Company Details
nacodc
183
21,910
921
naco.org
0
NAT_6650210
In-progress

National Association of Counties Company CyberSecurity Posture
naco.orgThe National Association of Counties (NACo) is the only national organization that represents county governments in the United States. Founded in 1935, NACo assists America’s 3,069 counties in pursuing excellence in public service to produce healthy, vibrant, safe and resilient counties. NACo promotes sound public policies, fosters county solutions and innovation, promotes intergovernmental and public-private collaboration and provides value-added services to save counties and taxpayers money. With its headquarters on Capitol Hill, NACo is a full-service organization that delivers its services through its dedicated and skilled staff who comprise the following departments: Executive Management, Legislative Affairs, Public Affairs, County Solutions and Innovation, Information Technology, Finance and Administration and the Financial Service Corporation.
Company Details
nacodc
183
21,910
921
naco.org
0
NAT_6650210
In-progress
Between 750 and 799

NAC Global Score (TPRM)XXXX

Description: Researchers from the University of Maryland uncovered systemic cybersecurity vulnerabilities across **3,095 U.S. county governments**, exposing **42,735 internet-facing devices** (98% of all counties) to potential exploits. The study revealed critical gaps in security measures for public-facing nodes, databases, and online services—including school boards, wastewater systems, housing, elections, and emergency response infrastructure. Counties, often constrained by limited budgets, lack visibility into their cyberattack surface, making them prime targets for hackers seeking initial attack vectors. The exposed vulnerabilities (e.g., unpatched CVEs) risk compromising **sensitive citizen data**, disrupting **essential services** (water, elections, police response), and enabling cascading attacks on regional economies. While the researchers avoided active probing to prevent exacerbating risks, passive reconnaissance (via OSINT tools like Shodan/Censys) confirmed that poor cyber resilience at the local level could lead to **disastrous societal consequences**, including service outages, data breaches, or even threats to public safety if critical infrastructure (e.g., water treatment) is targeted.


National Association of Counties has 20.48% more incidents than the average of same-industry companies with at least one recorded incident.
National Association of Counties has 56.25% more incidents than the average of all companies with at least one recorded incident.
National Association of Counties reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
NAC cyber incidents detection timeline including parent company and subsidiaries

The National Association of Counties (NACo) is the only national organization that represents county governments in the United States. Founded in 1935, NACo assists America’s 3,069 counties in pursuing excellence in public service to produce healthy, vibrant, safe and resilient counties. NACo promotes sound public policies, fosters county solutions and innovation, promotes intergovernmental and public-private collaboration and provides value-added services to save counties and taxpayers money. With its headquarters on Capitol Hill, NACo is a full-service organization that delivers its services through its dedicated and skilled staff who comprise the following departments: Executive Management, Legislative Affairs, Public Affairs, County Solutions and Innovation, Information Technology, Finance and Administration and the Financial Service Corporation.


The Foundation for Alcohol Research and Education (FARE) is the leading not-for-profit organisation working towards an Australia free from alcohol harms. We approach this through developing evidence-informed policy, enabling people-powered advocacy and delivering health promotion programs. Austr

TCJE advances solutions and builds coalitions to end mass incarceration and foster safer Texas communities. Our three, often-intersecting goals are as follows: * Reverse the pipeline that pushes people into the justice system. We are fighting to reduce the number of people entering the system, i

The National Grain and Feed Association, founded in 1896, is a broad-based, non-profit trade association that represents and provides services for grain, feed and related commercial businesses. Its activities focus on enhancing the growth and economic performance of U.S. agriculture. NGFA member

HQN provides fast practical guidance on everything to do with housing. We’ve got everything covered – repairs and maintenance, housing management, governance, health and safety, lettings and allocations, estate services and more. Turn to us for advice and guidance on the hot topics – value for

The Virginia Department of Business Assistance, created by the Virginia General Assembly in 1996, provides a one-stop-service for technical assistance related to business formation, access to capital, and workforce development. VDBA works with existing businesses as they grow their workforce and men

