The U.S.’s Cybersecurity & Infrastructure Security Agency has issued a warning to all Americans to increase their cyber awareness among the unprovoked Russian attacks on Ukraine. As this event has affected global organizations and caused a lot of unrest, we want you to know that Phillips 66 is here to support your business with preventative measures and action items to keep your site(s) protected.
“Every organization—large and small—must be prepared to respond to disruptive cyber activity,” says the organization, in their most recent warning.
Although the CISA does not have any current leads or credible intel to an upcoming cyber-attack, they strongly encourage all business owners to remain vigilant in their everyday digital operations. To help you and your employees audit and set up prevention tactics, we have compiled a list of cybersecurity resources in one place.
Action items to reduce the likelihood of a damaging cyber intrusion:
- Validate that all remote access to your business’s network and privileged or administrative access requires multi-factor authentication.
- Watch this replay of our own Marinko Kimmer discussing multi-factor authentication in his latest Conexxus webinar.
- Ensure that software is up to date, prioritizing updates that address known exploited vulnerabilities identified by CISA.
- Confirm that your IT personnel have disabled all ports and protocols that are not essential for business purposes.
- If your site(s) are using cloud services, ensure that IT personnel have reviewed and implemented strong controls outlined in CISA’s guidance.
- Sign up for CISA’s free cyber hygiene services, including vulnerability scanning, to help reduce exposure to threats.
- Confirm that your business’s entire network is protected by antivirus/antimalware software and that signatures in these tools are updated.
In addition to these CISA provided tips, you can refer back to all of our Weekly Fill-Up security articles, as well as use our Cybersecurity Awareness Month roundup published in October of last year.