If your inbox looks anything like ours it is full of news about the recent cyber attack which ransacked the Colonial Pipeline. In case you did not hear about it (in which case you live under a rock) here's a little recap of what occurred:
A U.S. drinking water treatment facility's cybersecurity was challenged when an unidentified cyber actor that gained access to the facility's supervisory control and data acquisition system. The actors were most likely accessed by finding soft spots in the treatment plants security system, such as weak password security and an outdated operating system. Several government organizations, including the FBI, Cybersecurity and Infrastructure Security Agency (CISA), Environmental Protection Agency (EPA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), have seen first-hand the cybersecurity criminals targeting and exploiting computer software on operating systems with end-of-life status to gain access to systems that they're not authorized to use. Click here to learn more about how you can protect your business from these criminals.
Here are our top ten security recommendations so you can ensure that your business doesn’t become the next victim:
Check out our Cybersecurity Awareness Training Webinar for more info.
*Source: https://us-cert.cisa.gov/ncas/alerts/aa21-042a