Interviews

IT crossfire

by Mark Rowe

Businesses not directly involved in Russia’s war in Ukraine should take steps to enhance their cyber defences and avoid being caught in the crossfire, according to a company that offers IT business continuity services.

Peter Groucutt, Co-Founder of Databarracks, said: In 2017, NotPetya ransomware was used by Russia to target Ukraine. Although it was aimed at a country, it had a massive impact on companies around the world including WPP, pharmaceutical company Merck, Danish shipping firm Maersk and many others. The usual intention of a ransomware attack is profit: it aims to paralyse a business and force it to pay to operate again. This wasn’t the case for NotPetya – its purpose was disruption.

“This is the risk that businesses around the world – unconnected to the conflict – face. They may not be the target of an attack but can easily be caught in the unintended collateral damage.”

Organisations cannot rely on cyber insurance for protection against any losses that might occur as a result of the conflict, he added: “Cyber insurance excludes acts of war from coverage. Insurers refused to pay out on claims from Merck and Mondelez after NotPetya. These refusals have been contested and recently, a court in New Jersey ruled in favour of Merck. It found that the exclusion clause applied to armed conflict rather than cyber warfare.

“Since the NotPetya attack, insurers have updated their cyber war exclusion clauses to ensure they don’t pay out on similar attacks.”

To guard against threats, he’s urged businesses to act now and take charge of their own cyber preparations. He added: “The National Cyber Security Centre (NCSC) has good advice for what organisations should be doing to improve security when the cyber threat is heightened.

“Further, our recommendation is to review your backup and recovery strategy and your Cyber Incident Response Plan. Ransomware will now wait to detonate in order to outlast shorter backup and replication retention policies. Make sure you have enough historic versions of your data to restore from, and can quickly recover to minimise your downtime.

“Make sure your backups are isolated and air-gapped, so there is no way an attack could impact both your live systems and your backups. Look at how you would detect an attack and how quickly you can respond to isolate systems. The faster you can react to cyber threats the better, because you limit the damage and make the recovery easier. Cyber incidents have rapidly become the leading cause of data loss. From cyber-crime to cyber-warfare, organisations need to adapt quickly to stay resilient in the face of these new threats.”

Related News

  • Interviews

    ST17 London: SIA latest

    by Mark Rowe

    Likely change to the requirements for SIA-approved contractors and for renewing your SIA licence were aired by the chief executive of the…

  • Interviews

    Catch of the day

    by Mark Rowe

    Tackling IaC security can help businesses avoid the jaws of defeat, says Robert Haynes, SCA & Open Source Evangelist, at app security…

  • Interviews

    State of the CISO

    by Mark Rowe

    Information security people are placing higher priority on vendor consolidation, collaboration between networking and security teams, and security awareness exercises to aid…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing