20 key swing states have non-.gov domains and can easily be spoofed to spread dis-information according to Steve Grobman, CTO of McAfee.
Mike Bittner, Digital Security & Operations Manager at The Media Trust:
“Government websites in general are popular targets of malicious campaigns because they make bad actors’ jobs easy. They are too often poorly secured; third parties/contractors that support them often have even poorer security measures; and the people and organizations that use them enter a lot of sensitive information. The root cause of these sites’ insecurity are increasingly strapped budgets that prevent government organizations from replacing legacy systems and machines with new ones or making needed updates. When it comes to budget cuts, county governments feel the pinch the most. Given the extensive use of these sites and the sensitive information they receive, county governments should thoroughly vet their third parties, audit third parties’ security measures, continuously scan their sites in real-time, and work closely with their third parties on identifying and foiling any unauthorized activities.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.