recommended reading

Government Employees Cause Nearly 60% of Public Sector Cyber Incidents

Sergey Nivens/

About 58 percent of cyber incidents reported in the public sector were caused by government employees, according to an annual data breach report compiled by Verizon. The findings -- stripped of identifying information -- do not mention ex-contractor Edward Snowden's mammoth leak of national secrets. 

Even if Snowden's leaks had been included in the tally of results attributed to insider threats, they wouldn't have made much of a dent. 

"If that were recorded in here, that would be a single event," said Jay Jacobs, a Verizon senior analyst and co-author of the report. 

Most (34 percent) of the insider incidents in the global public sector during the past three years were miscellaneous errors such as emailing documents to the wrong person. Unapproved or malicious use of data by public servants accounted for 24 percent of reported incidents.

Surprisingly, cyberspying and intrusions via security holes in websites, known to be big problems in government, represented less than 1 percent of the situations reported.  

The off-kilter numbers in government reflect mandatory reporting requirements for mundane incidents, Jacobs said. Small data leaks that happen every day overshadow frequent, but not daily, hacks.

By contrast, cyber espionage accounted for 30 percent and 40 percent of incidents in the manufacturing and mining industries, respectively. And 41 percent of the incidents reported in the information sector involved break-ins through website weaknesses. Miscellaneous errors represented only 1 percent of reports in that industry.

For the government sector, "I think that the raw numbers are actually quite high for things like Web-based attacks and espionage as well," Jacobs said. "But it’s masked because of all of this other data.”

"A lot of that is misdelivery -- which is either attaching the wrong thing to an email or sending the right email to the wrong people," he added. "Or another huge problem is when the mailing machine would get off by one [person] and so it was putting an address on an envelope with somebody else’s personal information inside the envelope."

The percentages in the Verizon study cannot be compared between sectors because they represent the proportion of incidents within each sector. 

Based on the raw data, cyberspying in government is comparable to cyberspying in other industries, Jacobs said. "It's just that in other industries we don’t have that mandatory reporting, so we don’t see that level of employee error. We don’t see the misuse," he added.  The raw numbers were not disclosed in the study. 

More than 50 organizations worldwide contributed to this year's assessment, including law enforcement agencies, government computer security incident response teams, private forensics investigators, security product vendors and public-private information sharing and analysis centers.

(Image via Sergey Nivens/

Threatwatch Alert

Network intrusion

Florida’s Concealed Carry Permit Holders Names Exposed

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.