FAQs: Ukrainian - Russian Crisis Cyber Readiness
1Path is actively monitoring our client’s networks & infrastructure for abnormalities and suspicious activity, ensuring the latest patches and updates are applied, and making sure data is backed-up and secure per usual. If you still have concerns about whether or not you could be doing more to stay prepared and/or secure, please don’t hesitate to reach out to your 1Path account team for guidance.
- We are urging every client to take a very hard look at their current backup and recovery policies & procedures. In the event of the worst, when protection and detection fails, being prepared via recovery is how you save your business.
- Also take some time to review your current cyber-insurance policies, their coverage requirements, and any changes to them upon your upcoming renewal.
While there are no specific or credible cyber threats to the U.S. at this time, Russia’s attack on Ukraine has involved cyber-attacks on Ukrainian government and critical infrastructure organizations which could very well impact organizations both within and beyond the region, particularly in the wake of sanctions imposed by the United States and our Allies. As a result, every organization—large and small—must be prepared to respond to disruptive cyber activity.
- Make sure that ALL remote access to the organization’s network and administrative access requires Multi-Factor Authentication (MFA).
- Ensure that all software is up to date, prioritizing those with known exploited vulnerabilities.
- Confirm that all ports and protocols that are not essential for business purposes have been disabled.
- If you’re leveraging cloud services, ensure that strong controls such as those outlined in CISA’s guidance have been reviewed and implemented.
- If you have additional concerns, please reach out to your 1Path account team to discuss your options, we are here assist.
- Designate an internal incident response team with defined roles/responsibilities, including technology, communications, legal and business continuity.
- Maintain availability of key personnel and identify an emergency resources who you can leverage for surge support when responding to an incident.
- Conduct an actual tabletop exercise and role-play what you would do in the event of a breach to ensure all participants understand their roles as it relates to incident response
- Test backup procedures to ensure that critical data can be rapidly restored if you were to be impacted by ransomware or a destructive cyberattack and ensure that backups are isolated from network connections.
- If using industrial control systems or operational technology, conduct a test of manual controls to ensure that critical functions remain operable if your network is unavailable or untrusted.
DO YOU NEED SUPPORT?
CLIENT TICKETS RESOLVED MONTHLY
Headquarters: Kennesaw GA, 30144
General Inquiries email@example.com