Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

What Can We Learn From the WannaCry Attack?

by Jenna Sindle
June 15, 2017
in Cybersecurity
Reading Time: 4 mins read
A A
WannaCry Ransomware Attack
Share on FacebookShare on Twitter

Now that the impact of the WannaCry ransomware attack has been mitigated, and access to data and systems restored, it’s time to take stock of this event and identify what lessons we can learn. While this particular attack might be in the past, according to Destiny Bertucci, the Network Monitoring Head Geek™ at SolarWinds, ransomware is set to become one of the biggest threats to public sector organizations. “Government agencies shouldn’t assume they’re safe from ransomware because they were not hit by WannaCry,” she said.

According to Bertucci, U.S. federal government agencies had an innate advantage in the case of WannaCry. “Without a doubt, the changes that federal cybersecurity leaders put in place after the OPM breach via the Cybersecurity Sprint in the summer of 2015 have made agencies far more secure, not least of which is their adherence to Patch Tuesday,” she explained. By using MITRE’s Common Vulnerabilities and Exposures to identify vulnerabilities and following vendor-directed patching schedules the federal government stayed out of the headlines.

However, with legacy systems and software still forming the backbone of many government agencies’ IT infrastructure, there are other actions the federal CIOs and CSOs should be taking to stay ahead of cyber attackers and build resilience into their systems should they become victims of an attack. Bertucci shared with us her five best practices to help manage the risk of ransomware and ultimately defeat it.

Here they are:

Step 1: Educate Users

People are both the number one threat vector and the number one defense against ransomware attacks. Since many attacks leverage social engineering tricks by getting users to open malicious emails or click on infected links, on-going user education has to be a priority. This includes informing end-users about methods to stay safe online, not just at work, but on their mobile devices, and from their home offices.

Step 2: Patch, Patch, and Keep on Patching

Identifying vulnerabilities and fixing them quickly is the key to robust cybersecurity. Seldom do attacks like WannaCry fall into the category of Zero Day vulnerabilities when there’s no opportunity to patch. WannaCry, for example, was identified in March along with a patch, yet it wasn’t until May that the attack crippled IT systems. Most organizations don’t have the resources to keep up with the constant patching cycle that’s currently required. For those organizations that do stay ahead of the game, adopting a Patch Tuesday mindset is key, as is wisely investing in a patch management solution. Strong patch management solutions allow updates to be tested in a sandbox environment to help ensure that nothing adversely impacts the infrastructure. It also enables patches to be pushed out in batches.

Step 3: Update Legacy IT

While it’s not always within an organization’s budget to upgrade to the latest and greatest software or operating system, it is important to consider that it is a worthwhile investment. With federal agencies likely to receive an IT modernization windfall of approximately $250 million via the Modernizing Government Technology Act, upgrading from Windows XP® would be a good first investment.

Step 4: Monitor and Manage

Investing in a Security Information and Event Management (SIEM) tool is another wise investment in the fight against all cyberattacks, especially ransomware. SIEMs have two big advantages in the fight against ransomware. First, they provide a baseline snapshot of your operating environment. This is critical because without a baseline it is not possible to detect anomalies. Second, SIEMs provide broad-based visibility into areas such as file integrity and alert on changes, such as file encryption or movement, which are key indicators of the introduction of malware into a system. With proactive alerts, it’s possible to mitigate and remediate a nascent attack before it has the opportunity to do real damage.

Step 5: Patch, Patch, and Keep on Patching

Really; it’s that important.

Tags: Advantage of SIMsCommon Vulnerabilities and ExposuresDestiny BertucciHead Geek SolarWindsmalwareMGTAMITREModernizing Government Technology ActPatchPatch ManagementPatch TuesdayRansomwareRansomware AttackWannaCry

RELATED POSTS

Public Sector Day 2022
Cybersecurity

Public Sector Day 2022 Increases Accessibility While Emphasizing Key Topics Impacting Government

May 25, 2022
Gary Peters
Civilian

Sen. Gary Peters and SolarWinds CEO, Sudhakar Ramakrishna, Discuss Cybersecurity Challenges

February 8, 2022
Contributed Articles

CMMC 2.0 –The Ever-Evolving Cybersecurity Rules all Oklahoma DoD Contractors Need to Know

December 15, 2021

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5387 shares
    Share 2155 Tweet 1347
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    87 shares
    Share 35 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us