fbpx
Search
Close this search box.

Protecting Your Organization: Additional Ransomware Attacks Prompt New Industry Regulations

Ransomware loaded on a laptop with a frustrated employee.

Two more high-profile ransomware attacks made national news, just days apart, in the latest attacks on critical U.S. businesses. JBS Foods, the world’s largest meat producer, and the Steamship Authority, the largest ferry line operating in Cape Cod, are cases that illustrate the growing threat hackers pose to key industries.

These attacks follow the recent Colonial Pipeline ransomware attack, which prompted President Joe Biden to sign an executive order outlining plans to strengthen the U.S. cybersecurity defenses, including improving supply chain security and implementing specific technologies like zero-trust networks and multi-factor authentication (MFA).

In addition to the White House’s executive order, the Department of Homeland Security (DHS) is establishing its own requirements specifically for companies in the oil pipeline industry. While some of the new cybersecurity regulations have been planned for some time, the new rapid rollout, expected to occur over the summer, is in direct response to the Colonial Pipeline attack that caused temporary regional gas shortages.

Get a Free Cybersecurity Posture Review >>

One of the key directives put in place immediately is that pipeline companies are now required to report cybersecurity incidents to federal authorities immediately. Requirements to follow this summer include new security requirements for the pipeline companies’ IT systems and a mandatory action plan in place that must be followed after a cyberattack.

Protect Your Organization From Ransomware

While basic measures such as firewalls or antivirus are a good first step, they do not keep your business completely protected. For example, antivirus is simply good practice and should be considered the first step in your foundational security, but it is not effective for stopping advanced security threats such as ransomware.

Endpoint Detection and Response (EDR) is an effective solution to detecting malware because it doesn’t rely on a single approach, but instead utilizes multiple methods for detecting malware and malicious actions within your network environment. EDR helps combat threats to your organization by recognizing:

  • Misuse of legitimate applications (Powershell, WMI, MSHTA)
  • File-based attacks (Microsoft Office, Adobe PDF, etc.)
  • Unwanted software (browser toolbars, PUPs)
  • Insider threats (malicious employee, compromised credentials, accidental release of data)
  • Suspicious user activity

Risk Assessment services can also be helpful in determining what gaps exist in your current cybersecurity posture. These assessments help you prioritize where to start with mitigating risks. Many assessments, like those from Corsica Technologies, will also provide companies with a roadmap to get to their desired level of cybersecurity and compliance.

If you’d like to learn more about how to protect your organization from ransomware or other cyber-attacks, we’re here to help. Give us a call at (877) 367-9348 or schedule a consultation.

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

EDI Transactions and Document Types - Corsica Technologies

EDI Transactions: What It Takes To Win

EDI transactions are the lifeblood of processes like order placement, shipping, receiving, claims processing, and more. Across numerous industries, these transactions keep things moving in a way that no other technology can. In fact, you could say EDI solutions make

Read more
EDI 856 - Advance shipment notice - Corsica Technologies

EDI 856: Getting Your Advance Shipment Notices Right

Shipping and logistics get complicated when you have sensitive products and limited warehouse space. How do you ensure the warehouse is ready to receive a shipment—and ready to handle time-sensitive products appropriately? An EDI 856 document solves this problem. This

Read more
Cloud Data Integratoin: Power vs. ease of support - Corsica Technologies

Cloud Data Integration: Power vs Ease Of Support

It’s essential for cloud systems to talk to each other. If they don’t, data can become siloed, without widespread availability across the organization. But cloud systems introduce their own complexities that are different from on-premises systems. How do you choose

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.