{"id":1415,"date":"2023-10-27T11:30:39","date_gmt":"2023-10-27T15:30:39","guid":{"rendered":"https:\/\/mblc.state.ma.us\/mblc_blog\/?p=1415"},"modified":"2023-10-27T11:58:55","modified_gmt":"2023-10-27T15:58:55","slug":"cybersecurity-grants","status":"publish","type":"post","link":"https:\/\/mblc.state.ma.us\/mblc_blog\/2023\/10\/27\/cybersecurity-grants\/","title":{"rendered":"Networks Tackle Cybersecurity with MBLC State Grants"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"724\" src=\"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-content\/uploads\/2023\/10\/lookandlearn.com-YW025766V-1024x724.jpg\" alt=\"\" class=\"wp-image-1420\" srcset=\"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-content\/uploads\/2023\/10\/lookandlearn.com-YW025766V-1024x724.jpg 1024w, https:\/\/mblc.state.ma.us\/mblc_blog\/wp-content\/uploads\/2023\/10\/lookandlearn.com-YW025766V-300x212.jpg 300w, https:\/\/mblc.state.ma.us\/mblc_blog\/wp-content\/uploads\/2023\/10\/lookandlearn.com-YW025766V-768x543.jpg 768w, https:\/\/mblc.state.ma.us\/mblc_blog\/wp-content\/uploads\/2023\/10\/lookandlearn.com-YW025766V-1536x1087.jpg 1536w, https:\/\/mblc.state.ma.us\/mblc_blog\/wp-content\/uploads\/2023\/10\/lookandlearn.com-YW025766V-2048x1449.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Identity theft, ransomware attacks, phishing and other types of cyber-risks are dangers that have become part of our daily existence, both as library workers and digital citizens. &nbsp;In response, the websites we use now require multi-step logins, also known as multi-factor authentication or MFA.&nbsp; Changes are even more striking in the workplace. Many of us log into staff applications via a VPN, or virtual private network, involving multiple steps and a dedicated phone. While our systems providers try to streamline our workflows, our computers and work phones are locked down, requiring more work simply to begin work. &nbsp;Simple, shared passwords are a thing of the past. Data backup and recovery strategies are important for anyone using the internet, even casual home users.<\/p>\n\n\n\n<p>Two years ago, news of large-scale cyberattacks exploded in the national media. The <a href=\"https:\/\/www.energy.gov\/ceser\/colonial-pipeline-cyber-incident\">Colonial Pipeline<\/a> attack in May of 2021 stood out in particular.\u00a0 In July of 2021, I was made aware of some new guidance generated by New York State on ransomware attack prevention and response.\u00a0 I myself had just become a victim of a ransomware attack at home, through a security hole in my backup software; the irony did not escape me. My music files were locked up and held for ransom.\u00a0 At that time, I asked the <a href=\"https:\/\/mblc.state.ma.us\/programs-and-support\/library-networks\/index.php\">nine automated resource sharing networks<\/a> whether they were prepared. Were they confident with their cybersecurity posture? Were they on top of protecting core library services and patron data? Did they have the ability to quickly recover should they experience an attack?\u00a0 Should all the networks, possibly with help from the MBLC, work individually or together to improve network resilience in the face of seemingly inevitable cyberattacks?<\/p>\n\n\n\n<p>Three weeks later, on August 25<sup>th<\/sup>, 2021, the Boston Public Library (BPL) was hit by a <a href=\"https:\/\/www.bostonglobe.com\/2021\/08\/27\/metro\/bpl-hit-by-ransomware-attack-shutting-down-most-its-computer-network\/\">ransomware attack<\/a> which brought the BPL and Metro Boston Library Network systems down for a <a href=\"https:\/\/www.bpl.org\/news\/statement-technical-outage\/\">full week<\/a>.&nbsp; David Leonard, the President of the BPL was kind enough to meet with network administrators a few weeks later to share lessons learned &#8212; to describe what had happened, how it might have happened, how the BPL had recovered, and what step the library was taking to protect itself in future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">MBLC Awards State Cybersecurity Grants<\/h2>\n\n\n\n<p>The BPL attack showed how broadly disruptive a cyberattack can be on library services.\u00a0 Networks provide the mission critical, core business functions on which every library operates. \u00a0When an attack occurs, patron records, the catalog and circulation system all become unavailable.\u00a0 Ancillary systems, email, websites, access to electronic resources may all be affected.<\/p>\n\n\n\n<p>The MBLC decided to offer a cybersecurity grant opportunity of up to $25,000 per network using state funds from account 7000-9506, Library Technology and Resource Sharing.&nbsp; In total, we awarded $181,093 to eight networks.&nbsp;&nbsp; The program ran from May 2022 through June 2023.