Decide & Do: 4.5 Ransomware Actions
Are you next? Will criminals target your organization with ransomware? No one can say for sure, so prepare now.
Here are four and a half critical decisions to make – and things to do – before a crisis hits.
(What’s half a decision, you ask? What’s half an action, you may wonder. Read to end if you want to find out).
1. Do: Have a plan
This sounds so obvious, but I have seen major organizations in business and government scrambling to respond to a ransomware attack. Your plan should include at least these elements?
Six Ways AST Keeps Digital Citizen Services Secure
Article originally posted to the GovDevSecOpsHub here.
When in-person processes became impossible during the pandemic, the extent to which public sector services relied on them became apparent. Town halls, municipal offices, schools, and colleges were forced to close their doors to the public, and the need to provide digital alternatives to citizen services so that constituents could continue to access them became clear.
Getting Started with Zero Trust
Zero Trust may seem like a daunting security architecture to implement. But Zero Trust is more a change of mindset towards cybersecurity than it is new tools and solutions. Zero Trust is a concept that can help you simplify and strengthen your defenses by adopting “never trust/always verify” principles. The truth is you probably already have many of the tools you need to get started. In addition to using existing security solutions, new tools and technologies can be added incrementally.
Zero Trust 101
The COVID-19 pandemic has forced a rapid, widespread shift to remote work, necessitating a new approach to security. Many public sector agencies are responding by adopting a Zero Trust model.
What is Zero Trust? Why is it important? What’s required to implement it? Let’s explore.
What Is Zero Trust?
Colonial Pipeline Hack: Trouble Was the Result but Money was the Goal
The Colonial Pipeline hack by DarkSide created Malicious code that resulted in the pipelines shut down, FBI officials have confirmed. According to the company, the Colonial pipeline transports about 45% of the fuel consumed on the East coast. U.S. fuel prices at the pump rose six cents per gallon on the week to $2.967 per gallon for regular unleaded gasoline, the American Automobile Association (AAA) said on Monday, while Wall Street shares in U.S. energy firms were up 1.5%. The U.S. issued emergency legislation on Sunday after a ransomware cyber-attack hit the Colonial Pipeline.
Executive Order on Improving the Nation’s Cybersecurity
President Biden has recently issued the “Executive Order on Improving the Nation’s Cybersecurity”, which requires government agencies to present plans for implementing a Zero Trust architecture, imposes stringent standards for threat sharing on government contractors and agencies alike, requires software vendors to show a Software Bill of Materials to demonstrate the security of their products, and seeks broad modernization of the Federal government’s cybersecurity posture.
Pipeline Infrastructure: Reducing Cyber Risk
The United States’ pipeline infrastructure, which carries oil, natural gas, and other commodities, is made up of nearly 3 million miles of pipelines. This vital enabler of domestic economic and national security is under constant threat of cyber attack due to its increasing reliance on automation through information technology.
The Colonial Pipeline Hack: It’s Real, It Will Happen Again, and We Must Be Prepared
- Read more about The Colonial Pipeline Hack: It’s Real, It Will Happen Again, and We Must Be Prepared
Hackers recently attacked computer systems belonging to the Colonial Pipeline company, forcing them to shut down operations and inhibiting delivery of diesel fuel, gasoline, and jet fuel throughout the East Coast of the United States. The company has responded quickly but cautiously and expects to resume normal operation very soon. In the meantime, a declaration of emergency from the White House allows extended operation of other means of petroleum transport.
Don Maclean on Trusting Zero Trust Architecture
Original article published by Signal Magazine here.
Many federal government agencies are interested in improving their cybersecurity by moving to a zero trust architecture model. But such a move, while very beneficial to the organization, is a complex and involved process that requires some fundamental changes in how security and operations are approached, says Don Maclean, chief cybersecurity technologist for DLT Solutions.
Not an Isolated Incident – Attacks Against Critical Infrastructure Are Not Going Away
Earlier this year, a downright chilling cyberattack against our nation’s critical infrastructure was exposed and reported in Oldsmar, Florida, a town of fewer than 14,000 people just outside of Tampa. The attack was targeted against a local water treatment facility and – if successful – could have managed to poison the area’s water supply.