Disaster Prevention and Recovery Plans Needed for Cybersecurity
Last year saw an increase of 20% in cyberattacks against organizations, said James Turgal, vice president of Optiv, during the first day of the CyberSatDigital conference.
The most common attack, with over 184 million reported last year, is known as a ransomware attack – when bad actors manage to hack a company through “malicious software” holding files and servers hostage for ransom, typically requested in the form of bitcoin. Ninety-three percent of all ransomware attacks come through a contaminated business email, said Turgal, who served for 22 years at the U.S. Federal Bureau of Investigations.
This is particularly worrisome as so many people continue working from home, so “now their routers and computers” have become part of the organization’s network and ecosystem, Turgal explained, guaranteeing that the 184 million reported was much less than the actual number. From 2019 to 2020 alone, ransomware attacks resulted in over $1 billion in global losses.
As cyberattacks attacks have become so common, it is no longer a matter of “if” or “when” an organization will be under a cyber threat but how the organization responds to an attack, said John Iannarelli, a retired FBI special agent executive with over two decades in federal cybersecurity.
The event comes on the heels of last week’s ransomware attack on the Colonial Pipeline, the nation’s largest pipeline that delivers fuel from Texas to the east coast. The conference also started a day before the Senate Committee on Homeland Security and Government Affairs hearing on the cybersecurity industry’s response, prevention and recovery following the Russian hack on SolarWinds.
As the country waits for President Biden to issue an executive order to bolster American cybersecurity, and potential federal regulation, it is vital that organizations ensure they have “robust disaster recovery plans,” said Phil Mar, chief technology office at Viasat. Organizations need to prepare for these the same way they prepare for weather emergencies, like hurricanes or floods, or even other disasters like a factory fire, he explained.
The Defense Department’s Cybersecurity Maturity Model Framework certification is a “good starting point” for modeling prevention and response plans, Mar said. But these plans need to “go above and beyond the CMMC” and mitigate the impact on operations, he urged. It is just as important to know how you will respond to a direct attack as what you will do if one of your key suppliers is hacked, he explained. “To be able to track every step” of a threat is a “monumental issue,” especially when everything is as “interconnected” as it is in today’s digital world. Unfortunately, he added, companies seem to do a better job on natural disaster recovery plans than on cybersecurity plans.
The most prevalent vector for these attacks is “phishing” – emails that look to be from a trusted source, requesting you to click on a link or input sensitive information. A lot of these hacking attempts incorporate social engineering, “human hacking” that targets the user to gain access into the system, said Rosa Smothers, senior vice president of cyber operations for KnowBe4. Emails, accidentally downloading a compromised app or even just checking your social media from your work computer, all add an extra level of risk as these employees become easier targets. And these social media attacks are far more common than the more “sophisticated” SolarWinds attack that reached 18,000 software customers, she added.
From simulations to “answer-response” employee training, “business continuity” plans “[need] to be continuous,” said Dr. Andrea Little Limbago, vice president of research and analysis at Interos. These plans need to keep up with the quick pace at which these attacks are evolving, she urged.
“The more you engage when it is not a crisis, the more confident you will be when there is one,” said Adam Lee, vice president and chief security office at Dominion Energy. Despite not yet knowing the extent of the Colonial Pipeline hack, the mere fact that they took operations offline was an “extraordinary move” that points to how connected their information technology and operational technology systems really are.
In The News
WASHINGTON -- A cybersecurity expert told a congressional panel Wednesday that private industry alone cannot be expected to effectively confront... Read More
WASHINGTON -- A cybersecurity expert told a congressional panel Wednesday that private industry alone cannot be expected to effectively confront the kinds of cyberattacks that have wreaked havoc on U.S. computer networks in recent years. He testified to a House Homeland Security subcommittee as it considers... Read More
WASHINGTON — The Federal Bureau of Investigation distributed a Flash report on Friday warning of indicators of compromise from the... Read More
WASHINGTON — The Federal Bureau of Investigation distributed a Flash report on Friday warning of indicators of compromise from the Hive ransomware known to have infiltrated business networks. The ransomware utilizes multiple mechanisms as attachments to gain access and “Remote Desktop Protocol” to operate once embedded,... Read More
U.S. Census Bureau computer servers were exploited last year during a cybersecurity attack, but it didn't involve the 2020 census,... Read More
U.S. Census Bureau computer servers were exploited last year during a cybersecurity attack, but it didn't involve the 2020 census, and hackers' attempts to keep access to the system were unsuccessful, according to a watchdog report released Wednesday. The attack took place in January 2020 on... Read More
WASHINGTON -- Congress took a stab Thursday at improving the nation’s cybersecurity as the federal government mobilizes more resources against... Read More
WASHINGTON -- Congress took a stab Thursday at improving the nation’s cybersecurity as the federal government mobilizes more resources against ransomware and hackers. Both President Joe Biden and members of a House Homeland Security subcommittee described threats to U.S. computer systems as a potentially devastating economic... Read More
RICHMOND, Va. (AP) — As a member of the secretive Senate Intelligence Committee, Sen. Angus King has reason to worry... Read More
RICHMOND, Va. (AP) — As a member of the secretive Senate Intelligence Committee, Sen. Angus King has reason to worry about hackers. At a briefing by security staff this year, he said he got some advice on how to help keep his cellphone secure. Step One:... Read More
WASHINGTON -- As the international blame game over ransomware heats up this week, the U.S. government is scrambling for solutions... Read More
WASHINGTON -- As the international blame game over ransomware heats up this week, the U.S. government is scrambling for solutions with increasingly combative strategies. Legislation that won tentative approval in Congress on Monday anticipates a bigger role for the U.S. government in overseeing cybersecurity of critical... Read More