<\/p>\n\n\n\n<p>Each network used grant funds to address its own priorities as each was in a different place in its thinking, planning and overall preparedness.&nbsp; To provide an overall framework, MBLC asked networks to categorize their activities according to the four goals laid out in the<a href=\"https:\/\/masscybercenter.org\/cyber-resilient-massachusetts\/minimum-baseline-cybersecurity-municipalities\"> Minimum Baseline of Cybersecurity for Municipalities<\/a> from <a href=\"https:\/\/masscybercenter.org\/\">MassCyberCenter<\/a>. Though designed for cities and towns, the framework proved equally well suited for a common perspective on network grant activities.<\/p>\n\n\n\n<p>The four goals are:<\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<ol class=\"wp-block-list\" type=\"1\">\n<li><a href=\"https:\/\/masscybercenter.org\/goal-1-trained-and-cyber-secure-employees\">Trained and Cyber-Secure Employees<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/masscybercenter.org\/goal-2-improved-threat-sharing\">Improved Threat Sharing<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/masscybercenter.org\/goal-3-cyber-incident-response-planning\">Cyber Incident Response Planning<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/masscybercenter.org\/goal-4-secure-technology-environment-and-best-practices\">Secure Technology Environment and Best Practices<\/a><\/li>\n<\/ol>\n<\/div>\n\n\n\n<p>Not surprisingly, all eight participating addressed Goal 4. Providing technology is a network\u2019s bread and butter. Four networks also identified staff training, and one network focused on response planning.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Minimum Baseline Goals<\/strong><\/td><td><strong>Network<\/strong><\/td><\/tr><tr><td>Trained and Cyber-Secure Employees<\/td><td>CW MARS, FLO, MVLC, SAILS<\/td><\/tr><tr><td>Improved Threat Sharing<\/td><td>&nbsp;<\/td><\/tr><tr><td>Cyber Incident Response Planning<\/td><td>SAILS<\/td><\/tr><tr><td>Secure Technology Environment and Best Practices<\/td><td>CLAMS, CW MARS, FLO, MBLN, MVLC, NOBLE, OCLN, SAILS<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/masscybercenter.org\/goal-1-trained-and-cyber-secure-employees\">Staff Training<\/a><\/h2>\n\n\n\n<p>It\u2019s almost a truism that human beings are the weakest link in the cybersecurity chain. Therefore, thorough training is essential. Besides a series of instructional sessions or webinars, training often includes a series of phishing tests. A security vendor will send out phishing emails or smishing texts (phishing via SMS) to see whether staff recognize the malicious messages or instead, open the message or message attachment, actions that might in the real world have led to a damaging security breach.&nbsp; FLO reports that their \u201cphish-prone percentage\u201d came down to 7.8% from a 50% mark (half of FLO staff) at the beginning of the program, and that since January 2023 no FLO staff member has clicked on a phishing email at all, easily surpassing FLO\u2019s objective of 5% originally set out in their grant application.<\/p>\n\n\n\n<p>MVLC experimented with a suite of free security training tools to gauge their effectiveness. Having obtained encouraging results in participation, they will consider making this part of their annual training regime in future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/masscybercenter.org\/goal-3-cyber-incident-response-planning\">Cyber Incident Response Planning<\/a><\/h2>\n\n\n\n<p>SAILS undertook formal planning as part of the grant.&nbsp; SAILS\u2019 incident response plan, when complete, will cover the steps to be taken should there be a security breach. It will include who will be notified: the network attorney, the system vendor(s), the cybersecurity insurance provider, telecommunications support provider, the network internet service provider, and, of course, member libraries.<\/p>\n\n\n\n<p>The plan will address the following six phases:&nbsp;&nbsp; preparation, identification, containment, eradication, recovery, and lessons learned.<\/p>\n\n\n\n<p>SAILS recognizes the importance of sharing the plan with member libraries. An incident can start at the library.<\/p>\n\n\n\n<p>The Boston Public Library \/MBLN network, which had suffered that significant cybersecurity attack in 2021, hired a consultant to develop a security roadmap to improve its overall security posture. Preliminary direction will have been guided by vulnerability scan and penetration testing. BPL also intends to hire a full-time Cybersecurity Analyst.