Issue 151 - September 2024
NEWS: WORTHY

Strengthening Our Cybersecurity Posture: Why Reporting to IC3 Matters
By John Caruthers, Executive Vice President / Chief Information Security Officer, Triden GroupAs cybersecurity threats continue to evolve, local government staff must stay informed and proactive as stewards of our communities’ digital infrastructure. Cybercriminals constantly adapt their tactics, and our defense strategies must evolve accordingly. One of the key resources in this ongoing battle is the FBI’s Internet Crime Complaint Center (IC3), which plays a pivotal role in tracking and combating cybercrime.
Understanding IC3 and Its Impact
IC3 is the primary platform for reporting cybercrime. Operated by the FBI, it is instrumental in collecting data on cyber incidents, which enables law enforcement agencies to pursue investigations, identify emerging threats, and develop countermeasures. For those in local government, reporting incidents to IC3 is not just a responsibility; it’s a vital part of cybersecurity strategy. Consider it your digital police report, ensuring each incident is documented and actionable.
Key Insights from the 2023 IC3 Report
The most recent IC3 report provides critical insights into the current cyber threat landscape, highlighting trends to be aware of:
- Investment Fraud: This type of fraud saw a staggering 38 percent increase from 2022 to 2023. Cybercriminals target individuals and entities through sophisticated schemes, often leveraging social engineering techniques. It is essential to remain vigilant and educated on recognizing these threats.
- Business Email Compromise (BEC): BEC continues to be a significant concern, with $2.9 billion in reported losses. These attacks can severely impact operations by compromising official communications and redirecting funds. Robust email security protocols and continuous awareness training are crucial in mitigating this risk.
- Ransomware: Ransomware complaints rose 18 percent in the past year, underscoring the need for robust incident response plans. For small government agencies, a ransomware attack can disrupt critical services, making it imperative to have effective backups and response strategies in place.
Define Your Security North Star
John Caruthers is a retired FBI Special Agent and current EVP/CISO at Triden Group. He has encountered many successes and defeats throughout the industry. As a result, he advises having a clear “North Star” to guide your agency’s strategy. This guiding principle ensures that security efforts are aligned with your organization’s overall mission and are moving in the right direction. Reporting cyber incidents to IC3 is one of the many steps to take to stay on course.
Looking Ahead: Planning Your Strategy
If you have questions about integrating IC3 into your cybersecurity strategy or need assistance with your overall security posture, Triden Group is an Authority partner available to provide the support you need to protect your organization and community.
The California JPIA partners with Triden Group to provide fully funded cybersecurity assessments to members. The Authority has also negotiated preferred pricing and executed a Master Services Agreement (MSA) with Triden. Members can leverage the MSA (at their own cost) to engage Triden to perform cybersecurity services. Typical services include penetration testing, training, incident response tabletop exercises, implementation of cybersecurity improvements, and repeat cyber assessments.
If you have questions or would like more information about any of these services, please contact your assigned risk manager
< Back to Full Issue Print Article