• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • Holes in Federal Cybersecurity

     

    Newscom

    Newscom

    Yesterday brought news that the inspector general for the Department of Homeland Security (DHS) has found gaps in DHS’s cybersecurity. Politico reports that, according to the IG:

    [T]he agency for months failed to patch its systems regularly against known cybersecurity threats or scan its networks consistently, in real time, to keep out digital malefactors.… Some at DHS even had been using an old, soon-to-be unsupported version of Microsoft Windows, according to the IG, whose conclusions are drawn from earlier studies issued throughout 2013. DHS also lagged in developing a more secure system to ensure the right employees are accessing the right data.

    Nobody should take any pleasure in this report. DHS, after all, bears primary responsibility for defending the .gov domain against cyber intrusions. The IG’s report follows close on the heels of a report from the President’s Council of Advisors on Science and Technology.

    The council—which has among its memberships luminaries such as Eric Schmidt, executive chairman of Google, and Shirley Ann Jackson, president of Rensselaer Polytechnic Institute—scathingly concluded that the federal government “rarely follows accepted best practices” for cybersecurity and that needs to “lead by example” rather than by direction.

    The council also concluded (in words we only wish we had written) that “industry-driven, but third-party-audited, continuous improvement processes are more likely to create an effective cybersecurity culture than are Government-mandated, static lists of security measures.” Yet we proceed apace with the development of a static federal cybersecurity framework under the direction of the National Institute for Standards and Technology.

    All of which should give us pause—for if the federal government cannot manage its own cybersecurity well, one wonders how well it will manage that of the private sector.

    Posted in Security [slideshow_deploy]

    Comments are closed.

    Comments are subject to approval and moderation. We remind everyone that The Heritage Foundation promotes a civil society where ideas and debate flourish. Please be respectful of each other and the subjects of any criticism. While we may not always agree on policy, we should all agree that being appropriately informed is everyone's intention visiting this site. Profanity, lewdness, personal attacks, and other forms of incivility will not be tolerated. Please keep your thoughts brief and avoid ALL CAPS. While we respect your first amendment rights, we are obligated to our readers to maintain these standards. Thanks for joining the conversation.

    Big Government Is NOT the Answer

    Your tax dollars are being spent on programs that we really don't need.

    I Agree I Disagree ×

    Get Heritage In Your Inbox — FREE!

    Heritage Foundation e-mails keep you updated on the ongoing policy battles in Washington and around the country.

    ×