02.08.2021 Views

Cyber Defense eMagazine August Edition for 2021

Cyber Defense eMagazine August Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

But how can leaders prepare <strong>for</strong> a ransomware attack that could take an entire organization’s system<br />

offline? While CISA’s ransomware checklist is a great place to start, organizations should ready a<br />

comprehensive ransomware preparedness strategy ahead of time that be adapted depending upon the<br />

severity of an attack. Here are four steps leadership should follow in developing a ransomware response<br />

strategy.<br />

1. Evaluate the Levels of Risk Ransomware Could Pose to Operations Ahead of Time and<br />

Conduct Tabletop Exercises<br />

Organizations need to understand where they are most vulnerable, from their most critical operations to<br />

other seemingly innocuous areas like HR or business records.<br />

In the case of Colonial, although the ransomware attack took down its payment system, company<br />

leadership also decided to shut down the pipeline’s oil production to mitigate damage. While some<br />

business operations may not be top of mind when thinking about potential ransomware impact, any<br />

business operation relying upon internet access is vulnerable. Organizations need to secure their most<br />

critical networks and think through how other business operations could be hampered by ransomware. If<br />

one segment of the business is compromised, it can have ripple effects across the entire enterprise.<br />

2. Develop a Business Continuity Plan<br />

It is critical to create a business continuity plan (BCP) and a disaster response plan (DPR) be<strong>for</strong>e any<br />

cyber incident, particularly a ransomware attack. These plans are critical to ensuring an organization can<br />

move quickly to get business up and running in the aftermath of an attack and mitigate damage. What<br />

systems could be held up by ransomware? Is valuable organization data backed up and encrypted<br />

regularly?<br />

In high-stakes situations like ransomware attacks, company decision-makers must be involved from the<br />

get-go. Which leaders should be interested in these early-stage conversations? How will customers, key<br />

stakeholders, and the public be notified of the attack? Which entities should be engaged to help mitigate<br />

any additional risk?<br />

Having plans in place is imperative but practicing them is also equally as important. Tabletop exercises<br />

are critical to helping business leaders and managers get acquainted with the protocol be<strong>for</strong>ehand.<br />

Knowing exactly who is responsible <strong>for</strong> what and what strategies should be deployed when is vital. Plans<br />

should be easily accessible, saved in a secure location, and even physically printed if an attack results<br />

in a total system compromise.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2021</strong> <strong>Edition</strong> 57<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!