Protect the infrastructure
Cybersecurity

Hackers take $5 million from pipeline operators. This headline demonstrates how dangerous it is to neglect your Internet infrastructure.
Here are 12 tips on what companies should pay attention to.

The current coup by a Russian hacker group called Darkside clearly demonstrates that criminals can repeatedly gain access to IT networks. Often, access to your own data is then blocked. Only after the affected party has paid the required ransom will the data be released again. This type of blackmail has recently become more common. Industrial espionage remains another form. The aim is to obtain very secret information. 

IT security experts have long warned that every IT system can be cracked. It is mostly just a matter of time. And this is exactly where every company can start. The more secure your own system is, the less interesting it becomes for criminals because often the effort is then no longer worthwhile.

The American Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have recently issued clear recommendations to reduce the risk of being compromised by ransomware attacks.

12 Measures to protect the IT system

  • Require multi-factor authentication for remote IT networks.
  • Enable strong spam filters to prevent phishing emails from reaching users.
  • Filter emails that contain executable files
     
  • Implement a user education program and simulated spearphishing attacks to deter users from visiting malicious websites or opening malicious attachments, and urge appropriate user responses to spearphishing emails.
  • Filter network traffic to prevent inbound and outbound communications with known malicious IP addresses. Prevent users from accessing malicious websites by implementing URL block lists and/or website exception lists.
  • Update software, including operating systems, applications, and firmware on IT network resources in a timely manner. Consider using a centralized patch management system; use a risk-based assessment strategy to determine which OT network resources and zones to include in the patch management program.
  • Limit access to resources over networks, especially by restricting RDP. If RDP is determined to be operationally necessary after a risk assessment, limit the sources of origin and require multi-factor authentication. 
  • Set up anti-virus/anti-malware programs so that they perform regular scans of IT network resources with up-to-date signatures. Use a risk-based asset inventory strategy to determine how OT network assets are identified and examined for malware.
  • Implement protection against unauthorized execution by: Disabling macro scripts from Microsoft Office files that are transmitted via e-mail. Consider using Office Viewer software to open Microsoft Office files that are transferred via email instead of the full Microsoft Office suite applications.
  • Implementation of an application permission list that only allows systems to execute programs that are known and permitted in the security policy. Implement software restriction policies (SRPs) or other controls to prevent programs from being run from common ransomware locations, such as temporary folders that support popular Internet browsers or compression/decompression programs, including the AppData/LocalAppData folder.
  • Monitor and/or block incoming connections from Tor exit nodes and other anonymization services to IP addresses and ports for which no external connections are expected (i.e. other than VPN gateways, mail ports, web ports). 
  • Use signatures to detect and/or block incoming connections from Cobalt Strike servers and other post-exploitation tools.

Ralf Johanning

Ralf Johanning studied political science and works as a freelance journalist. For over ten years now he reports on the transportation and logistics industry. The priorities include topics such as telematics, software, and ICT. In 2006 the trained editor, Head, and Press Officer founded the editorial office Alte Schule with his partner Ann-Christin Wimber.

Leave a Comment

Your email address will not be published. Required fields are marked *

Ich bestätige hiermit, daß ich die Datenschutzhinweise in der Datenschutzerklärung zur Kenntnis genommen habe und stimme zu, dass meine Angaben und Daten zur Bearbeitung meines Kommentars elektronisch erhoben und gespeichert werden.
Hinweis: Sie können Ihre Einwilligung jederzeit für die Zukunft per E-Mail an kontakt@tis-gmbh.com widerrufen.


I herewith confirm that I have taken notice of the information in the Privacy Policy and I agree that my details and data will be collected and stored electronically to process my comment.
Note: You can revoke your consent at any time for the future by e-mail to contact@tis-gmbh.com

Related Topics

Scroll to Top