New

The Legacy Systems Putting Cities at Risk

5 minutes
Business
Sophia Barnett photoSB
Sophia Barnett

Technical Marketing Writer


Online services, cloud platforms, and smart city systems have expanded their digital footprint and increased local governments’ exposure to ransomware. Attackers understand that cities and counties often lack the resources, staffing, and governance structures needed to defend themselves, which makes them some of the most frequently targeted public institutions. 

In this blog, we’ll discuss some of the biggest structural weaknesses that leave local governments vulnerable to ransomware and what needs to change in order to ensure resilience. 

Local IT teams are outnumbered 

Local governments operate with extremely small IT and cybersecurity teams. Security Today claims that more than 80% of SLTT (State, Local, Tribal, and Territorial) government entities have fewer than five dedicated cybersecurity employees, and 70% cite insufficient funding as their top security concern. 

They also face persistent staffing shortages that undermine their ability to manage cybersecurity and core IT operations. A study on Urban Governance reports that many operate “with limited resources and expertise.” These constraints affect daily IT work and long-term planning. The study also highlights that “limited budgets and staffing limit the capacity of local governments to implement effective cybersecurity measures.” 

These workforce limitations directly increase ransomware risk. Small generalist teams rarely have the time or specialization needed to harden systems, validate backups, or monitor early signs of compromise. When essential tasks like backup testing, restore validation, and continuous monitoring fall behind, ransomware actors gain more opportunities to infiltrate systems and corrupt data. 

Legacy systems create predictable openings for ransomware 

Legacy infrastructure remains one of the most significant and persistent weaknesses in local government environments. Many cities and counties still rely on aging servers, unsupported operating systems, outdated backup appliances, and long‑standing applications that were never designed for modern threat models. 

These systems introduce several predictable risks: 

  • They accumulate unpatched vulnerabilities that ransomware groups actively scan for. 
  • They lack modern authentication, segmentation, and logging capabilities. 
  • They depend on manual processes that small teams struggle to maintain. 
  • They often cannot integrate with newer security tools or monitoring platforms. 

Ransomware actors target legacy systems because they are easier to compromise and harder for understaffed teams to defend. Once inside, bad actors use these older systems as footholds to move laterally, escalate privileges, and locate backup repositories. 

Legacy systems also complicate recovery. Outdated hardware and software often require slow, manual rebuilds, which can extend a company’s downtime and intensify pressure to pay ransom demands. 

Ransomware thrives in environments with low visibility 

Ransomware groups rely on stealth. They exploit unmonitored systems, unpatched vulnerabilities, and gaps in logging or alerting. Many local governments struggle to maintain visibility across their environments because they lack the staff needed to track intrusion attempts, detect anomalies, or confirm whether a breach has occurred. 

This lack of situational awareness allows ransomware to spread quietly, escalate privileges, and target backup systems before triggering encryption. Without continuous monitoring and rapid detection, local governments often discover attacks only after critical systems are already locked. 

Smart city systems expand the attack surface 

Cities are adopting IoT devices, cloud platforms, and interconnected digital services. These technologies improve efficiency and service delivery, but they also introduce new vulnerabilities. The Urban Governance review notes that smart city systems “expose local governments to novel security vulnerabilities and risks.” 

Ransomware groups increasingly exploit these systems because they are often deployed quickly, managed inconsistently, and lack strong authentication or segmentation. Each new device or integration point becomes another potential foothold for attackers. 

Governance gaps create openings for ransomware 

Many local governments lack the governance structures needed to support cybersecurity. This includes formal policies, standardized practices, clear roles and responsibilities, and defined recovery strategies. Without these foundations, even well‑intentioned IT teams cannot build a reliable recovery plan. 

Governance gaps lead to inconsistent patching, unclear ownership of systems, and slow or incomplete incident response. Ransomware actors take advantage of these inconsistencies to move laterally, escalate privileges, and target backup repositories. 

What needs to change: an adoption of Absolute Immutability 

Ransomware actors increasingly target backups because they know that if they can encrypt or delete recovery data, they gain maximum leverage. Traditional backup systems are not designed to withstand modern ransomware techniques. They rely on permissions, policies, and administrative controls that attackers can compromise. 

Absolute Immutability tips the odds back in favor of local governments. It ensures that once data is written, it cannot be altered, encrypted, or deleted for a defined retention period. Not by ransomware, compromised credentials, or even natural disasters.  

For local governments with small teams and limited resources, Absolute Immutability provides a much-needed safeguard: 

  • It prevents ransomware from corrupting or encrypting backup data. 
  • It ensures clean, recoverable copies exist even during an active attack. 
  • It reduces reliance on complex security configurations that small teams struggle to maintain. 
  • It shortens recovery time and minimizes service disruption. 

When ransomware actors cannot touch backups, they lose their leverage. Recovery becomes predictable, fast, and controlled. 

Build ransomware resilience now 

Local governments are facing ransomware that’s becoming increasingly fine-tuned in frequency, complexity, and impact. Their ability to respond is constrained by limited staffing, legacy systems, insufficient visibility, expanding digital systems, and governance gaps. Absolute Immutability provides a foundation for resilience that does not depend on large teams or complex security architectures. 

To learn how SLED organizations can strengthen ransomware defenses and build a recovery‑ready infrastructure, download the full white paper: Achieving Ransomware Resilience in SLED Environments