The FireEye cyber-attack is a signal to all organizations that delay of critical resources toward information technology infrastructure and planning can no longer wait. The FireEye event will shift the cyber-attacks into overdrive, and 2021 will end with numerous organizations not only suffering a cyber-attack, but potentially suffering an attack that will mean the termination of operations. All hope should not be lost. There are several actions organizations can take now to add a line of defense in an effort to reduce the risk facing all organizations:
- Understand and practice the incident response plan (IRP) with disaster recovery and business continuity specifics. Have these documents downloaded to paper in case the systems are unavailable. Make sure the IRP has contact information on cyber coverage, internal incident response team members, and key outside vendor contacts, including outside counsel.
- Ensure your IT security professionals are monitoring the specific countermeasures published and recommended by FireEye and other cyber firms. Staying on top of these issues and concerns is of critical importance. There are threats evolving every day and it is important to understand how the models are pivoting. The ransoms are no longer small or insignificant. The ransom demands have expanded significantly and are, many times, crafted with knowledge about the organization. In the past year the threat model has been enhanced to perform significant reconnaissance and exfiltration of information prior to unleashing the ransom. Once the organization's files are encrypted and the ransom note is released, it is too late – the damage has largely been done. This should be of grave concern to organizations with confidential information and trade secrets, personal information for customers or employees, and certainly for those who rely on systems for executing their business, whether it be supply chain, e-commerce, health care or technology. In other words, every organization, large or small, can be subject to a devastating cyber-attack.
- Use this event as an opportunity to continue the risk discussion within your organization. Management should be gathering key department leads to understand the issues and develop a culture of risk management and planning. Operations leads should be key players with the management team and IT to develop a robust understanding and program.