Page 80 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 80

health  systems,  financial  companies,  and  manufacturing,  including  construction,  supply  chains,
            distribution, and sales.

            The impact of these attacks can take any number of forms, including: malware, including but not limited
            to,  ransomware  (which  disables  the  ability  to  access  IT-systems  until  a  ransom  is  paid);  business
            interruption (income lost because of the inability to access systems); data restoration (reconstructing
            “lost”  company  and  customer  data);  social  engineering/phishing  (loss  of  money  based  on  the
            impersonation of a colleague, client or vendor); regulatory fines and penalties; liability to third-parties if
            their information is compromised; and reputational harm. Estimates for losses for these events runs from
            $20 billion in ransomware costs alone for 2021 up to $10.5 trillion (or $20 Million per minute) expected to
            be lost/spent by 2025 to respond, address and fight these attacks globally.

            According to the Cybersecurity and Infrastructure Agency (CISA), the FBI and the NSA, the ongoing
            success of these ransomware attacks has only further encouraged cyberthieves around the globe and
            should put businesses of every size on high alert throughout 2022.

            Specifically,  CISA  has  advised  that  ransomware  attackers  are  focusing  their  attention  on  critical
            infrastructure industries throughout the US, including:

               •  Emergency water services
               •  Energy sector
               •  Communications
               •  Financial services
               •  Healthcare sector

            Despite these grim predictions, it is imperative to remember that there are myriad tools available  to
            protect businesses against and mitigate the impact of cyber-related events.



            Internal Security Protocols / Controls

            Cybersecurity experts have identified many of the key vulnerabilities that criminals manipulate to enter
            computer systems, and how to fix them, including:

               •  Multi-factor authentication tools to safely access internal computer systems
               •  Robust Desktop Security Protocols, including virtual private networks, data encryption, complex
                   passwords, firewalls, and restricted access to admin rights
               •  Active management of systems and configurations
               •  A continuous hunt for network intrusions and third-party exposure threats
               •  Update and upgrade software immediately
               •  Develop  and  exercise  a  system  recovery  plan,  including  regular  testing  of  backups  for  data
                   integrity  and  restorability  and  preparing  and  annually  testing  of  incident  response/  business
                   continuity plan









                                                                                                              80
   75   76   77   78   79   80   81   82   83   84   85