Skip to content

The impact of exploitable misconfigurations on network security within US Federal organizations

An average of 51 network device misconfigurations were discovered in the last two years with 4% deemed to be critical vulnerabilities that could take down the network within  the U.S. Federal Government according to latest research.

Configurations of U.S. Government routers, switches, and firewalls are changing on a daily basis as Government networks transform. Critical threats are exploiting those network configuration changes in order to gain access to sensitive systems and data.

Titania wanted to understand more about how the U.S. Federal Government is currently managing the critical risks associated with misconfigured network devices – namely routers, switches and firewalls.

We commissioned independent B2B research specialists, Coleman Parkes, to investigate by surveying senior cybersecurity decision-makers across the US Federal Government, as well as other US critical national infrastructure sectors (military, oil & gas, telecoms, and financial services), for comparison purposes.

To see the results, fill in the form.

Complete the form to access the full report

Key findings

81%

of respondents said an inability to prioritize remediation based on risk is a top challenge.

88%

of respondents agreed that their agency relies on compliance to deliver security.

83%

of respondents reported having detected at least one critical configuration issue in the last two years.

Nipper Resilience

Network Posture and Resilience Assurance

Ready to make the shift from risk-based vulnerability management (RBVM) to continous threat exposure management (CTEM)? It’s time to protect your network from threats and disruptions, with a next-gen solution for NOCs, SOCs, and Incident Response and Remediation teams.

Continuous Monitoring is Essential

"Government networks are changing every single day as agencies embrace digital transformation and shift to the cloud. However, if federal agencies are not continuously monitoring their network device configurations, they are in essence inherently trusting the operation of those devices. This practice is not only counter to Zero Trust principles, but it also is proving to be a very soft target for bad actors to exploit and to gain a foothold into sensitive government systems and data."
 
Dean Webb, Merlin Cyber

Resources

report-reveals-cost-of-misconfigs

Press Release

Research suggests disconnect between network security perception and reality.

a02825f4-29b3-43ca-a8b1-1c2e906ae920

Latest Article

Misconfigurations overlooked as the cause of network security breaches

TNA_Impact Report_Infographic_AW - crop

Infographic

The key findings from the research in numbers.

woman-at-computer

Network Segmentation

The key to improving data security.

Titania is trusted to automate audits of network devices by:

U.S. Air Force Logo
USA DoD Logo
US Army Logo
US Navy Logo
US Air Force Military Mark