Sep 10, 2019
Oct 25, 2025
Black Kite
VIENNA, VA, Sept. 10, 2019 – A new Black Kite cyber risk assessment of the election commissions for 50 states, the District of Columbia, and five U.S. territories finds that many commissions are focused on quickly adapting and updating their cybersecurity; however, commissions still need to dedicate resources to updating outdated operating systems and protecting their email domains from being spoofed.
The Black Kite report, which examined more than 100 items, focused on the broader picture — the internet-facing infrastructure that supports state election processes. Using the approach recommended by the Center for Internet Security (CIS) Handbook for Elections Infrastructure Security, Black Kite examined Network Connected Systems and Components that are exposed on the internet. Black Kite did not review the use of, nor the cyber hygiene for, voting machines; nor does the scope of the report include county voting infrastructure.
Black Kite conducted two risk assessments (July and August) of 56 election commissions and Secretaries of State (SoS) to identify the publicly available information that hackers could exploit to conduct an attack. After the first assessment, Black Kite privately provided its findings in July to the SOS and election commissions in order to empower them with the information needed to remediate vulnerabilities. Black Kite ran a second scan in August and found significant improvement in the security posture of several election commissions.
During the July assessment, 27 commissions received a C grade or worse with all commissions averaging a D- for the management of security and other update patches for their operating systems. Black Kite’s second scan in August found that 43 of 56 commissions earned an A or B for their security posture. Black Kite will continue to conduct monthly assessments and provide updates on progress at the state level.
“Limited resources coupled with the responsibility for a highly-attractive threat vector provide significant challenges to those responsible for the U.S. election infrastructure,” said Bob Maley, CSO of Black Kite. “With a little more than one year before a Presidential election, our nation’s election commissions still have the opportunity to secure their Internet-facing infrastructure to prevent hackers from finding a back door to a wide variety of critical data that includes voter registration data.”
In the short term, vulnerabilities and potential attack vectors on highest-risk systems have to be monitored on a real-time basis and addressed as they are discovered. In the long term, political leaders need to understand the complexity of the IT systems that have been put in place and support significant financial resources for technology and staffing to allow the CISOs and SOSs to stay ahead of hackers.
States can improve their understanding of what systems truly represent the most risk by becoming more aware of their cyber ecosystem footprint. Risk is not just present at the level of the Secretary of State’s website; but throughout the entire election ecosystem, which includes all of the underlying supporting infrastructure (and third-party services connected to and supporting that infrastructure).
However, awareness doesn’t create security. Critical infrastructure must be upgraded, patched, and replaced to give U.S. elections the best opportunity to remain secure.
Get the full report: The Cyber Hygiene Report
Black Kite enables enterprises to assess, prioritize, and address the third-party cyber risk of any company, located anywhere, within 60 seconds. Using easy-to-understand scorecards, we provide standards-based letter grades on various risk categories, along with data on how to mitigate each risk in priority order. Black Kite provides the speed, standards, and substance needed to combat the newest risks and threats facing organizations today.
Learn more at www.blackkite.com.