Capitol Hill at sunset

Industry Groups Push For More Cybersecurity Funding In Future COVID-19 Stimulus Legislation

With high numbers of ransomware attacks and increased threats due to teleworking, advocacy groups want Congress to prioritize cybersecurity funds to local and state governments.

Major technology advocacy groups, including The Cyber Threat Alliance, The Cybersecurity Coalition and The Global Cyber Alliance, have partnered up to push Congress to allocate cybersecurity funding for states and local governments in the next COVID-19 stimulus package.

Representing tech giants like Microsoft, Amazon, Adobe, McAfee and several cybersecurity companies, the organizations sent a letter to House Speaker Nancy Pelosi and House Minority Leader Kevin McCarthy on Monday requesting that cybersecurity be a priority in future stimulus bills, The Hill reported.

The advocacy groups, which also included BSA, the Information Technology Industry Council and more, cited increased cybersecurity threats as a result of the COVID-19 pandemic. Those threats come from a wider attack landscape with teleworking and increased ransomware attacks on local governments.

“The rise in malicious cyberattacks targeting State and local entities, combined with the chronic lack of workforce, patchwork legacy systems, under-resourced cybersecurity and IT services, and uneven federal assistance creates a greater risk of system failures that interrupts services on which State and local populations depend,” the groups wrote.

Cybersecurity and IT workers themselves are facing several obstacles despite higher demand for their services, including the proliferation of work-from-home policies and the additional vulnerabilities that come with using IoT devices on different wireless networks.

“Their limited resources risk being overwhelmed by the substantial increase in demand for online services, and the sizable increase in malicious cyber activities as reported by both State and local officials, as well as private sector threat intelligence organizations,” the letter reads.

Other issues include the increase in use of “unvetted personal devices” to access government networks and an increase in the costs associated with providing monitoring of those devices along with IT help.

Industry advocates are also concerned that states and local governments will be unprepared to deal with ransomware and other malware attacks on hospital systems, which could cost lives if networks go down and doctors cannot access patient information or coordinate patient care technologically.

Cybersecurity firms have reported higher rates of coronavirus-related phishing attacks on organizations large and small over the past few months, making the potential for a successful cyber attack on public health systems more likely.

“Healthcare facilities like these, which make up nearly 20% of the United States’ community hospitals, have been targeted by malicious cyber attacks at a time when disrupted service is intolerable,” the letter reads.

In turn, the industry organizations would like to see more prioritization of cybersecurity funding in upcoming coronavirus relief legislation. The previous $2 trillion COVID-19 stimulus bill included some funding for IT modernization and $9.1 million for CISA, the Department of Homeland Security’s cyber agency, according to The Hill.

“We urge addressing this important problem in the next available vehicle for COVID-19 response and recovery,” the groups wrote. “We firmly believe that these measures are necessary to support the vital role that State and local entities play in public health operations during this public health emergency.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities