{"id":4909,"date":"2020-02-28T15:26:14","date_gmt":"2020-02-28T14:26:14","guid":{"rendered":"https:\/\/www.gpsj.co.uk\/?p=4909"},"modified":"2020-02-28T15:26:14","modified_gmt":"2020-02-28T14:26:14","slug":"it-complexity-insider-threats-and-an-abundance-of-privileged-users-plague-u-s-public-sector-cyber-readiness","status":"publish","type":"post","link":"https:\/\/www.gpsj.co.uk\/?p=4909","title":{"rendered":"IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness"},"content":{"rendered":"<p><span style=\"color: #808080;\"><em>Survey points to lack of cyber confidence and organisational maturity across U.S. public sector<\/em><\/span><\/p>\n<p><a href=\"http:\/\/www.solarwinds.com\/?cmp=PUB-PR-NVS-FED_FED_X_CR_X_AW_EN_PSCYBER_BOX-XSEC-20200225_X_X_X_VidNo_X-X\">SolarWinds<\/a> (NYSE:SWI), a leading provider of powerful and affordable IT management software, today announced the findings of its sixth annual U.S. <a href=\"https:\/\/www.solarwinds.com\/resources\/survey\/solarwinds-public-sector-cybersecurity-survey-report-2020?cmp=PUB-PR-NVS-FED_FED_X_CR_X_AW_EN_PSCYBER_BOX-XSEC-20200225_X_X_X_VidNo_X-X\">Public Sector Cybersecurity Survey Report<\/a>*. This year\u2019s survey includes responses from 400 IT operations and security decision makers, including 200 federal, 100 state and local, and 100 education respondents. This is the first year the survey includes state, local, and education (SLED) respondents.<\/p>\n<p>\u201cComplexity is a big theme in this year\u2019s survey,\u201d said Brandon Shopp, vice president for product strategy at SolarWinds. \u201cLed only by budget constraints, complexity of internal environments is one of the most significant high-level obstacles to maintaining or improving IT security, and respondents indicated it\u2019s keeping them from easily segmenting users and adopting a zero-trust approach. Our data shows this complexity is getting worse, especially in federal environments. SolarWinds is committed to helping technology professionals across the spectrum, no matter the organisational size or budget, to \u2018de-complicate\u2019 security and solve the problems they need to solve, every day, like we do with all our tech solutions. This survey highlights the need for vendor partners who take this kind of approach.\u201d<img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-3762\" src=\"https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075-300x200.jpg 300w, https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075-768x512.jpg 768w, https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075-1024x683.jpg 1024w, https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075-150x100.jpg 150w, https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075-400x267.jpg 400w, https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075-500x333.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><strong>2020 Key Findings<\/strong><\/p>\n<p><strong>For the fifth year in a row, careless and untrained insiders are the leading source of security threats for U.S. public sector organisations.<\/strong><\/p>\n<ul>\n<li>Fifty-two percent of total respondents cited insiders as the top threat; this number is consistent for both federal and state and local respondents.<\/li>\n<li>In the education sector, respondents pointed to the general hacking community (54%) as the top threat.<\/li>\n<\/ul>\n<p><strong>Budget constraints, followed by complexity, top the list of significant obstacles to maintaining or improving organisational IT security.\u00a0<\/strong><\/p>\n<ul>\n<li>Education respondents indicated more so than other public sector groups that budget constraints (44% in K-12, the equivalent of primary and secondary education in the U.K.) are obstacles to maintaining or improving IT security. State and local respondents indicated 27%, followed by federal respondents at 24%.<\/li>\n<li>Federal respondents indicated complexity of the internal environment (21%) is one of the most significant obstacles, surpassed only by budget constraints (24%).<\/li>\n<li>While budget constraints have declined since 2014 for the federal audience (40% in 2014; 24% in 2019), respondents also recognised the complexity of the internal environment as an obstacle that has increased (14% in 2014; 21% in 2019).<\/li>\n<\/ul>\n<p><strong>Cybersecurity maturity needs attention across U.S. public sector organisations; on average, respondents rated their agency\u2019s maturity at a 3.5 on a scale of one to five.<\/strong><\/p>\n<ul>\n<li>Respondents indicated that their capabilities are most mature in the following areas: endpoint protection (57%), continuity of operations (57%), and identity and access management (56%). However, there was not a single cybersecurity capability for which more than 57% of respondents claimed to be organisationally mature.<\/li>\n<\/ul>\n<p><strong>Less than half of U.S. public sector respondents are very confident in their team\u2019s ability to keep up with evolving threats, regardless of whether the organisation outsources its security operations or not.<\/strong><\/p>\n<ul>\n<li>Forty-seven percent of respondents who outsource at least part of their security operations to a managed service provider (MSP) (28% of total respondents), feel very confident in this ability.<\/li>\n<li>The vast majority of respondents (86%) rely on in-house staff as their primary security team. Only 41% of this pool feel very confident in their team\u2019s ability to maintain the right skills.<\/li>\n<\/ul>\n<p><strong>Most U.S. public sector organisations measure the success of their IT security teams by evaluating metrics such as the number of detected incidents (58%) or their team\u2019s ability to meet compliance goals (53%), which, as standalone metrics, may not accurately reflect an agency\u2019s risk profile or the IT team\u2019s success.<\/strong><\/p>\n<ul>\n<li>State and local respondents were also likely to consider the number of threats that were averted (56%), while education respondents focused on level of device preparedness (46%).<\/li>\n<li>Seventy-five percent of respondents indicated compliance mandates or regulations such as GDPR, HIPAA, FISMA, RMF, DISA STIGs, etc., have had a significant or moderate impact on the evolution of their organisations\u2019 IT security policies and practices.<\/li>\n<\/ul>\n<p><strong>U.S. public sector organisations struggle to segment users by risk level and manage the security threats posed by both privileged and non-privileged users.\u00a0<\/strong><\/p>\n<ul>\n<li>Sixty-one percent of respondents formally segment users by risk level; however, the segmentation process is challenging because of the growing number of systems users need access to (48%), the increased number of devices (45%), and the growing number of users (43%).<\/li>\n<li>Forty-one percent of respondents claimed to have privileged users not in IT. Privileged users have admin-level access to IT systems, and the extension of too much privilege across an organisation can lead to increased risk.<\/li>\n<li>Nearly one-third of respondents (30%) have a formal zero-trust strategy in place; another 32% are modelling their approach based on zero trust but don\u2019t have a formal strategy.<\/li>\n<\/ul>\n<p>\u201cThese results clearly demonstrate the degree to which most public sector organisations are struggling to manage cyber risk,\u201d said Tim Brown, vice president of security for SolarWinds. \u201cWhile it\u2019s heartening to see that almost two-thirds of respondents are formally segmenting users\u2014a helpful step in managing risk\u2014the data finds careless and untrained users to still be the weakest link. Additionally, we\u2019re seeing a widespread lack of organisational maturity\u2014even in technologies like endpoint protection that have been around forever. It\u2019s therefore no surprise that only four in ten respondents feel very confident their security team can keep up with the evolving threats.\u201d<\/p>\n<p><strong>Supporting Quotes<\/strong><\/p>\n<p><em>\u201cSecurity is everyone\u2019s job, but holding the team accountable is lacking. Until there are real individual accountability regimens in place, the network will remain at risk.\u201d<\/em><\/p>\n<p>&#8211; \u00a0 <em>Division Chief, Federal Civilian<\/em><\/p>\n<p><em>\u201cOur organisation operates in denial with a preference for reactionary behaviour instead of operating proactively. Government agencies tend to view IT spending as throwing money into a black hole until something occurs.\u201d<\/em><\/p>\n<p>&#8211; \u00a0 <em>Sr. IT Project Manager and Analyst, State Government<\/em><\/p>\n<p><em>\u201cEverything starts at the top. If C-level doesn&#8217;t put an emphasis on security, it puts us at risk.\u201d<\/em><\/p>\n<p>&#8211; \u00a0 <em>IT Manager, Local Government<\/em><\/p>\n<p><em>\u201cMeeting the online needs of 12,000 plus students always presents challenging security issues, but we have been able to manage without a major event so far.\u201d<\/em><\/p>\n<p>&#8211; \u00a0 <em>VP of Operations, Higher Education<\/em><\/p>\n<p><em>\u201cNot enough manpower, money, or resources. Waiting for a ticking bomb to go off.\u201d<\/em><\/p>\n<p>&#8211; \u00a0 <em>CTO, K-12<\/em><\/p>\n<p><em>\u00a0<\/em>*<em>In December 2019 and January 2020, independent market research firm <\/em><a href=\"http:\/\/www.marketconnectionsinc.com\/\"><em>Market Connections, Inc.<\/em><\/a><em> surveyed 400 IT security professionals in U.S. federal civilian and defense agencies, state and local government, and education. The survey was conducted on behalf of SolarWinds. Full survey results are available upon request.<\/em><\/p>\n<p><strong>Additional Resources<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.solarwinds.com\/resources\/survey\/solarwinds-public-sector-cybersecurity-survey-report-2020?cmp=PUB-PR-NVS-FED_FED_X_CR_X_AW_EN_PSCYBER_BOX-XSEC-20200225_X_X_X_VidNo_X-X\">SolarWinds 2020 Cybersecurity Survey Report<\/a><\/li>\n<li><a href=\"https:\/\/www.solarwinds.com\/federal-government\/it-management-solutions-for-government?cmp=PUB-PR-NVS-FED_FED_X_CR_X_AW_EN_PSCYBER_BOX-XSEC-20200225_X_X_X_VidNo_X-X\">SolarWinds Government Solutions<\/a><\/li>\n<li><a href=\"https:\/\/www.solarwinds.com\/resources\/whitepaper\/top-7-audit-prep-reportspre-audit-report-checklist?cmp=PUB-PR-NVS-FED_FED_X_CR_X_AW_EN_PSCYBER_BOX-XSEC-20200225_X_X_X_VidNo_X-X\">Whitepaper: Top 7 Audit-Prep Reports<\/a><\/li>\n<li><a href=\"https:\/\/www.solarwinds.com\/resources\/whitepaper\/the-ultimate-guide-to-federal-it-compliance?cmp=PUB-PR-NVS-FED_FED_X_CR_X_AW_EN_PSCYBER_BOX-XSEC-20200225_X_X_X_VidNo_X-X\">Whitepaper: The Ultimate Guide to Federal IT Compliance<\/a><\/li>\n<li><a href=\"https:\/\/www.solarwinds.com\/company\/press-releases\/2019-q1\/threats-posed-by-careless-or-malicious-insiders-and-foreign-governments-at-an-all-time?cmp=PUB-PR-NVS-FED_FED_X_CR_X_AW_EN_PSCYBER_BOX-XSEC-20200225_X_X_X_VidNo_X-X\">SolarWinds 2019 Federal Cybersecurity Survey press release<\/a><\/li>\n<\/ul>\n<p><strong>Connect with SolarWinds<\/strong><\/p>\n<ul>\n<li>Stop by the SolarWinds booth at the <a href=\"https:\/\/www.rsaconference.com\/\">RSA Conference<\/a> to learn more about SolarWinds security offerings \u2013 booth 1859<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/thwack.solarwinds.com\/?cmp=PUB-PR-NVS-FED_FED_X_CR_X_AW_EN_PSCYBER_BOX-XSEC-20200225_X_X_X_VidNo_X-X\">THWACK<\/a><sup>\u00ae<\/sup><\/li>\n<\/ul>\n<ul>\n<li><a href=\"http:\/\/www.twitter.com\/solarwinds\">Twitter<\/a><sup>\u00ae\u00a0<\/sup><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.facebook.com\/SolarWinds\/\">Facebook<\/a><sup>\u00ae<\/sup><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.linkedin.com\/company\/solarwinds\">LinkedIn<\/a><sup>\u00ae<\/sup><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Survey points to lack of cyber confidence and organisational maturity across U.S. public sector<\/p>\n<p>SolarWinds (NYSE:SWI), a leading provider of powerful and affordable IT management software, today announced the findings of its sixth annual U.S. Public Sector Cybersecurity Survey Report*. This year\u2019s survey includes responses from 400 IT operations and security decision makers, including 200 <\/p>\n<p>Continue reading <a href=\"https:\/\/www.gpsj.co.uk\/?p=4909\">IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[1147,143,1666,1667,1152],"class_list":["post-4909","post","type-post","status-publish","format-standard","hentry","category-it-it-security","tag-cybersecurity","tag-it","tag-it-complexity","tag-public-sector-cybersecurity-survey-report","tag-solarwinds","odd"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness - Government &amp; Public Sector Journal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gpsj.co.uk\/?p=4909\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness - Government &amp; Public Sector Journal\" \/>\n<meta property=\"og:description\" content=\"Survey points to lack of