Companies know they need stronger cybersecurity, the question is how?


Ransomware attacks hit healthcare organizations during coronavirus pandemic despite efforts by some hackers to reduce efforts – AFP

He The White House urges private companies operating in the United States to better protect themselves from ransomware attacks. While this is an important proclamation, it has come to light that many companies do not know where to start strengthening their cybersecurity.

In recent weeks, major cyberattacks have paralyzed the JBS meat packaging company i Colonial Conduct. These cases, taken from recent headlines, show how large companies can be reached at the event stopped by a targeted attack.

These events are also expensive. Joseph Blount, CEO of Colonial Pipeline Co., he told the Wall Street Journal which ended up authorizing a $ 4.4 million ransom payment to hackers behind the cyberattack.

According to a new analysis by Ric Longenecker, CISO at Open Systems, there is a lot of work to be done within the corporate world.

Longenecker explains Digital newspaper: “We continue to see an increase in ransomware attacks that require millions of dollars in rescue payments to keep essential infrastructure intact.”

Longenecker says the ebb and flow of corporate life results: “Many companies have an ongoing challenge to properly assess their infrastructure, regardless of a myriad of vulnerabilities.”

He adds that “while the White House could be involved in this week’s ransomware attack on JBS, we won’t see that kind of response for many companies. Most traditional internal security programs are simply not able to deal effectively with current risks. ”

This situation needs to change, says Longenecker: “It is critical that companies turn to solutions such as managed detection and response (MDR), for example. MDR combines operational experience and human experience, advanced threat detection and technological capabilities based on artificial intelligence to allow teams to react earlier by protecting the company.

Without sufficient security for each hardware component and its supply chain, the hardware itself cannot be trusted.

Returning to his day-to-day role, Longenecker concludes, “Our continued advice to our clients is: find a partner, work now to prevent security breaches before they affect you, and establish a strong recovery plan.”

Source link