Ransomware, like any malware, is an opportunistic scourge. Cybercriminals use tools that search for vulnerabilities to find ways to breach computer networks. Once they find a hole in your defenses, the amount of damage they can do is only limited by how much of your network's architecture they can access. This is why Leatherman recommends that law enforcement agencies adopt a cybersecurity practice common in large corporations called "categorizing" data. "If everything in your network is connected, then once they are in your network, they can go anywhere and affect any data they can access," he explains.
A major worry that agencies should have when looking for ways to reduce their vulnerabilities to cyberattacks like ransomware, is human machine interfaces (HMI) and the so-called Internet of things (IOT), meaning devices connected to the Internet so that users can interface with them remotely. "You shouldn't connect the same network that has sensitive data with smart coffee makers and kiosks for ordering hamburgers. People love these conveniences, but having them on your network is also convenient for bad actors," Leatherman says.
He advises agencies that want IOT convenience systems to build closed networks for them. That way if a cybercriminal finds a way into the network through the firmware or software of a smart device, the only thing that can be damaged is that segregated network.
Human error and human carelessness are also vulnerabilities in law enforcement data networks that cybercriminals can and have exploited. Such errors and careless actions include moving storage devices from one computer on one network to a computer on a more sensitive network. Worse, some officers have been known to surf the Web or access their e-mail from computers connected to critical data. "It's sad but true," says Leatherman. "The initial entrance of a bad actor into a system is often through a path created by a trusted insider who did something to open the system up to an attack." He advises that access to sensitive data be limited to people who really need it to perform their jobs, even if that means command staff is locked out.
"Everybody has to have skin in this game," Leatherman says, explaining it's critical that law enforcement executives such as chiefs and sheriffs do more than just wave their hands and say, "That's IT's problem." He says chiefs, sheriffs, and their command staff should be working with IT to identify and eliminate vulnerabilities.