fbpx
Search
Close this search box.

Protecting Your Organization: Additional Ransomware Attacks Prompt New Industry Regulations

Ransomware loaded on a laptop with a frustrated employee.
Ransomware loaded on a laptop with a frustrated employee.

Two more high-profile ransomware attacks made national news, just days apart, in the latest attacks on critical U.S. businesses. JBS Foods, the world’s largest meat producer, and the Steamship Authority, the largest ferry line operating in Cape Cod, are cases that illustrate the growing threat hackers pose to key industries.

These attacks follow the recent Colonial Pipeline ransomware attack, which prompted President Joe Biden to sign an executive order outlining plans to strengthen the U.S. cybersecurity defenses, including improving supply chain security and implementing specific technologies like zero-trust networks and multi-factor authentication (MFA).

In addition to the White House’s executive order, the Department of Homeland Security (DHS) is establishing its own requirements specifically for companies in the oil pipeline industry. While some of the new cybersecurity regulations have been planned for some time, the new rapid rollout, expected to occur over the summer, is in direct response to the Colonial Pipeline attack that caused temporary regional gas shortages.

Get a Free Cybersecurity Posture Review >>

One of the key directives put in place immediately is that pipeline companies are now required to report cybersecurity incidents to federal authorities immediately. Requirements to follow this summer include new security requirements for the pipeline companies’ IT systems and a mandatory action plan in place that must be followed after a cyberattack.

Protect Your Organization From Ransomware

While basic measures such as firewalls or antivirus are a good first step, they do not keep your business completely protected. For example, antivirus is simply good practice and should be considered the first step in your foundational security, but it is not effective for stopping advanced security threats such as ransomware.

Endpoint Detection and Response (EDR) is an effective solution to detecting malware because it doesn’t rely on a single approach, but instead utilizes multiple methods for detecting malware and malicious actions within your network environment. EDR helps combat threats to your organization by recognizing:

  • Misuse of legitimate applications (Powershell, WMI, MSHTA)
  • File-based attacks (Microsoft Office, Adobe PDF, etc.)
  • Unwanted software (browser toolbars, PUPs)
  • Insider threats (malicious employee, compromised credentials, accidental release of data)
  • Suspicious user activity

Risk Assessment services can also be helpful in determining what gaps exist in your current cybersecurity posture. These assessments help you prioritize where to start with mitigating risks. Many assessments, like those from Corsica Technologies, will also provide companies with a roadmap to get to their desired level of cybersecurity and compliance.

If you’d like to learn more about how to protect your organization from ransomware or other cyber-attacks, we’re here to help. Give us a call at (877) 367-9348 or schedule a consultation.

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

Business IT Support - 17 real-life examples - Corsica Technologies

Business IT Support: 17 Real-Life Examples

Who’s going to support your business’s IT systems? If you don’t have people on staff, or if your existing staff can’t cover all your needs, you may choose to work with an MSP (managed IT services provider). This type of

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.

Ready to talk to an expert?

We’ll respond within 1 business day, or you can grab time on our calendar.