Friday, May 27, 2022
  • Home
  • Event
  • Technology
  • Program
  • Education
No Result
View All Result
E-Capitals
No Result
View All Result
Home Technology

5 cybersecurity tips for companies that own and operate critical infrastructure

admin by admin
May 5, 2022
in Technology
0
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

Related Posts

University of Washington microscope does it all – GeekWire

Robotic exoskeleton startup wins Oregon life and biosciences angel competition – GeekWire

Seattle startup JetClosing, which launched in 2016 to digitize home closing process, is shutting down – GeekWire

Seattle University aims to boost entrepreneurship – GeekWire

Jerry Leishman. (Photo courtesy of Leishman)

Congress passed a new law in March that requires organizations responsible for critical infrastructure to report cybersecurity incidents to the Cybersecurity Infrastructure Security Agency (CISA) within 72 hours. The bill also states that CISA must be notified of ransomware payments within 24 hours.

This law — Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) — follows “evolving intelligence” and alerts for Russian government cyberattacks amid Russia’s invasion of Ukraine.

In light of the new legislation, we caught up with Jerry Leishman, executive vice president at CORTAC Group, a Seattle-area firm that provides security and compliance help to companies including U.S. Department of Defense supply chain and commercial contractors.  

Leishman, a former Microsoft manager, shared five tips for companies to stay secure online. He emphasized that cybercriminals aim for easy targets that are not covering basic hygiene and therefore easy to compromise.

  • Use multifactor authentication (MFA). Although multifactor authentication is not a silver bullet to security, Alex Weinert, director of identity security at Microsoft, estimates that using MFA makes security breaches 99.9% less likely. Securing accounts with MFA helps as companies grapple with increased breaches as a direct result of remote work campaigns where employees access company assets through personal devices. Leishman suggested all end users apply MFA to third party devices.
  • Maintain business continuity. If your company is hit with ransomware, having stable backups to pivot to will circumnavigate having to pay the ransom (where there is no guarantee that the malicious actor will give the correct key for decryption). In the U.S. alone, ransomware payments cost more than $590 million during the first half of 2021, an increase from $416 million in 2020. Leishman recommends regular, if not daily, backups to foster strong resiliency in the face of an attack.
  • Use endpoint protection. Threats tend to congregate at trust boundaries, or where information is exchanged in cyberspace. Endpoint protection analyzes data before they flow through these boundaries to prevent malware from entering the network. Local startups and major companies sell endpoint protection software solutions for companies seeking to outsource rather than build software. Leishman suggests having “tabletop” exercises where security practitioners simulate an attack to find weak points in the incident response model.
  • Have an incident response plan. The National Institute of Standards and Technology, the organization responsible for U.S. security standards, provided recommendations for incident response. Affected organizations should have a clear plan and points of contact on staff to handle responses during an incident.
  • Protecting the human factors. Security practitioners recognize humans as the weak link in security. Deloitte reported that 91% of cyberattacks begin with a successful phishing attempt where a user clicks on a link or willingly gives a malicious actor their credentials. Access inside a network is critical for complex malicious actors to initiate the reconnaissance stage of the cyber kill chain. Reconnaissance allows malicious actors to begin collecting information about a network and its users to initiate a more devastating attack or pursue lateral movement. The human vulnerability can be mitigated through end-user training and by strict roles-based access that abides by the principle of least privilege where a user can only access what is necessary to complete their job.

Next Post

When State Laws Challenge an Event’s Values

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts

Technology

University of Washington microscope does it all – GeekWire

by admin
May 27, 2022
0

https://www.youtube.com/watch?v=5-t8WiLIqw8 Alpenglow’s microscope in action, visualizing the whole mouse brain and other samples. (Adam Glaser Video) A new study showcases...

Read more

University of Washington microscope does it all – GeekWire

Robotic exoskeleton startup wins Oregon life and biosciences angel competition – GeekWire

Seattle startup JetClosing, which launched in 2016 to digitize home closing process, is shutting down – GeekWire

Seattle University aims to boost entrepreneurship – GeekWire

Fishery monitoring software wins $25K at Univ. of Washington student startup competition – GeekWire

Elizabeth Scallon departs Amazon for HP; Fauna hires marketing exec; and more – GeekWire

Load More

Popular Posts

Best Winter Olympics Activities for Kids in the Classroom

by admin
January 19, 2022
0

What is Packet Sniffing Attack? – Types and How to Prevent It?

by admin
December 11, 2021
0

Zain Nadella, 1996-2022: Microsoft CEO’s son remembered for love of music, bright smile, profound impact on his dad

by admin
March 1, 2022
0

Copyright © 2021 - e-Capitals.com DESIGNED AND DEVELOPED BY TEAM WORDPRESS BLOGX

No Result
View All Result
  • Home
    • Home 1
    • Home 2
    • Home 3
  • Event
  • Technology
  • Program
  • Education

Copyright © 2021 - e-capitals.com - DESIGNED AND DEVELOPED BY TEAM WORDPRESS BLOGX