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/masscybercenter.org\/goal-2-improved-threat-sharing\">Improved Threat Sharing<\/a><\/h2>\n\n\n\n<p>No network explicitly identified threat sharing as a grant goal. &nbsp;However, as part of incident response planning, networks recognize that registering with regional and national threat resource centers, such as <a href=\"https:\/\/www.cisecurity.org\/ms-isac\">MS-ISAC<\/a>, the Multi-State Information Sharing and Analysis Center, and the <a href=\"https:\/\/www.cisa.gov\/about\/regions\/region-1\">New England regional office of CISA<\/a>, the Cybersecurity &amp; Infrastructure Security Agency, is critical. &nbsp;Networks will proactively hear about threats that might affect them and will know whom to inform should an attack happen to them. &nbsp;Networks will be better prepared to share threat information with each other in a timely fashion.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/masscybercenter.org\/goal-4-secure-technology-environment-and-best-practices\">Secure Technology Environment and Best Practices<\/a><\/h2>\n\n\n\n<p>The majority of grant-related work focused on ensuring that networks\u2019 core systems, backups, were secure, and that shared work environments being accessed by both central site staff and library staff were controlled by technologies, policies and procedures to minimize risk.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Library System Hosting Environment<\/h3>\n\n\n\n<p>Two networks, CW MARS and NOBLE, had locally hosted library system servers. Recently, either as part of this grant, or slightly before, both networks had moved their servers into a Google Cloud environment under the management of <a href=\"https:\/\/mobiusconsortium.org\/moss\">Mobius Open-Source Solutions<\/a> (MOSS).\u00a0 Large-scale cloud hosts such as provided by Google and Mobius, bring assurances of a much more secure environment than any local installation could manage.\u00a0 This includes physical security, system and software patching, vulnerability testing, standards, access controls, authentication, and backup and restore options.<\/p>\n\n\n\n<p>Through a consultant, NOBLE audited the security of their servers\u2019 new home, and especially the cloud-hosted data backups.&nbsp; NOBLE\u2019s consultant provided a series of recommendations back to Mobius that should benefit not only NOBLE and CW MARS, but other similarly situated library systems as well. NOBLE also now takes more frequent system backups, housing them in a separate location, a more secure approach.<\/p>\n\n\n\n<p>CLAMS took a hard look at the hosting environment for their new Koha\/Aspen Discovery library system from Bywater Systems. Bywater has tested incident response and business continuity plans.&nbsp; Bywater had several recommendations for CLAMS, including the use of a reverse proxy server, regular vulnerability scans, an intrusion detection and prevention system, and IP access control for all Koha admin interfaces.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Equipment Replacement<\/h3>\n\n\n\n<p>OCLN and NOBLE replaced older routers in members libraries with state-of-the-art advanced firewalls that included intrusion prevention features. Intrusion prevention systems proactively check for real-time threats or attacks and take action to stop the activity.\u00a0 The new routers will better protect not only the network, but also local library LANs, attached equipment and data.<\/p>\n\n\n\n<p>The change to remote or hybrid work environments that we\u2019ve seen over the last three years means that staff are no longer necessarily accessing the library system through library-owned computers on library-managed LANs.\u00a0 As part of the grant, networks focused on ensuring that secure VPN connections are always used by both central site and library staff.\u00a0 The newly purchased firewalls have made possible simplified VPN sessions for staff working remotely, and a much more manageable overall VPN environment for central site. As an example, OCLN reports that it now has single-sign-on capabilities through Google, so that staff can sign onto the VPN via a regular browser and using the same credentials that they use for Google Workspace.\u00a0 And no more shared passwords among library staff!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Staff Applications: Google Workspace and Microsoft 365<\/h3>\n\n\n\n<p>Central site and numerous library staff use shared applications.\u00a0 Several audits found that access to Google Workspace and Microsoft 365 needed better access controls. A clear, and near-term goal is to enforce multi-factor authentication for administrative users, and if possible, extend the requirement to all library staff.\u00a0 CLAMS purchased MFA \u201csecurity keys\u201d, a small USB device for all staff to use when working remotely.\u00a0 Security keys obviate the need for passwords and thereby avoid the danger of phishing attacks designed to capture passwords.