cyber confidence and organisational maturity across U.S. public sector SolarWinds (NYSE:SWI), a leading provider of powerful and affordable IT management software, today announced the findings of its sixth annual U.S. Public Sector Cybersecurity Survey Report*. This year\u2019s survey includes responses from 400 IT operations and security decision makers, including 200 Continue reading IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gpsj.co.uk\/?p=4909\" \/>\n<meta property=\"og:site_name\" content=\"Government &amp; Public Sector Journal\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-28T14:26:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075-300x200.jpg\" \/>\n<meta name=\"author\" content=\"The GPSJ Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The GPSJ Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909\"},\"author\":{\"name\":\"The GPSJ Team\",\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/#\\\/schema\\\/person\\\/d54386f99736367ec2789825fed93b4a\"},\"headline\":\"IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness\",\"datePublished\":\"2020-02-28T14:26:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909\"},\"wordCount\":1138,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.gpsj.co.uk\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/IMG_2075-300x200.jpg\",\"keywords\":[\"Cybersecurity\",\"IT\",\"IT Complexity\",\"Public Sector Cybersecurity Survey Report\",\"Solarwinds\"],\"articleSection\":[\"IT &amp; IT Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909\",\"url\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909\",\"name\":\"IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness - Government &amp; Public Sector Journal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.gpsj.co.uk\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/IMG_2075-300x200.jpg\",\"datePublished\":\"2020-02-28T14:26:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/#\\\/schema\\\/person\\\/d54386f99736367ec2789825fed93b4a\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909#primaryimage\",\"url\":\"https:\\\/\\\/www.gpsj.co.uk\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/IMG_2075.jpg\",\"contentUrl\":\"https:\\\/\\\/www.gpsj.co.uk\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/IMG_2075.jpg\",\"width\":3456,\"height\":2304},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?p=4909#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.gpsj.co.uk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/#website\",\"url\":\"https:\\\/\\\/www.gpsj.co.uk\\\/\",\"name\":\"Government &amp; Public Sector Journal\",\"description\":\"Public Sector, Government, business, stories and news along with latest developments, research, thought leadership, strategy, policy and insights\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.gpsj.co.uk\\\/#\\\/schema\\\/person\\\/d54386f99736367ec2789825fed93b4a\",\"name\":\"The GPSJ Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/13cdd73dc4abbd6e05b80a0562c7c553a9104ad2e5e96ee20afca2c462894143?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/13cdd73dc4abbd6e05b80a0562c7c553a9104ad2e5e96ee20afca2c462894143?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/13cdd73dc4abbd6e05b80a0562c7c553a9104ad2e5e96ee20afca2c462894143?s=96&d=blank&r=g\",\"caption\":\"The GPSJ Team\"},\"sameAs\":[\"http:\\\/\\\/gpsj.co.uk\"],\"url\":\"https:\\\/\\\/www.gpsj.co.uk\\\/?author=3\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness - Government &amp; Public Sector Journal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gpsj.co.uk\/?p=4909","og_locale":"en_GB","og_type":"article","og_title":"IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness - Government &amp; Public Sector Journal","og_description":"Survey points to lack of cyber confidence and organisational maturity across U.S. public sector SolarWinds (NYSE:SWI), a leading provider of powerful and affordable IT management software, today announced the findings of its sixth annual U.S. Public Sector Cybersecurity Survey Report*. This year\u2019s survey includes responses from 400 IT operations and security decision makers, including 200 Continue reading IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness","og_url":"https:\/\/www.gpsj.co.uk\/?p=4909","og_site_name":"Government &amp; Public Sector