02.11.2021 Views

Cyber Defense eMagazine November Edition for 2021

Cyber Defense eMagazine November Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

Cyber Defense eMagazine November Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

● Stop the bleeding: Segregate the system or systems from the networks so you can reduce<br />

the damage and keep other parts of your business running.<br />

● Maintain backups: Be sure you regularly review backups of your data so that you can<br />

recover with as little loss as possible. If a full restore will take longer than you can tolerate,<br />

prioritize the data and applications to be restored in order of importance.<br />

● Create and update response plans: These strategies should include such things as<br />

immediate containment tasks, chain of command, disaster recovery processes and more. Update<br />

these regularly whereas new threats are constantly emerging, personnel can leave key posts and<br />

infrastructure changes.<br />

● Assess and test: Per<strong>for</strong>m risk assessments and network penetration tests. This includes<br />

conducting table-top exercises so IT and executives can define and refine the response plan.<br />

● Go phishing: Employees are often the way into a company’s network, particularly now<br />

whereas remote workers often have lax security. Test them with fake phishing attempts and be<br />

sure to regularly conduct preventative training.<br />

Fuel <strong>for</strong> thought<br />

Some attacks I’ve seen have been investigated internally, but typically, these ef<strong>for</strong>ts don’t include a<br />

<strong>for</strong>ensic chain of custody that provides the chronological electronic evidence needed <strong>for</strong> a court of law. I<br />

make this distinction because I believe it’s very difficult <strong>for</strong> a company to get all the data that they need<br />

in order to take legal action that may result from a ransomware or other type of attack.<br />

If an organization uses a managed services provider (MSP) to get the cloud-based services they need,<br />

they likely won’t need to hire a <strong>for</strong>ensic investigator to delve deeper. For that matter, an MSP can defray<br />

a lot of costs, concerns and aggravation, particularly if they cater to industries that deal with financial and<br />

sensitive data. MSPs tend to have the best security in place, constantly invest in new technology and<br />

have experts versed in best practices and fast recovery. And, it doesn’t hurt to have a team that can take<br />

a calm, collected approach during chaos.<br />

The Colonial Pipeline attack has indeed given CIOs “fuel <strong>for</strong> thought.” In a way, that’s good, after all, the<br />

frequency of ransomware and other threats is on the rise. Your organization could be next – so be sure<br />

you’re ready.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2021</strong> <strong>Edition</strong> 45<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!