War and Cyber Security

Much has been talked about the ongoing conflict and the impact of it on the geopolitics and global markets. What all this means to cyber security ? Do we have to worry about it? Are we really prepared for it? Do we have enough time and resources to prepare for it? Lets have a look. Your thoughts are most welcome.

Stage

As world is becoming more turbulent and testosterone is high on all sides, no weapon is out of option including nukes. The most visible weapon being used against Russia is sanctions. What is not being said and might remain a secret spy story for years to come is how cyber war unfolded and helped in tilting war to one side. If Enigma was highlight of WW2, honey trapping of cold-war then DDoS, Ransomware, Trojan, Social Engineering and attack on supply chain might see spike in coming days. It might start from targeted attack but may fallout to others.

Base

Stuxnet. Pegasus. WannaCry, NotPetya. Do I need to say more? If you are not aware of these, a simple Google search on the back stories of these will take you where I want you to lead.

Actors

Participants: As things will escalate, we can see more targeted attacks. Worst of it may come if Governments start allowing, incentivizing or turn blind eye on non-state actors to target enemies. Everything is fair in Love and War, and this is WAR.

Opportunists: If you haven't read the story of "Two cats and the monkey", do it. While others are in chaos, some of those who are not part of the conflict may start using situation for their own advantages. The same we can expect with state, non-state and state sponsored elements who will try to take advantage of the situation. Clickbait and malware might be spread in disguise of call for donation, news, exclusive video etc. In this age of viral content with peer to peer sharing coupled with negligible thought given by users on authenticity of source, it will have huge impact in short time.

Fire

Social Engineering and Phishing: Be it end-users or corporate employee, all will be target of this cyberwar. Mobile devices and emails will be the direct target. New crop of news and donation websites will also sprout to spread malware. This is the high time users and employees are regularly alerted about such attacks. They should be reminded to validate the authenticity before clicking any link, opening any file or visiting unverified or too tempting website.

Supply Chain: With use of open source software, you need to be extra careful as anybody can create or contribute to open source projects. I am not saying open source software are less secure than closed source. What I mean is that you should be extra vigilant about picking the projects those have seen sudden increase in contribution (importantly from new users) or the projects which are not maintained by credible sources. Never miss to scan the code by yourself. Subscribe to alerts for technologies you use, including proprietary components (software or hardware).

IT Infra: Your web portal, webservices, mobile apps or any other interface that are connected to external word should be closely monitored and no warning should be ignored. A lesson from Stuxnet episode can be learned that even if you were not the target, you still can become the casualty of conflict. If you are using public clouds, talk to your cloud provider and understand your responsibilities, understand what all protection mechanism they have and how you can protect your infrastructure. With the level of market turmoil, you might be able to get a better deal from your cloud provider.

Action

Cyber security is not a cheap. It is certainly going to require more budget allocation than ever for above said reasons. Since global economy in facing challenges, it will be a tough task to get money allocated for cyber security. So, how do you prepare for it? I would recommend to break down your cyber security activities as follow and optimize the money you have:

  • Awareness: You can start with employee awareness or user awareness campaign, without spending anything extra. It also means you can start right away without any delay. Time to get all those annual awareness training updated and mandatorily completed by all employees.
  • Tools and services: This certainly requires some serious thoughts if you are not already spending enough on it. However, you can use current economic situation to get better bargain for tools and services.
  • Insurance: This is best way to keep running the business even if you get caught between the fire. You need carefully read terms & conditions , so better engage a good legal adviser and technical expert to make sure all possibilities are covered. This way you can transfer the major part of risk with reasonable cost. I am not saying insurance will be cheap but surely an attack may be way costly.

Final thoughts: Be vigilant, don't let your guards down and prepare for worst.

To view or add a comment, sign in

More articles by Gopal Gupta

  • Secure Code Review approach

    Hello Friends, This post is about giving you a basic approach for reviewing the code for security. For detailed one you…

    2 Comments
  • Curios case of Apple and FBI

    Everybody knows FBI cracked Apple's iPhone and got the record of suspect's phone. Apple successfully defended its…

    1 Comment
  • Social Engineering on LinkedIn

    I was planning to write my first post on LinkedIn for quite some time and being a security professional it was obvious…

    2 Comments

Others also viewed

Explore content categories