Effective Security Measures Can Stymie Cyber Attacks
A solid risk management program can help protect an organization’s data
By Hunter Barrat
January 21, 2020
This past fall, Microsoft announced a hacker group believed to be linked to the Iranian government targeted a U.S. presidential campaign.
This news reads like déjà vu.
Except this time, Microsoft’s strong anti-hacking tools protected its customers’ accounts.
In a 30-day period between August and September, a hacking group called Phosphorus targeted not only a presidential campaign but also current and former American government officials, journalists covering global politics, and prominent Iranians living outside Iran, Microsoft said.
The hackers made more than 2,700 attempts to identify consumer email accounts belonging to specific Microsoft customers. The group then attacked 241 of those accounts but was only able to compromise four. None of the compromised accounts belonged to U.S. government officials or members of presidential campaign staff, Microsoft said.
This incident is just one of many cyberattack attempts made on its customers, Microsoft noted. The company offers enhanced protection to more than 60,000 accounts in 26 countries via its AccountGuard product, which provides monitoring and threat notifications on Office 365 accounts. AccountGuard has made more than 800 notifications of attempted nation-state attacks on these customers.
These sophisticated cyberattacks, once the stuff of Hollywood thrillers, are realities companies all over the world face in 2020.
Fortunately, organizations can arm themselves to combat these cyberthreats. They can start with a formidable risk management program, says Baan Alsinawi, TalaTek founder and president.
“Risk management is critical to forming the basis of a sound and strategic cybersecurity program for organizations of all sizes. It is best accomplished through an initial risk assessment, where your organization’s data is identified, categorized, and ranked according to negative impact if it is exposed, lost or stolen,” Alsinawi said.
There’s a range of actions you can take to protect your organization, and following these 7 steps is a great place to start:
- Set up multi-factor authentication for users accessing the company network.
- Utilize access control to manage who gets access to what data.
- Use encryption to protect data at rest and in transfer.
- Enable access to secure, encrypted backups.
- Manage your vendors and partners accessing your systems.
- Have in place disaster recovery and continuity of operations plans.
- Engage cybersecurity frameworks and other regulatory controls to manage and monitor systems.