Cyber Risk Governance Insights | December 23, 2024
WEEK IN HEADLINES
NATION STATE - Hackers Target Nuclear Workers
North Korean hacking group, Lazarus, is targeting IT professionals in the nuclear sector with fake job offers. This is a continuation of their Operation DreamJob campaign which began in 2020. The attackers use social media to reach out to potential victims and conduct multiple rounds of interviews before deploying malware. Their goal is to steal sensitive information or cryptocurrency.
INSIGHT: This is Critical Infrastructure! Multi-factor Authentication should have been implemented. But CISA only strongly encourages MFA in critical infrastructure, there is not currently a blanket federal mandate requiring it. Perhaps this should change for national security reasons. Even if you're not critical infrastructure - you should have MFA for your own organization.
CRITICAL INFRASTRUCTURE - Country Hit By Largest in Its History
Ukraine has been hit by a significant cyber-attack targeting critical government databases, with suspicions pointing towards Russian involvement. The attack has disrupted essential services and raised concerns about the country's cybersecurity resilience. Authorities are working to restore systems and enhance defenses against future threats.
INSIGHT: This is why Zero Trust Architecture (ZTA) and MFA are so critical for critical infrastructure. We believe that organizations should always "never trust, always verify," meaning that they must verify every person and device attempting to access resources and data on their network.
RANSOMWARE - Gang Issues New Attack Warning
A notorious ransomware group has issued a warning of impending attacks set for February 3, 2025. The gang, known for its sophisticated cyber assaults, has targeted various sectors, causing significant disruptions and financial losses. Security experts urge organizations to bolster their defenses and remain vigilant against potential threats.
INSIGHT: The proactive defense of an EDR system to continuously monitor and analyze endpoint activities in real-time. If you have an EDR it should find suspicious behavior and isolate a compromised system and can prevent ransomware from spreading across your network infecting other devices.
PRIVACY - Italy Says "Nope!", Here's a $15.6M Fine
Italy's data protection authority, Garante, has fined OpenAI €15 million ($15.6 million) for violations related to the collection and processing of personal data by its AI chatbot, ChatGPT. The investigation revealed that OpenAI lacked a legal basis for data processing and failed to provide adequate transparency and age verification measures. OpenAI plans to appeal the decision, asserting its commitment to privacy and collaboration with global authorities.
INSIGHT: Given the increasing complexity of state-level data privacy regulations, has your organization implemented a robust Data Protection Impact Assessment (DPIA) process? Data regulatory compliance and data minimization are critical for all organizations. DPIAs are essential tools to assess the data collected on consumers and employees, ensuring that only necessary data is retained.
(Looking at you AT&T)
QUANTUM COMPUTING - Legacy Cryptography Phased Out by 2030
Australia's chief cybersecurity agency, the Australian Signals Directorate (ASD), has announced plans to phase out widely used cryptographic algorithms, including SHA-256, RSA, ECDSA, and ECDH, by 2030. This decision is driven by concerns that advances in quantum computing could render these algorithms insecure. The ASD's guidance aims to transition to quantum-resistant cryptographic standards to protect sensitive information and maintain cybersecurity integrity.
INSIGHT: We've talked about this before, but it's important for all companies to start thinking about Post-Quantum Cryptography (PQC). Those powerful quantum computers are on the horizon. The QCs will likely be capable of cracking our current encryption, putting your data at risk. If you switch to PQC now, you'll know that you're future-proofing your organization, staying ahead of the curve, and it demonstrates to your customers and auditors that you're serious about security and compliance.
GOOD NEWS - Ransomware Developer Arrested in Israel
Rostislav Panev, a dual Russian-Israeli national and key developer for the LockBit ransomware group, was arrested in Israel and faces extradition to the US. Panev is accused of developing ransomware and tools used by affiliates, contributing to LockBit's global cyberattacks. The arrest is part of ongoing efforts by US law enforcement to dismantle the ransomware-as-a-service operation and bring its perpetrators to justice.
Recommended by LinkedIn
INSIGHTS & EXPERT PERSPECTIVES
Understand AI Risk Management and Standards
The National Institute of Standards and Technology (NIST) recently held a symposium to discuss advancements in AI risk management and standard-setting. Key takeaways include the need for comprehensive governance beyond developer-deployer relationships, the impending influx of international AI standards, and the challenges of tailoring effective AI regulations. The symposium emphasized the importance of systemic governance, the complexity of the AI value chain, and the necessity for adaptable risk management frameworks.
Key Insights
INSIGHTS: For any organization, particularly SMBs, with limited resources, it may be prudent to start small, with manageable AI projects, or leverage AI tools that require minimal investment. This could allow you to gradually build expertise and operational infrastructure while evaluating the benefits.
If your organization is not ready for AI deployment, focusing on understanding the AI landscape and preparing for future integration can still provide valuable strategic insights.
AI can significantly enhance operational efficiency, improve decision-making, and provide a competitive advantage - particularly for SMBs.
However, if you lack the resources, expertise, or infrastructure, AI deployments may lead to more challenges than benefits.
Netswitch Sharpen Your Cyber Edge with Netswitch
Master Compliance & Minimize Risks:
Deepen Your Knowledge:
Don't wait.
Contact Netswitch Technology Management today to take control of your cyber risk.
Disclaimer: The information and links provided in this newsletter are for informational purposes only. Netswitch does not warrant the accuracy or completeness of such information and is not liable for any damages arising from its use.