“Passwords that took seconds to guess, or were never changed from their factory settings. Cyber vulnerabilities that were known, but never fixed. Those are two common problems plaguing some of the Department of Defense's newest weapons systems, according to the Government Accountability Office,” writes Bill Chappell in their recent NPR article entitled “Cyber Tests Showed 'Nearly All' New Pentagon Weapons Vulnerable To Attack, GAO Says.”
“The flaws are highlighted in a new GAO report, which found the Pentagon is ‘just beginning to grapple’ with the scale of vulnerabilities in its weapons systems,” Chappell explains.
“Drawing data from cybersecurity tests conducted on Department of Defense weapons systems from 2012 to 2017, the report says that by using ‘relatively simple tools and techniques, testers were able to take control of systems and largely operate undetected’ because of basic security vulnerabilities,” the article continues.
According to the NPR piece, “The GAO says the problems were widespread: ‘DOD testers routinely found mission critical cyber vulnerabilities in nearly all weapon systems that were under development.”
Chappell explains in the article that “When weapons program officials were asked about the weaknesses, the GAO says, they ‘believed their systems were secure and discounted some test results as unrealistic."
And that’s why we’re writing today’s article.
We don’t want you to believe anything.
You’ve got to know your ‘systems’ are secure.
That’s why it’s critical to identify your flaws now and understand potential vulnerabilities.
But, you’re probably wondering how right?
Well, if you’re “just beginning to get a grapple” of the importance of your operation’s strengths, weaknesses, opportunities for improvement, and outside threats – we’ve got you covered.
Keep reading; we’re going to share why and how a proven methodology is a key to plugging holes in your operation and knowing everything is secure.