recommended reading

Government Employees Cause Nearly 60% of Public Sector Cyber Incidents

Sergey Nivens/

About 58 percent of cyber incidents reported in the public sector were caused by government employees, according to an annual data breach report compiled by Verizon. The findings -- stripped of identifying information -- do not mention ex-contractor Edward Snowden's mammoth leak of national secrets. 

Even if Snowden's leaks had been included in the tally of results attributed to insider threats, they wouldn't have made much of a dent. 

"If that were recorded in here, that would be a single event," said Jay Jacobs, a Verizon senior analyst and co-author of the report. 

Most (34 percent) of the insider incidents in the global public sector during the past three years were miscellaneous errors such as emailing documents to the wrong person. Unapproved or malicious use of data by public servants accounted for 24 percent of reported incidents.

Surprisingly, cyberspying and intrusions via security holes in websites, known to be big problems in government, represented less than 1 percent of the situations reported.  

The off-kilter numbers in government reflect mandatory reporting requirements for mundane incidents, Jacobs said. Small data leaks that happen every day overshadow frequent, but not daily, hacks.

By contrast, cyber espionage accounted for 30 percent and 40 percent of incidents in the manufacturing and mining industries, respectively. And 41 percent of the incidents reported in the information sector involved break-ins through website weaknesses. Miscellaneous errors represented only 1 percent of reports in that industry.

For the government sector, "I think that the raw numbers are actually quite high for things like Web-based attacks and espionage as well," Jacobs said. "But it’s masked because of all of this other data.”

"A lot of that is misdelivery -- which is either attaching the wrong thing to an email or sending the right email to the wrong people," he added. "Or another huge problem is when the mailing machine would get off by one [person] and so it was putting an address on an envelope with somebody else’s personal information inside the envelope."

The percentages in the Verizon study cannot be compared between sectors because they represent the proportion of incidents within each sector. 

Based on the raw data, cyberspying in government is comparable to cyberspying in other industries, Jacobs said. "It's just that in other industries we don’t have that mandatory reporting, so we don’t see that level of employee error. We don’t see the misuse," he added.  The raw numbers were not disclosed in the study. 

More than 50 organizations worldwide contributed to this year's assessment, including law enforcement agencies, government computer security incident response teams, private forensics investigators, security product vendors and public-private information sharing and analysis centers.

(Image via Sergey Nivens/

Threatwatch Alert

Network intrusion / Software vulnerability

Hundreds of Thousands of Job Seekers' Information May Have Been Compromised by Hackers

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.