Ukraine and Cyber Security
With Russia’s military attack on Ukraine, the threat of cyberattacks has increased, not just for Ukrainian government agencies and companies, but worldwide. It is likely that Russia will respond to sanctions by using its considerable cyber capability. In fact, accelerated cyber attacks are already underway directed at Ukraine and may expand to nation states providing financial or military support to Ukraine, especially the U.S.
Is your organization at risk?
While the DHS has no information to suggest a specific cyber-security threat against U.S. companies, it’s everyone’s responsibility to be prepared. There have been attacks directed at Ukrainian government agencies, financial institutions and internet services which could indicate similar attacks in the west.
What you can do
Take a proactive approach to risk management and understand that geo-political risk is a component. As part of your proactive approach:
- Review your cyber incident and recovery plans and procedures to ensure they are current
- Enable Geolocation Blocking on firewalls and block all Russian public IP addresses
- Scan your entire network for any unusual activities or malware
How ConvergeOne can help
Our engineering resources are on high alert for the possibility of cyber attacks against U.S. businesses and government agencies and we can’t stress enough the importance of staying vigilant and prepared. ConvergeOne’s Cyber Security practice can help organizations with their cyber defense to prevent, detect, and recover from cyber threats and attacks, including those arising from geo-political events.
- PREVENT – Update Threat Defense
- DETECT – Vulnerability Management (VM) and real-time Managed Detection and Response (MDR)
- RECOVER – Cyber Recovery Services
ConvergeOne is committed to our customer’s overall business success, including providing a sound cyber security posture. A ConvergeOne Cyber Security and Ransomware Readiness Workshop is a good step in understanding your current posture, identifying potential gaps and laying out steps for improvement.
Click below to learn more and connect with one of our Cyber Security assessment experts:
|