Journal","article_published_time":"2020-02-28T14:26:14+00:00","og_image":[{"url":"https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075-300x200.jpg","type":"","width":"","height":""}],"author":"The GPSJ Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"The GPSJ Team","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.gpsj.co.uk\/?p=4909#article","isPartOf":{"@id":"https:\/\/www.gpsj.co.uk\/?p=4909"},"author":{"name":"The GPSJ Team","@id":"https:\/\/www.gpsj.co.uk\/#\/schema\/person\/d54386f99736367ec2789825fed93b4a"},"headline":"IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness","datePublished":"2020-02-28T14:26:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.gpsj.co.uk\/?p=4909"},"wordCount":1138,"commentCount":0,"image":{"@id":"https:\/\/www.gpsj.co.uk\/?p=4909#primaryimage"},"thumbnailUrl":"https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075-300x200.jpg","keywords":["Cybersecurity","IT","IT Complexity","Public Sector Cybersecurity Survey Report","Solarwinds"],"articleSection":["IT &amp; IT Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.gpsj.co.uk\/?p=4909#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.gpsj.co.uk\/?p=4909","url":"https:\/\/www.gpsj.co.uk\/?p=4909","name":"IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness - Government &amp; Public Sector Journal","isPartOf":{"@id":"https:\/\/www.gpsj.co.uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gpsj.co.uk\/?p=4909#primaryimage"},"image":{"@id":"https:\/\/www.gpsj.co.uk\/?p=4909#primaryimage"},"thumbnailUrl":"https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075-300x200.jpg","datePublished":"2020-02-28T14:26:14+00:00","author":{"@id":"https:\/\/www.gpsj.co.uk\/#\/schema\/person\/d54386f99736367ec2789825fed93b4a"},"breadcrumb":{"@id":"https:\/\/www.gpsj.co.uk\/?p=4909#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gpsj.co.uk\/?p=4909"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.gpsj.co.uk\/?p=4909#primaryimage","url":"https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075.jpg","contentUrl":"https:\/\/www.gpsj.co.uk\/wp-content\/uploads\/2017\/07\/IMG_2075.jpg","width":3456,"height":2304},{"@type":"BreadcrumbList","@id":"https:\/\/www.gpsj.co.uk\/?p=4909#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gpsj.co.uk\/"},{"@type":"ListItem","position":2,"name":"IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague U.S. Public Sector Cyber Readiness"}]},{"@type":"WebSite","@id":"https:\/\/www.gpsj.co.uk\/#website","url":"https:\/\/www.gpsj.co.uk\/","name":"Government &amp; Public Sector Journal","description":"Public Sector, Government, business, stories and news along with latest developments, research, thought leadership, strategy, policy and insights","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gpsj.co.uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.gpsj.co.uk\/#\/schema\/person\/d54386f99736367ec2789825fed93b4a","name":"The GPSJ Team","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/13cdd73dc4abbd6e05b80a0562c7c553a9104ad2e5e96ee20afca2c462894143?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/13cdd73dc4abbd6e05b80a0562c7c553a9104ad2e5e96ee20afca2c462894143?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/13cdd73dc4abbd6e05b80a0562c7c553a9104ad2e5e96ee20afca2c462894143?s=96&d=blank&r=g","caption":"The GPSJ Team"},"sameAs":["http:\/\/gpsj.co.uk"],"url":"https:\/\/www.gpsj.co.uk\/?author=3"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.gpsj.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/4909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gpsj.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gpsj.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gpsj.co.uk\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gpsj.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4909"}],"version-history":[{"count":1,"href":"https:\/\/www.gpsj.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/4909\/revisions"}],"predecessor-version":[{"id":4910,"href":"https:\/\/www.gpsj.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/4909\/revisions\/4910"}],"wp:attachment":[{"href":"https:\/\/www.gpsj.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gpsj.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gpsj.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}