{"id":34171,"date":"2022-03-04T06:40:54","date_gmt":"2022-03-04T11:40:54","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=34171"},"modified":"2022-03-04T09:28:00","modified_gmt":"2022-03-04T14:28:00","slug":"email-russias-secret-cyberweapon-how-to-protect-your-companys-intellectual-property-and-digital-assets","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/email-russias-secret-cyberweapon-how-to-protect-your-companys-intellectual-property-and-digital-assets\/","title":{"rendered":"Email: Russia\u2019s Secret Cyberweapon? How to Protect Your Company\u2019s Intellectual Property and Digital Assets"},"content":{"rendered":"

We walk through a few steps to protect yourself and your employees from cyberterrorism groups, specifically looking at email security.<\/h2>\n
\n

The crisis in Ukraine is more than an armed conflict. In fact, the war could escalate from the battlefield to your company\u2019s smartphones, desktops, laptops and networks through a weapon you least suspect \u2013 email.<\/p>\n

Since the start of the crisis, cybersecurity threats have increased for organizations around the world, mostly from Russian-backed cyberterrorism groups. What most people don\u2019t realize is that email is the easiest way for cybercriminals to launch attacks that can hold business for ransom, steal data, disrupt operations and more. All they need is for one employee to click a link in an infected email to launch malware or ransomware in your organization.<\/strong><\/p>\n

Why is email so vulnerable? Because many organizations haven’t put the necessary protections in place to protect against attacks. Fortunately, IT leaders and security experts have access to both short-term and long-term mechanisms to protect their organizations and data.<\/p>\n

What To Do Now: Email Security Settings and Communication<\/h2>\n

The first steps in protecting your organization from malicious email attacks do not have to be a costly, time-consuming endeavor. You can keep most of those messages out of your employees\u2019 inboxes or better manage them with two simple steps:<\/p>\n

    \n
  1. Check your company\u2019s email security settings.<\/strong> Tools such as Exchange Server, Exchange Online, and Gmail have \u201cdefault\u201d settings out-of-the-box. Many organizations simply adopt these settings when configuring email, but they may not meet your organization\u2019s security needs. You need to evaluate and implement these advanced capabilities, like Advanced Threat Protection, as soon as possible to head off attacks before they hit your employees\u2019 email inboxes.<\/li>\n
  2. Tell employees they should watch for suspicious messages.<\/strong> Cybercriminals even use warnings of unauthorized logins from Russia or Ukraine to encourage email recipients to click on a link. Remind employees of your policy for reporting suspicious emails, and explain the remediation efforts you have implemented, how these might affect their day-to-day work, and any recommended workarounds.<\/li>\n<\/ol>\n

    Finally, remember effective communication and security awareness starts with leadership.<\/strong> If you do not have leaders on board and effective security awareness training programs in place, start addressing those needs now.<\/p>\n

    What to Plan for the Future<\/h2>\n

    To be sure, the impact of cyberattacks can be devastating. For example, last year\u2019s Colonial Pipeline attack<\/a> cost that company $4.4 million in ransom paid to hackers. Like many costly software attacks, Colonial Pipeline resulted from failure to implement Multi-Factor Authentication (MFA). MFA is one of two longer-term actions you should evaluate to ward off future attacks:<\/p>\n

      \n
    1. MFA is the most critical need for securing employee identities and minimizing attack risk. Many organizations still have not fully adopted an MFA solution, often because leadership is not aligned around MFA or other security measures. However, avoiding MFA not only puts the business at risk but also may prevent the company from acquiring or renewing cybersecurity insurance.<\/strong><\/li>\n<\/ol>\n

      Microsoft has noted<\/a> even the U.S. government\u2019s Office of Management and Budget recommends appointing a Zero-Trust strategy<\/a> implementation officer to build alignment around security solutions such as MFA \u2014 an approach that applies to businesses, too.<\/p>\n

        \n
      1. Other device-management solutions, such as Microsoft Intune<\/a>, can protect mobile devices such as phones, tablets and laptops accessing your corporate systems. With increasing reliance on hybrid work, such tools ensure people access corporate systems from corporate approved and registered devices, including personally owned devices.<\/li>\n<\/ol>\n

        An Expanding Threat?<\/h2>\n

        The U.S. Pentagon now refers to the Ukraine crisis as the world’s first \u201c360 war,\u201d fought on many fronts besides the battleground \u2014 and the threat will persist long after peace returns to Ukraine.<\/p>\n

        Remember: Cybersecurity is everyone\u2019s job, not just IT\u2019s.<\/strong> Strive to create a culture of Zero Trust within your organization. The future of your company, and maybe even our country, could depend on it.<\/p>\n","protected":false},"excerpt":{"rendered":"

        We walk through a few steps to protect yourself and your employees from cyberterrorism groups, specifically looking at email security.<\/p>\n","protected":false},"author":112,"featured_media":34173,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[18559],"coauthors":[15563],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2024-07-21 22:47:41","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/34171"}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=34171"}],"version-history":[{"count":0,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/34171\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/34173"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=34171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=34171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=34171"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=34171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}