Fay-Penn Economic Development Council's mission is to maintain and increase employment opportunities (jobs) in Fayette County in an effort to improve the quality of life for all of its residents. This mission is met through a comprehensive strategy of specific #economicdevelopment objectives. The or
.png)
County professionals and technology partners from across Maryland convened on November 20 for the inaugural MACo IT Affiliate Conference.
The U.S. House passed a bill to reauthorize the State and Local Cybersecurity Grant Program, a key priority for counties · NACo supports the reauthorization...
The PILLAR Act, which would renew federal cybersecurity grants to state and local governments for 10 years, passed by voice vote in the...
During Cybersecurity Awareness Month (October), the National Association of Counties (NACo) is offering exclusive scholarships that reduce...
Join county IT leaders to hear how they are defending local government systems, staff, and constituents from ever-increasing cyber-attacks.
The Trump administration wants CISA to transition to a “new model” for supporting local government agencies' cyber strategy.
The 77th Annual County Treasurers' Association of Texas Conference brought together county treasurers, financial leaders and policymakers...
Groups including the National Governors Association and NASCIO have signed a letter asking Congress to reauthorize the State and Local...
The Honorable John Thune Majority Leader U.S. Senate 511 Dirksen Senate Office Building Washington, D.C. 20510. The Honorable Chuck Schumer

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of National Association of Counties is http://www.naco.org.
According to Rankiteo, National Association of Counties’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, National Association of Counties currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, National Association of Counties is not certified under SOC 2 Type 1.
According to Rankiteo, National Association of Counties does not hold a SOC 2 Type 2 certification.
According to Rankiteo, National Association of Counties is not listed as GDPR compliant.
According to Rankiteo, National Association of Counties does not currently maintain PCI DSS compliance.
According to Rankiteo, National Association of Counties is not compliant with HIPAA regulations.
According to Rankiteo,National Association of Counties is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
National Association of Counties operates primarily in the Public Policy Offices industry.
National Association of Counties employs approximately 183 people worldwide.
National Association of Counties presently has no subsidiaries across any sectors.
National Association of Counties’s official LinkedIn profile has approximately 21,910 followers.
National Association of Counties is classified under the NAICS code 921, which corresponds to Executive, Legislative, and Other General Government Support.
No, National Association of Counties does not have a profile on Crunchbase.
Yes, National Association of Counties maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/nacodc.
As of November 28, 2025, Rankiteo reports that National Association of Counties has experienced 1 cybersecurity incidents.
National Association of Counties has an estimated 1,023 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with passive reconnaissance to avoid exacerbating vulnerabilities, containment measures with secure python application for data analysis, and communication strategy with publication in *journal of cybersecurity* (january 2025), communication strategy with media outreach to raise awareness, and enhanced monitoring with recommendation for counties to adopt continuous monitoring via osint tools (e.g., shodan, censys)..
Title: Holistic Assessment of U.S. County Governments' Cyber Attack Surface
Description: Researchers at the University of Maryland conducted a study to assess the cyber attack surface of U.S. county governments, identifying vulnerabilities in 42,735 internet-facing devices across 3,095 counties (98% of all U.S. counties). The study, published in January 2025 in the *Journal of Cybersecurity*, highlighted systemic gaps in cybersecurity resilience at the county level, emphasizing risks to sensitive citizen data, emergency services, elections, water supply, and local economies. The research relied on passive reconnaissance tools (e.g., Shodan, Censys) and OSINT to map vulnerabilities without exacerbating risks. Key findings underscore the urgency of addressing cybersecurity in underfunded local governments, which are often targeted as 'weakest links' by threat actors.
Date Publicly Disclosed: 2025-01
Type: Research Study
Vulnerability Exploited: Unspecified CVEs identified via Shodan/Censys scansPublic-facing nodes and databases with inadequate security controls
Motivation: Academic ResearchPublic AwarenessPolicy Advocacy
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Systems Affected: 42,735 internet-facing devices across 3,095 U.S. counties
Operational Impact: Potential risks to emergency services, elections, water supply, and local economies due to unaddressed vulnerabilities
Brand Reputation Impact: Highlighted systemic neglect of county-level cybersecurity, risking public trust in local government digital services
Identity Theft Risk: ['Sensitive citizen data (e.g., housing, permits, elections) at risk due to inadequate protections']

Entity Name: U.S. County Governments (3,095 counties, 98% coverage)
Entity Type: Local Government, Public Sector
Industry: Government Administration, Public Services, Critical Infrastructure (e.g., water, elections)
Location: United States (all 50 states)
Size: Varies (small to large counties)
Customers Affected: U.S. citizens relying on county services (e.g., schools, housing, emergency response)

Containment Measures: Passive reconnaissance to avoid exacerbating vulnerabilitiesSecure Python application for data analysis
Communication Strategy: Publication in *Journal of Cybersecurity* (January 2025)Media outreach to raise awareness
Enhanced Monitoring: Recommendation for counties to adopt continuous monitoring via OSINT tools (e.g., Shodan, Censys)

Sensitivity of Data: Potential exposure of citizen data (e.g., housing, permits, elections, emergency services)
Personally Identifiable Information: Risk of PII exposure due to unpatched vulnerabilities in public-facing systems
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by passive reconnaissance to avoid exacerbating vulnerabilities, secure python application for data analysis and .

