NIST. Some are more appropriate for IT disciplines or have different focuses, such as applications instead of networks. If you are a federal government agency, consider focusing more on NIST and FedRAMP standards. However, no threat modeling technique is perfectly tailored to a specific use. You should choose the one that most closely aligns with your goals and infrastructure. 

Going forward, remember that your threat model is a living document that must be constantly reviewed and updated. After a system-wide threat model has been performed, it can be valuable to complete mini-threat models as a secure engineering design requirement.

Lastly, remember that security threats are constantly evolving, and the most frequent threat vectors tend to exploit the human element in some shape — in fact, according to IBM research, the human element is a significant contributing factor to 95 percent of all successful cyberattack incidents. 

Government organizations should thereby focus on training for adopting security best practices such as maintaining strong and frequently updated passwords, not clicking unsolicited links or downloading email attachments, and avoiding the practice of Shadow IT, when users access certain systems and applications without explicit department approval.

Overall, government agencies will continue to operate with a target on their back, but the risk of an attack can be mitigated with better preparation and a more proactive approach.

KEYWORDS: cyberattack data breach government cyber security mitigating risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bal heroor   ceo at mactores

Bal Heroor is CEO and Principal at Mactores.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Health agencies are gathering data to combat COVID-19: Here’s why that might be a problem and what to do about it

    See More
  • cyber-incident-freepik

    5 cybersecurity threats for businesses in 2021—and 3 tips to combat them

    See More
  • cyber-data-freepik1170x658x82.jpg

    7 steps to combat cybersecurity threats in times of instability

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing