DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NYS Comptroller Audit: Cyber Incident Response Team (Follow-Up)

Posted on August 14, 2023 by Dissent

Issued Date: July 20, 2023
Agency/Authority:  Homeland Security and Emergency Services, Division of

Objective

To assess the extent of implementation of the two recommendations included in our initial audit report, Cyber Incident Response Team (Report 2020-S-58).

About the Program

Cybercrimes continue to rise. According to the Federal Bureau of Investigation (FBI), complaints of phishing and similar cyberattacks often used to deliver ransomware increased by 162%, from 114,702 in 2019 to 300,497 in 2022. These attacks can have a significant impact on the public when they target public authorities and local governments that oversee a variety of services the public depends on, including water systems, utilities, airports, schools, and health care facilities. In 2022, there were 2,385 complaints of ransomware, according to the FBI’s Internet Crime Report.

In 2017, the Cyber Incident Response Team (CIRT) was created within the Division of Homeland Security and Emergency Services (Division) to provide cybersecurity support to more than 2,800 non-Executive agencies, local governments, and public authorities in New York. CIRT is part of the Division’s Office of Counter Terrorism and currently has 17 members – 11 Division employees and six members of the National Guard. The Division’s mission is to provide leadership, coordination, and support for efforts to prevent, protect against, prepare for, respond to, and recover from terrorism and other man-made and natural disasters, threats, fires, and other emergencies.

The objective of our initial audit, which was issued on November 12, 2021 and covered the period January 1, 2018 to March 26, 2021, was to determine whether CIRT was achieving its mission of providing cybersecurity support to non-Executive agencies, local governments, and public authorities. The audit found that CIRT developed lines of service to guide its work, which includes cyber incident response services, technical cyber services, and information sharing and outreach, but did not establish specific and measurable objectives or quantifiable goals that can be measured to evaluate its accomplishments.

Key Finding

The Division made progress in addressing the issues we identified in the initial audit report; however, additional actions are needed. Of the initial report’s two audit recommendations, one was implemented and one was partially implemented.

Key Recommendation

Officials are given 30 days after the issuance of this report to provide information on any actions planned to address the unresolved issues discussed in this follow-up.

State Government Accountability Contact Information:
Audit Director
: Nadine Morrell
Phone: (518) 474-3271; Email: [email protected]
Address: Office of the State Comptroller; Division of State Government Accountability; 110 State Street, 11th Floor; Albany, NY 12236

The full report can be found here: https://www.osc.state.ny.us/files/state-agencies/audits/pdf/sga-2023-23f8.pdf

 

Category: Commentaries and AnalysesGovernment SectorOf NoteState/Local

Post navigation

← Monti Ransomware Unleashes a New Encryptor for Linux
Colorado Department of Health Care Policy & Financing reports more than 4 million affected by MOVEit breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.