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"mso-fareast-font-family: 'Times New Roman';\">Password Strengthening and Management<\/span><\/h3>\n\n\n\n<p>CW MARS obtained a business class password management platform which enabled password strength to be audited.&nbsp; By the end of the grant period, they reported that for central site staff, \u201cOur average password strength was 94%. 0% of staff had a weak master password. 0% of staff had a reused password.\u201d&nbsp; Based on its security audit, MVLC intends to pursue a similar solution.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Email<\/h3>\n\n\n\n<p>Tighter network email attachment policies, better email verification via mailing system standards &#8212;<a href=\"https:\/\/en.wikipedia.org\/wiki\/DomainKeys_Identified_Mail\">DKIM<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/DMARC\">DMARC<\/a> in particular&#8211; have been identified as ways to improve trust in email messages both coming into libraries and going out.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Penetration Testing and review by 3<sup>rd<\/sup> party<\/h3>\n\n\n\n<p>FLO was one of several networks that did vulnerability testing. FLO really dug into this issue, using Open Source Intelligence (OSINT) techniques to see whether there was information on potentially harmful attack vectors \u201cout there\u201d on the internet that might impact FLOs systems. As a result, they decommissioned an outdated server using an old operating system along, among other actions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Not Just the Central Site &#8211; Including Member Libraries<\/h3>\n\n\n\n<p>Though some projects focused exclusively on central site systems and staff, others had broader reach. For example, MVLC\u2019s security audit included 28 of its member libraries.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Next Steps<\/h2>\n\n\n\n<p>Every year, the MBLC provides <a href=\"https:\/\/mblc.state.ma.us\/programs-and-support\/library-networks\/grants-to-networks.php\">network infrastructure grants<\/a> from account 9506.\u00a0 For FY24, the total grant round was increased by 33% to $400,000.\u00a0 Cybersecurity investments are now allowable expenditures under this grant.\u00a0\u00a0 The initial MBLC cybersecurity grant round kicked off an ongoing process. Networks will take what they learned, and at the very least, invest in training, planning, plugging holes, updating policies, communicating cybersecurity roles and responsibilities to member libraries, and working together with their peers across the state to make Massachusetts libraries, resources, and library patron information safer and more secure.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Main Image: <a href=\"https:\/\/www.lookandlearn.com\/history-images\/YW025766V\/Lightning-striking-a-rural-building-during-a-storm-onlookers-react-in-terror\" data-type=\"link\" data-id=\"https:\/\/www.lookandlearn.com\/history-images\/YW025766V\/Lightning-striking-a-rural-building-during-a-storm-onlookers-react-in-terror\">Lightning striking a rural building during a storm: onlookers react in terror. Engraving, 16 \u2013. Weather. Lightning. Work ID: hfz9n5qe<\/a> : under <a href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY 4.0<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity theft, ransomware attacks, phishing and other types of cyber-risks are dangers that have become part of our daily existence, both as library workers and digital citizens. &nbsp;In response, the websites we use now require multi-step logins, also known as multi-factor authentication or MFA.&nbsp; Changes are even more striking in the workplace. Many of us [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[195,175],"tags":[],"class_list":["post-1415","post","type-post","status-publish","format-standard","hentry","category-grant-opportunity","category-networks"],"_links":{"self":[{"href":"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-json\/wp\/v2\/posts\/1415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-json\/wp\/v2\/comments?post=1415"}],"version-history":[{"count":18,"href":"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-json\/wp\/v2\/posts\/1415\/revisions"}],"predecessor-version":[{"id":1435,"href":"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-json\/wp\/v2\/posts\/1415\/revisions\/1435"}],"wp:attachment":[{"href":"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-json\/wp\/v2\/media?parent=1415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-json\/wp\/v2\/categories?post=1415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mblc.state.ma.us\/mblc_blog\/wp-json\/wp\/v2\/tags?post=1415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}