Contractors doubt own security

In light of confirmed cyberattacks on Lockheed Martin and L-3 Communications and a possible attack on Northrop Grumman Corp., we asked our readers if they felt their companies were vulnerable.

The early results show that 66 percent of respondents felt they needed to do more to secure their systems, while 33 percent said their security measures were adequate.

Let us know what you think and click here to take our poll.

About the Author

Nick Wakeman is the editor-in-chief of Washington Technology. Follow him on Twitter: @nick_wakeman.

Reader Comments

Mon, Jun 6, 2011

Defense contractor attacks and breaches also began with a single click. Forbes: For Pentagon Contractors, Cyberspying Escalates, As cyberspies multiply and evolve, the military says many defense firms remain woefully unsecure. See Excerpts: "But military contractors General Dynamics and Northrop Grumman have both been successfully breached by cyberspies in the last two years, according to sources familiar with the security situations of those companies. It's also likely that many other major defense contractors have recently had data stolen by hackers." "As early as 2003 Sandia National Laboratories and its managing company, Lockheed Martin,were penetrated by cyberspies, seemingly based in China, who pilfered plans for the Mars Reconnaissance Orbiter, a class of technology with potential military uses. In 2007 Forbes reported that cyberspies, again seemingly based in China, had breached the largest 10 military contractors, including Lockheed Martin, Northrop Grumman, Raytheon, and Boeing." "The Pentagon's forensics-focused Cyber Crime Center, where Shirley is executive director, found that between August 2007 and August 2009, 71 government agencies, contractors, universities and think tanks with connections to the U.S. military had been penetrated by foreign hackers, in some cases multiple times. In total, Shirley told Forbes, the center performed 116 investigations following spying breaches and found that in all but 14 of those cases the intruders had gained complete administrator-level access to the victim's network."

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here

Washington Technology Daily

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.


contracts DB