2022 Resolution: Cybersecurity Verification

January 31, 2022
Share

Due to heightened risk of cyber attack, the Cybersecurity and Infrastructure Security Agency (CISA) recently published a short checklist of urgent, near-term steps to reduce the likelihood and impact of a potentially damaging compromise. The recommendations include validating remote access to the organization’s network and confirming that all ports and services that are not essential for business purpose have been disabled. We invite every organization to not only review the list of controls but to also invest in independent verification of their correct implementation. Verified cybersecurity makes all the difference between catastrophic failure and operational resiliency. This is particularly true for OT networks where configuration changes can erode security controls such as network segmentation over time.

View the Cybersecurity and Infrastructure Security Agency Checklist Below:

https://www.cisa.gov/sites/default/files/publications/CISA_Insights-Implement_Cybersecurity_Measures_Now_to_Protect_Against_Critical_Threats_508C.pdf?mkt_tok=NjY5LUpOWi00NTgAAAGCT6Emn67W4s_KcYGH-lV9bySmupo3QBwM2jurN-SFDOSG5WItB_zqqOX04FWuVKa3kJlC1Anin-eOKsT67pc9nH5Oywb_NPvZdafWjDTL