{"id":9293,"date":"2022-03-25T19:45:26","date_gmt":"2022-03-25T19:45:26","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-gl\/?p=9293"},"modified":"2022-03-25T19:45:26","modified_gmt":"2022-03-25T19:45:26","slug":"call-for-heightened-cybersecurity-vigilance","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-bd\/blogs\/call-for-heightened-cybersecurity-vigilance\/","title":{"rendered":"CALL FOR HEIGHTENED CYBERSECURITY VIGILANCE"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9293\" class=\"elementor elementor-9293\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-61c25c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"61c25c8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6cc49b\" data-id=\"f6cc49b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b2da21 elementor-widget elementor-widget-text-editor\" data-id=\"9b2da21\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>The ongoing Russia-Ukraine conflict is mired in disinformation, propaganda, and cyber aggression like never before. Apart from the boots on the ground in Ukraine, the digital assault has been in progress for months. On\u00a0<a href=\"https:\/\/www.reuters.com\/world\/exclusive-ukraine-calls-hacker-underground-defend-against-russia-2022-02-24\/\" target=\"_blank\" rel=\"noopener\">both<\/a>\u00a0sides, hackers are at work to disrupt critical infrastructure and government entities.<\/p><p>According to experts, three main types of cyberwar tactics have been used (so far) in the Russia-Ukraine conflict \u2013 wipers, distributed denial of service (DDoS) attacks, and defacement\/fake news.<\/p><p>The \u2018hybrid warfare\u2019 has cybersecurity leaders on high alert for potential \u2018spillover effects\u2019 of the war. Cybersecurity measures have been tightened across nations based on various threat intelligence reports. As the conflict unfolds, governments around the world are urging organizations to be vigilant amid increasing cybersecurity threats:<\/p><ul><li>CISA launched its\u00a0<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-057a\" target=\"_blank\" rel=\"noopener\">#ShieldsUp campaign<\/a>\u00a0and provides a guide to protect against potential cyber intrusion.<\/li><li><a href=\"https:\/\/www.csa.gov.sg\/singcert\/Advisories\/ad-2022-001\" target=\"_blank\" rel=\"noopener\">Cyber Security Agency of Singapore (CSA)<\/a>\u00a0urged organizations to \u2018bolster their cyberdefence\u2019 to prevent web defacement, distributed denial of service (DDoS), and ransomware.<\/li><li><a href=\"https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/alerts\/australian-organisations-encouraged-urgently-adopt-enhanced-cyber-security-posture\" target=\"_blank\" rel=\"noopener\">Australian Cyber Security Centre (ACSC)<\/a>\u00a0is on high alert encouraging organizations to \u2018urgently adopt an enhanced cyber security posture\u2019<\/li><li><a href=\"https:\/\/www.theguardian.com\/uk-news\/2022\/jan\/28\/uk-firms-warned-over-possible-russian-cyber-attacks-amid-ukraine-crisis\" target=\"_blank\" rel=\"noopener\">UK data watchdog urges vigilance amid heightened cyber threat<\/a>\u00a0&#8211; British companies have been urged to bolster their digital security over concerns of possible Russian cyber-attacks linked to the growing political crisis in Ukraine<\/li><li>Following the\u00a0<a href=\"https:\/\/the-japan-news.com\/news\/article\/0008314910\" target=\"_blank\" rel=\"noopener\">Japanese government\u2019s<\/a>\u00a0announcement to impose economic sanctions on Russia, companies are on high alert for potential cyberattacks.<\/li><li>While the Indian government hasn\u2019t issued an official advisory, intelligence officials warn of a rise in cyberattacks in India.<\/li><\/ul><p><strong>What security checks can organizations implement?<\/strong><\/p><p>In this heightened cybersecurity scenario, vigilance is key to securing your organization. Apart from the advisories issued by CISA, CSA, and other cybersecurity agencies, secure yourself by paying close attention to your organization&#8217;s security measures:<\/p><ul><li>Assess your risk and attack surface areas<\/li><li>Define new security rules such as geolocation blocking<\/li><li>Run regular vulnerability assessment scans and look at known exploited vulnerabilities<\/li><li>Run phishing tests within the organization to reduce human error<\/li><li>Block all free VPN and TOR services<\/li><li>Follow top cybersecurity intelligence sources<\/li><li>Implement endpoint detection and response (EDR) solutions<\/li><li>Fortifying Human Firewall (Cybersecurity awareness and training)<\/li><\/ul><p>The devastating\u00a0<a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" target=\"_blank\" rel=\"noopener\">NotPetya<\/a>\u00a0attack against Ukrainian infrastructure only five years ago is a chilling reminder that today\u2019s cyber-threat landscape is rapidly evolving. Anonymous hacktivists, ransomware groups, and underground hacking groups are crowd-sourcing attacks along with state-sponsored hackers. The collective threat actors can wreak havoc on critical infrastructure of any country. For instance,\u00a0<a href=\"https:\/\/www.reuters.com\/technology\/russia-based-ransomware-group-conti-issues-warning-kremlin-foes-2022-02-25\/\" target=\"_blank\" rel=\"noopener\">Conti<\/a>, Russia-based ransomware group are crowd-sourcing attacks and also warning other states to stay away from the conflict. According to the US Cybersecurity and Infrastructure Security Agency (CISA), &#8220;Conti actors are known to exploit legitimate remote monitoring and management software and remote desktop software as backdoors to maintain persistence on victim networks.&#8221;<\/p><p>Cybersecurity experts have long warned that nations could engage in cyber-attacks against one another in order to gain an advantage in a conflict. The ongoing war is &#8216;stress-testing&#8217; security systems, shedding light on the important aspects of national security policy, exposing weaknesses in critical infrastructure and raising concerns about whether cyber-attacks could escalate into broader conflicts. That makes it increasingly necessary to secure networks and systems, especially around identity and access control, network monitoring, and supply chain security.<\/p><p>The Russian cyberattack on Ukraine is the most brazen and destructive act of cyberwar. It is also a sign of things to come. As digital technologies continue to proliferate and interconnect, states and other actors will become increasingly willing to launch cyberattacks that can cripple economies, governments, and social order. The world is entering a new era of cyber insecurity. In times of crisis, the private sector must take the lead in developing offensive cyber capabilities. Countries need proactive enterprises to serve as the front line of defense against malicious cyberactivity. As the Russia-Ukraine crisis has escalated, one question has become critical to understanding the conflict\u2019s scope and implications: how does it affect the future of cybersecurity?<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The ongoing Russia-Ukraine conflict is mired in disinformation, propaganda, and cyber aggression like never before. Apart from the boots on the ground in Ukraine, the digital assault has been in progress for months. On\u00a0both\u00a0sides, hackers are at work to disrupt critical infrastructure and government entities. According to experts, three main types of cyberwar tactics have &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-bd\/blogs\/call-for-heightened-cybersecurity-vigilance\/\"> <span class=\"screen-reader-text\">CALL FOR HEIGHTENED CYBERSECURITY VIGILANCE<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":6,"featured_media":15131,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[109],"tags":[126,130,131,132],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/posts\/9293"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/comments?post=9293"}],"version-history":[{"count":0,"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/posts\/9293\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/media\/15131"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/media?parent=9293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/categories?post=9293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/tags?post=9293"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/whitepapers?post=9293"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-bd\/wp-json\/wp\/v2\/case_studies?post=9293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}