Situation Room: A cyber attack attributed to an Iran-linked group underlines system security needs.
Resource Library: First Things First: Cyber Security Fast Wins outlines free and low-cost options for high-impact steps to improve your cybersecurity posture overnight.
Planning Desk: Provide safer services with these fundamental security practices.
Devastating Attack Highlights Need for Cyber Defense - and Fallbacks
Election offices should take note of a recent cyber attack last week on Stryker, a Michigan medical technology company. The attack is believed to have originated in Iran. This serves as a reminder that geopolitical conflicts can put digital targets, including election offices, in the crosshairs.
Why Election Officials Should Be Concerned
While this attack targeted a medical firm, Iranian-linked groups are believed to have been behind a number of cyber attacks on election offices, including...READ MORE HERE.
The Situation Room focuses on real security incidents and threats in the news relevant to election security. To review previous issues, see thenewsletter archive.
First Things First: Cybersecurity Fast Wins
First Things First: Cybersecurity Fast Winsis a guide for local election officials and small teams, providing a starting point to quickly boost security posture. Easy to implement and proven to significantly reduce risk, these five low-cost, high-impact practices can be completed in under a week. The guidance also suggests a cost range and trusted products to help you.
Use a password manager. A dedicated password manager keeps your logins in a protected vault with its own lock. This makes it easier to assign a complex, unique password to every account because you don’t have to remember them!
Lock your screen. A simple keystroke can prevent unauthorized access, protect sensitive information from prying eyes, and reinforce a culture of responsibility.
Refresh phishing awareness. A 10-minute refresher video or quiz keeps everyone alert to evolving scams and reinforces reporting habits.
Update software. Regular patching closes security gaps, improves performance, and protects the entire office network. Enable automatic updates to rapidly defend against hackers and constantly work to find new vulnerabilities.
Enable Multi-Factor Authentication. Adding a second verification step blocks nearly all account-compromise attempts, safeguarding both office and personal accounts.
Cybersecurity doesn’t have to be complicated; smart moves start with simple habits. The cyber hygiene practices noted above increase everyday security, including for your network. The Planning Desk below offers more technical steps that can deliver even greater risk reduction.
The Resource Library section of the newsletter spotlights election security resources. All highlighted resources are available online in the Resource Library.
Week E-33: Strengthen your network security!
Secure networks mean safer services and greater trust for everyone who relies on you. Improving your network security doesn’t have to be expensive or complicated, though some of it is technical, and not all of it will be plain language. That’s exactly why joining forces with your IT support early makes a difference. They can help translate, prioritize, and ensure your security expectations are actually met. Together, you can protect the data your community depends on.
Consider starting with these steps:
Step 1: Begin with the non-negotiables.
Inventory your assets, such as all devices and software, to understand what needs protection. You cannot protect what you don’t know you have. Taking inventory will assist in prioritizing the systems and data that are the most important to secure.
Backup data regularly. Perform regular, automatic, and offline backups that can be obtained and restored on another server or network if you lose access to your systems. This is crucial; never underestimate the relief that multiple backup types can provide.
Test restoring backup data. A backup that hasn’t been tested is just a theory. Regularly verify that you can restore your files.
Step 2: Eliminate what you don’t need.
Remove unused accounts and devices from your network. Expired or inactive accounts can be exploited by attackers. Regularly audit and remove unneeded accounts, devices, and permissions. See guidance on managing inactive accounts from theNIST cybersecurity framework.
Disable unnecessary services. Turn off unused features and services in systems, workstations, and devices to reduce potential entry points for hackers. Work with your IT support on this to understand dependencies and ensure that disabling a service doesn’t break critical applications. Note that major software updates can quietly re-enable services, so check back periodically.
Step 3: Harden the perimeter.
Use a .gov domain for your website and/or email accounts. A .gov domain reduces impersonation risk and comes with built‑in security protections like anti‑spoofing and stronger email authentication. It also provides confidence to those searching for your website by ensuring they are on an official site.Get your free .gov domain from CISA.
Use firewalls and Virtual Private Networks (VPNs). Utilize robust and built-in operating system firewalls to block external threats. Consider implementing a VPN for remote work to establish a secure, encrypted tunnel between your remote device and your organization’s network. That will protect sensitive data from cyber threats and ensure safe access to internal systems.
Block dangerous websites automatically – Enroll in Malicious Domain Blocking & Reporting (MDBR). MDBR automatically blocks known malicious websites before staff can access them. If you are an MS-ISAC member, you may want to go to theCIS websitefor details.
We’re here to help. If you don’t have an IT administrator or you’d like additional insight, contact our expertsat the Election Security Exchange for help understanding this general network security guidance.
The Planning Desk is a running timeline of key election security tasks. You can find prior editions in thenewsletter archive.
Want to get daily updates on election news? Subscribe to electionline.