February 21, 2020 By Mark Stone 4 min read

2019 was a tough year for the overall cybersecurity of state and local governments and municipal institutions. If you follow security news, there were times when not a week would go by without word of how the latest municipal cyberattacks impeded or even halted day-to-day operations.

This stream of recent hacking incidents targeting government and municipal institutions is developing into a tide — libraries, courthouses, schools, hospitals and government service agencies are all susceptible to attacks. In some cases, the consequences were arguably minimal. In others, they were much more severe. Generally speaking, the severity depends on which types of data each institution holds.

Often, the best initial strategy for preventing cyberattacks is to review what happened to others and derive lessons from those accounts. How do these attacks apply to other organizations or municipalities, and what can security professionals in these places do differently to avoid such attacks?

What Kinds of Public Sector Institutions Are Being Attacked?

To see what lessons we can learn from municipal cyberattacks, I’m highlighting several recent hacking incidents here followed by a few general strategies that organizations can put in place today to improve cybersecurity.

Hospitals and Healthcare Facilities

In April 2017, the Erie County Medical Center in New York was hit with a ransomware attack. Despite hackers’ demands for $30,000, the ultimate cost to the hospital came closer to $10 million because the intrusion crippled 6,000 computers, which forced the hospital to revert to paper and old-school methods. Subsequently, the hospital estimated that they would need to upgrade their technology, bolster security awareness and harden their systems, accruing additional expenses of about $250,000 to $400,000 a month.

Late last year in Minnesota, hospital operator Alomere Health suffered a data breach that affected 49,351 individuals. In this attack, the bad actor gained access to two employee email accounts around Halloween. The potential for personal data theft was significant: Names, addresses, dates of birth, medical record numbers, health insurance information, and diagnosis and treatment details were all compromised. Some patients’ Social Security numbers and driver’s license numbers were even exposed.


Like any small municipal, educational or governmental institution, schools manage a lot of personal data and are vulnerable to attack as they typically lack robust security resources.

Between January and the start of the 2019 school year, over 500 U.S. schools were victimized by ransomware in 54 different school districts and colleges. One case in Neosho, Missouri, had hackers demanding a local school fork over $1.6 million to decrypt its systems. Another attack forced the Houston County School District to postpone the first day of classes for over 6,000 students by more than 10 days.

Cities and Municipalities

Perhaps the biggest attack in terms of publicity occurred in the summer of 2019 when the city of Baltimore went into a state of disarray as it dealt with aggressive ransomware affecting its systems. While essential services like the police, fire department and ambulances weren’t affected, airports, hospitals, utility services, ATMs and factories producing vaccines were struck. Costs resulting from the attack are estimated at over $18 million.

The city of New Orleans was also hit by another well-publicized cyberattack in December 2019. As a result of the attack, routine government functions couldn’t be handled electronically and approximately one in five city computers was compromised to the point of being unrecoverable. As of January 2020, the city had spent more than $7 million on repairs and city email systems were still not fully restored.

Reduce Risk With Security Awareness and Hygiene

In many municipal cyberattacks, a common factor is someone clicking on something they shouldn’t — in other words, phishing or social engineering attacks. Instinctively and automatically, our minds are drawn to security awareness as the solution. If employees are more aware of phishing attacks, the municipality, school or government office for which they work should be better off, right?

When I spoke with security expert Bruce Schneier at the end of 2019, he told me that security awareness only applies to your worst employee. Even if you convince 99 out of 100 people not to click on that ransomware-laden link, the one person who didn’t get the memo may represent the greatest vulnerability in your security armor.

I get his point. I don’t think any organization will ever achieve 100 percent success with their awareness program. But isn’t cybersecurity all about risk? Aren’t we in a much better position to thwart an attack if 70 percent of our employees won’t click on that link compared to 40 percent? After I personally implemented security awareness programs at the government level — even before the days of ransomware — I recognized that full cybersecurity compliance was unattainable, but I would have slept better at night knowing that the program we created could increase our awareness by even 30 or 40 percent.

Many of these institutions have been forced to make an investment, but other state and local government institutions have a chance to invest in cybersecurity today, before they are attacked. They may not have the same resources as private enterprises, but municipal organizations should do all they can to reprioritize the budget so cybersecurity prevention moves toward the top of the list.

Regardless of budget, all institutions must also realize that security strategy is only as strong as your security hygiene, and the basics often don’t cost much. Data backups, implementing NIST’s Cybersecurity Framework and red team-blue team exercises, applied together, can work wonders for organizations willing to put forth a solid effort.

More from Data Protection

3 Strategies to overcome data security challenges in 2024

3 min read - There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030.This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card information, addresses, phone numbers and Social Security numbers.In addition to the ever-present cybersecurity threats, data security teams must consider the growing list of data compliance laws…

How data residency impacts security and compliance

3 min read - Every piece of your organization’s data is stored in a physical location. Even data stored in a cloud environment lives in a physical location on the virtual server. However, the data may not be in the location you expect, especially if your company uses multiple cloud providers. The data you are trying to protect may be stored literally across the world from where you sit right now or even in multiple locations at the same time. And if you don’t…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today