DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NYS Comptroller Audit: Cyber Incident Response Team (Follow-Up)

Posted on August 14, 2023 by Dissent

Issued Date: July 20, 2023
Agency/Authority:  Homeland Security and Emergency Services, Division of

Objective

To assess the extent of implementation of the two recommendations included in our initial audit report, Cyber Incident Response Team (Report 2020-S-58).

About the Program

Cybercrimes continue to rise. According to the Federal Bureau of Investigation (FBI), complaints of phishing and similar cyberattacks often used to deliver ransomware increased by 162%, from 114,702 in 2019 to 300,497 in 2022. These attacks can have a significant impact on the public when they target public authorities and local governments that oversee a variety of services the public depends on, including water systems, utilities, airports, schools, and health care facilities. In 2022, there were 2,385 complaints of ransomware, according to the FBI’s Internet Crime Report.

In 2017, the Cyber Incident Response Team (CIRT) was created within the Division of Homeland Security and Emergency Services (Division) to provide cybersecurity support to more than 2,800 non-Executive agencies, local governments, and public authorities in New York. CIRT is part of the Division’s Office of Counter Terrorism and currently has 17 members – 11 Division employees and six members of the National Guard. The Division’s mission is to provide leadership, coordination, and support for efforts to prevent, protect against, prepare for, respond to, and recover from terrorism and other man-made and natural disasters, threats, fires, and other emergencies.

The objective of our initial audit, which was issued on November 12, 2021 and covered the period January 1, 2018 to March 26, 2021, was to determine whether CIRT was achieving its mission of providing cybersecurity support to non-Executive agencies, local governments, and public authorities. The audit found that CIRT developed lines of service to guide its work, which includes cyber incident response services, technical cyber services, and information sharing and outreach, but did not establish specific and measurable objectives or quantifiable goals that can be measured to evaluate its accomplishments.

Key Finding

The Division made progress in addressing the issues we identified in the initial audit report; however, additional actions are needed. Of the initial report’s two audit recommendations, one was implemented and one was partially implemented.

Key Recommendation

Officials are given 30 days after the issuance of this report to provide information on any actions planned to address the unresolved issues discussed in this follow-up.

State Government Accountability Contact Information:
Audit Director
: Nadine Morrell
Phone: (518) 474-3271; Email: [email protected]
Address: Office of the State Comptroller; Division of State Government Accountability; 110 State Street, 11th Floor; Albany, NY 12236

The full report can be found here: https://www.osc.state.ny.us/files/state-agencies/audits/pdf/sga-2023-23f8.pdf

 


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • Government will 'robustly defend' compensation claims from Afghans put at risk by data breach
  • More than 100 British government personnel exposed by Ministry of Defence data leak
Category: Commentaries and AnalysesGovernment SectorOf NoteState/Local

Post navigation

← Monti Ransomware Unleashes a New Encryptor for Linux
Colorado Department of Health Care Policy & Financing reports more than 4 million affected by MOVEit breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Korea imposes 343 million won penalty on HAESUNG DS for data breach of 70,000 shareholders
  • Paying cyberattackers is wrong, right? Should Taos County’s incident be an exception?
  • HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan
  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • Cyberattacks Paralyze Major Russian Restaurant Chains
  • France Travail: At least 340,000 job seekers victims of new hack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.