According to a Cyberventures report, every 14 seconds a ransomware attack will be carried out on a company in 2019. As many attacks are targeted at individual people, not company profiles, this statistic could just be a fraction of the cyberattacks organisations might be exposed to.
Critical infrastructure is especially vulnerable. As our partner Panda Security reveals in a recent blog post, it’s multipurpose systems that are most at risk, from desktop tools and to IoT solutions that are used across many different industries giving criminal access to sensitive data and confidential information.
How to reduce the risks of an attack on critical infrastructure
Alone, the following strategies will not protect your company’s critical infrastructure from an attack. However, combined with other cyber security tools and best practice they can help reduce your vulnerabilities. If you need further support protecting your company get in touch to find out how we can help.
Protect your business from brute force attacks
Brute force attacks to steal passwords (using algorithms to try multiple different password combinations) are on the increase so protecting sensitive data with robust verification systems has never been more important. Two-factor authentication is a step in the right direction, although not completely secure, but will certainly deter opportunists and make it that much more difficult for cybercriminals to gain access.
Encrypt sensitive data
Brute force attacks also target encryption keys so as well as protecting highly sensitive data with encryption, also ensure these are secure too. Physically secure encryption systems (the hardware that runs encryption programmes). Store encryption keys in a separate place to the data it protects. Manage expiring times for keys to be replaced with a new key, making the old ones redundant.
Many cyber attacks can go undetected for months before they’re discovered, which means corporate information and customer data in the public realm without your knowledge. Make sure you have the right tools in place to monitor activity 24/7 and detect threats before they have an adverse effect.
Isolate your most critical infrastructure
Safeguard your critical infrastructure by minimising entry points and building a defendable environment around it. Each device or integrated system that connects to your critical infrastructure must be secure, and the most sensitive data and systems should be isolated with secure remote access where necessary.
If you are concerned about how vulnerable your organisation’s critical infrastructure is to attack and would like to explore solutions, please get in touch.
You can also book a free consultation with a security expert by contacting us directly. Click here.