The vast majority of US defense contractors are failing to meet bare-minimum cybersecurity requirements imposed five years ago, according to a Merrill poll commissioned by managed security provider CyberSheath.
The 2017 Defense Federal Acquisition Regulation Supplement (DFARS) considers a contractor to be in perfect compliance with the federal government’s cybersecurity expectations if they have a score of 110 on a scale called the Supplier Performance Risk System (SPRS). Virtually none of them are even close, the poll of 300 Department of Defense contractors found.
In fact, less than 13% reported an SPRS score of 70 or above. That’s the number the company says is commonly referred to within the industry as “good enough.” The average score was −23 out of a lowest possible rating of −203, presenting “significant opportunity for improvement.”
According to the survey, defense contractors have failed to implement basic standards. A sampling:
- 30% have security information and event management (SIEM)
- 27% have an endpoint detection response solution (EDR)
- 20% have a vulnerability management solution
- 21% have multi-factor authentication (MFA)
It should go without saying that the defense sector is one of the top targets for hacking campaigns.
“The world’s largest supply chain—that is, defense contractors supporting the Department of Defense—is largely noncompliant with their mandatory cybersecurity requirements,” CyberSheath CEO Eric Noonan told IT Brew.
Keep reading here.—TM
Do you work in IT or have information about your IT department you want to share? Email [email protected]. Want to go encrypted? Ask Tom for his Signal.