Lessons Learned: County governments are critically under-resourced for cybersecurity, despite managing sensitive data and infrastructure., Passive reconnaissance tools (e.g., Shodan, Censys) can effectively map attack surfaces without increasing risk., Lack of visibility into county-level vulnerabilities creates systemic risks for elections, emergency services, and public trust., Collaborative research can drive policy changes and resource allocation for local government cybersecurity.

Recommendations: Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools., Develop standardized cybersecurity frameworks tailored to local governments., Prioritize patching of known CVEs in county IT infrastructure., Enhance public-private partnerships to share threat intelligence and best practices.Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools., Develop standardized cybersecurity frameworks tailored to local governments., Prioritize patching of known CVEs in county IT infrastructure., Enhance public-private partnerships to share threat intelligence and best practices.Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools., Develop standardized cybersecurity frameworks tailored to local governments., Prioritize patching of known CVEs in county IT infrastructure., Enhance public-private partnerships to share threat intelligence and best practices.Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools., Develop standardized cybersecurity frameworks tailored to local governments., Prioritize patching of known CVEs in county IT infrastructure., Enhance public-private partnerships to share threat intelligence and best practices.Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools., Develop standardized cybersecurity frameworks tailored to local governments., Prioritize patching of known CVEs in county IT infrastructure., Enhance public-private partnerships to share threat intelligence and best practices.
Key Lessons Learned: The key lessons learned from past incidents are County governments are critically under-resourced for cybersecurity, despite managing sensitive data and infrastructure.,Passive reconnaissance tools (e.g., Shodan, Censys) can effectively map attack surfaces without increasing risk.,Lack of visibility into county-level vulnerabilities creates systemic risks for elections, emergency services, and public trust.,Collaborative research can drive policy changes and resource allocation for local government cybersecurity.

Source: Journal of Cybersecurity (UK)
Date Accessed: 2025-01

Source: University of Maryland College of Information Studies
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Journal of Cybersecurity (UK)Date Accessed: 2025-01, and Source: University of Maryland College of Information Studies.

Investigation Status: Completed (published in January 2025)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Publication In *Journal Of Cybersecurity* (January 2025) and Media Outreach To Raise Awareness.

Stakeholder Advisories: Urgent Need For Federal/State Support To Address County-Level Cybersecurity Gaps.
Customer Advisories: Citizens advised to monitor county communications for updates on service security
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Urgent Need For Federal/State Support To Address County-Level Cybersecurity Gaps, Citizens Advised To Monitor County Communications For Updates On Service Security and .

High Value Targets: Public-Facing Databases, Election Systems, Emergency Service Networks,
Data Sold on Dark Web: Public-Facing Databases, Election Systems, Emergency Service Networks,

Root Causes: Chronic Underfunding Of County Cybersecurity Programs, Lack Of Standardized Security Protocols Across Local Governments, Limited Visibility Into Attack Surfaces Due To Decentralized It Management, Over-Reliance On Outdated Or Unpatched Systems,
Corrective Actions: Advocate For Federal/State Cybersecurity Grants For Counties, Establish A National Repository For County-Level Vulnerability Data (Anonymized), Mandate Regular Cybersecurity Audits For Local Governments, Develop Training Programs For County It Staff On Threat Detection And Response,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Recommendation For Counties To Adopt Continuous Monitoring Via Osint Tools (E.G., Shodan, Censys), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Advocate For Federal/State Cybersecurity Grants For Counties, Establish A National Repository For County-Level Vulnerability Data (Anonymized), Mandate Regular Cybersecurity Audits For Local Governments, Develop Training Programs For County It Staff On Threat Detection And Response, .
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-01.
Most Significant System Affected: The most significant system affected in an incident were 42,735 internet-facing devices across 3,095 U.S. counties.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Passive reconnaissance to avoid exacerbating vulnerabilitiesSecure Python application for data analysis.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Collaborative research can drive policy changes and resource allocation for local government cybersecurity.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enhance public-private partnerships to share threat intelligence and best practices., Develop standardized cybersecurity frameworks tailored to local governments., Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools. and Prioritize patching of known CVEs in county IT infrastructure..
Most Recent Source: The most recent source of information about an incident are University of Maryland College of Information Studies and Journal of Cybersecurity (UK).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed (published in January 2025).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Urgent need for federal/state support to address county-level cybersecurity gaps, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Citizens advised to monitor county communications for updates on service security.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.