recommended reading

Potential Ripples of Stretched Cyber Support During Shutdown

With electronic infrastructure still up and running despite the government shutdown, the lack of staff support in information security shops is likely affecting the government’s ability to respond to cyber threats and attacks and creating potential ripple effects for cybersecurity going forward.

“What I would expect is that, by and large, just like the other services, information security is vastly undersupported, and that means that the exceptional circumstances are a problem,” said Tim Erlin, director of IT security and risk strategy at security software firm Tripwire. “When there’s an alarm or alert, the number of people available to investigate and deal with the consequences has been drastically reduced. It’s not that nobody will see the alarm; it’s that the response will be limited.”

The shutdown situation also poses threats similar to those on holidays, weekends and late nights when IT staff are operating with skeleton crews, said Lamar Bailey, Tripwire’s director of security research and development. Hostile nation states may look to exploit the shutdown as much as possible while federal agencies are distracted, he said.

“If a zero day came out today, it would be hard for government to respond,” Bailey said. “And next week, if the [shutdown] is still going on, there’s going to be a skeleton crew who can start rolling out the patches.”

There also is the ripple effect that having federal employees and contractors away from their jobs will mean that they will have a backlog of work when they return in order to return systems to a stable state. “This creates a backlog and distracts people from securing the systems,” Erlin said.

Another area of concern is that while many furloughed federal workers have shut down their desks and turned in their phones, many of them have taken their laptops home with them. “If this lasts for any amount of time and you’re not using the laptop for work, there’s a chance for the laptop to go missing,” Bailey said. “That data leakage opportunity exists as this goes longer.”

It’s also questionable whether the system to report a missing piece of hardware is considered an essential service, Erlin added. “We may find that data that’s compromised doesn’t actually surface until post-shutdown when someone actually manages to read that report that a laptop was stolen,” he said. “That’s an example of an essential service being under-supported rather than nonexistent.” 


Get the Nextgov iPhone app to keep up with government technology news.

Threatwatch Alert

Software vulnerability

Malware Has a New Hiding Place: Subtitles

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.