The “Other” Government Shutdown Cybersecurity Risk

The “Other” Government Shutdown Cybersecurity Risk

Many furloughed employees still have access to government IT networks and systems, which makes them prime targets for criminals and nation states who are constantly seeking to steal credentials for accessing government IT systems and data.

Much has been written about the potential cybersecurity risk associated with the government shutdown. This discussion has focused largely on whether or not the agencies impacted by the shutdown have enough IT workers on staff (working without pay) to sufficiently man cybersecurity operations, and also the potential long-term damage of making it more difficult to recruit new cybersecurity talent in a time when there is a worldwide skills shortage.

Not as much attention has been paid to an entirely different cybersecurity problem brought about by the shutdown, however. And that is the risk that arises when you have 800,000 dislocated workers – either furloughed or working without pay - who may be justifiably disgruntled or under serious financial duress. Many, if not all, of these employees still have access to government IT networks and systems, which makes them prime targets for criminals and nation states who are constantly seeking to steal credentials for accessing government IT systems and data. The workers impacted by the shutdown are a particular risk for the following reasons:

  • People in difficult life circumstances are highly vulnerable targets for stealing credentials, because they can be desperate for good news, job opportunities and other “triggers” that could inspire them to fall for phishing attacks.
  • Having thousands of employees under financial duress increases the likelihood of “pay for passwords” -  a Sailpoint survey of 1,000 employees found that 20% would be willing to sell their passwords, and 44% of those respondents would do so for less than $1,000.
  • Employees will undoubtedly seek employment elsewhere over time, which means they could be working for other organizations when the shutdown ends, while still having credentials to log into U.S. government infrastructure.
  • And finally, disgruntled workers with access to systems are among the most profound cybersecurity insider threats to their employers.

The shutdown creates a potential identity management nightmare for government IT workers – they need to be able to provision and deprovision accounts en masse, manage access based on worker status, and report on any access that has occurred during the shutdown, which includes determining whether the access was for malfeasance or legitimate reasons. And, they need to do this with skeleton staffs (that is, if they have anyone at the identity helm to begin with) who may not be motivated to “burn the midnight oil” to keep things secure.

Identity management is arguably the single most important information security function today. It is the most effective way to ensure that only the right people have access to the right systems at the right time. And yet, few organizations do IAM well, because it is a strategic undertaking that organizations often underestimate or avoid altogether. As a result, most organizations have an extremely difficult time ensuring that employees have the proper privileges for system access, and it is extremely common to find open accounts for ex-employees. Symantec and the Ponemon Institute conducted a survey on this problem after the last large-scale disruption of the U.S. workforce (the 2008 financial crisis), and found that 24 percent of laid off employees had full access to their former employer’s systems days after the layoff, and one-third of those had access more than a week after the layoffs.

With the shutdown steaming toward its fifth week amid a raging job market in the private economy, there are undoubtedly many government employees seeking employment elsewhere – and some may already be de facto “ex-employees” who are willing to sacrifice their back pay for the security of a new job. This means there are almost certainly many illegitimately active accounts with access to government systems. Add to that the number of employees who have access and are becoming more disgruntled by the hour, and you have a potentially profound cybersecurity problem that may not be detected until long after the shutdown ends.

About the Author

Aubrey Turner is the director of identity and access management solutions at Optiv Security.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.