Ohio Governor Mike DeWine in 2018

Ohio Creates ‘Cyber Reserve’ To Respond to Ransomware Attacks Across State

The reserve will be comprised of volunteer cybersecurity experts who will work with the state national guard to help local governments.

After a slew of ransomware attacks hit at least three local governments and a major airport in the state, Ohio is rolling out a new program aimed at helping cities combat and respond to cybersecurity threats.

The Ohio Cyber Reserve, established through a law signed by Gov. Mike DeWine on Friday, will be comprised of computer and information security experts who have volunteered to assist local governments recover from the attacks.

Plans for the reserve include the building of five teams of 10 people each spread throughout the state, all of whom will be vetted and trained to help during cybersecurity emergencies hitting governments. Ohio officials compare it to how the Ohio National Guard is placed on active duty during a natural disaster, Nextgov reported.

“This is a persistent threat, and we have to continuously evolve our approach to protecting our critical infrastructure when it comes to cyber,” Maj. Gen. John C. Harris Jr., the Ohio Adjutant General who oversees the state’s National Guard, said during the signing of bill on Friday.

Read more: FBI Warns Businesses and Organizations of Rising “High-Impact” Ransomware Threat

The Ohio National Guard’s cyber team has previously been sent to assist with attacks that affected the city of Akron’s financial accounts. Just this year, the Cleveland airport was hit with an attack, as was the Fayette County government and the city of Riverside Heights.

“The Ohio Cyber Reserve will give us the resources to support our local governments when cyber criminal attacks put computer systems at risk and threaten the safety of Ohioans,” DeWine said in a statement, calling the program an “innovative idea” that could serve as a model for other states.

Other state governments in Texas and Colorado have deployed their national guards to respond to cyber incidents, Nextgov reported. The Ohio law will go into effect 90 days after it was signed, and allocates $100,000 in fiscal year 2020 and $550,000 for fiscal year 2021 for the adjutant general to operate the cyber reserve.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.