USM TECHNOLOGY
  • About Us
    • Who We Are
    • Testimonials
    • Our Referral Program
    • Locations >
      • Dallas/Fort Worth TX
      • Houston TX
    • Careers
  • Services
    • Flexible IT Solutions >
      • Servers & Networks
      • IT Projects
      • Microsoft Cloud
      • License Management
    • Cybersecurity >
      • 1 Day Deep Dive
      • Penetration Test
      • Cyber Incident Response Workshop
      • vCSO
      • Advanced Security 2023
      • Cyber Projects
      • Compliance
  • Resources
    • Cyber Storm Book
    • Incident Response Guide
    • Free 15 Minute Consult
    • Phishing Simulation
    • Dark Web Scan
    • USM Blog
  • Client Portal
  • Contact Us

USM Technology Blog

corporate CYBER-response readiness. ​

9/13/2021

0 Comments

 
This is a fantastic article on the new realities of cybersecurity and makes a strong case for corporate cyber-response readiness. ​

What it was like inside Microsoft during the worst cyberattack in history
Microsoft president Brad Smith describes the chaos inside the tech giant during the SolarWinds hack.
https://www.fastcompany.com/90672384/microsoft-president-brad-smith-solarwinds-exclusive​

My takeaways from this great article are:
  • Hostile governments are investing in technology as a way to steal intellectual property from private businesses as well as the highest levels of the US government
  • Technology is transforming the form of hostility between nations, actors over the last 80 years have evolved from soldiers to spies to hackers.
  • Nation-state hackers are investing deeply in hacking strategies that enable extreme, global scale.
  • Characteristics of the hostile nation attack are; sophistication, persistence, and patience.
  • Hackers are piggybacking on software updates that come from a trusted partner, in this case, SolarWinds. As a result, their malware travels over trusted networks, and by leveraging the healthy habit of patching they are able to distribute their payload onto sensitive networks around the world in a matter of just a few days.
  • These threat actors are using US-based platforms such as GoDaddy and Amazon Web Services, as their command and control centers to avoid detection.
  • The two critical questions that need to be answered as quickly as possible after an attack are: How did the attacker gain entry, and what network credentials did the attacker obtain?
Picture
0 Comments



Leave a Reply.

    Author

    Stephen Cracknell is a technology leader and strategist with a passion for helping businesses with their cybersecurity.

    Archives

    January 2023
    December 2021
    September 2021
    May 2021
    March 2021

    RSS Feed

    View my profile on LinkedIn
Office Locations
DALLAS OFFICE
202 S. Austin Drive
Allen, Texas 75013
​Map

HOUSTON OFFICE
2929 Allen Parkway
Houston, Texas 77019
Map

Telephone

Dallas: 
214-390-9252 (Sales/Finance)
461-551-9922 (Support)
​
Houston: 
​832-975-0035 (Sales/Finance)
​832-968-6664 (Support)

Hours

Monday - Friday (7:00 am - 6:00 pm)

Stay Connected with USM Technology
Newsletter SignUp
USM Blog

​Contact Us
​
Privacy Policy
Picture
  • About Us
    • Who We Are
    • Testimonials
    • Our Referral Program
    • Locations >
      • Dallas/Fort Worth TX
      • Houston TX
    • Careers
  • Services
    • Flexible IT Solutions >
      • Servers & Networks
      • IT Projects
      • Microsoft Cloud
      • License Management
    • Cybersecurity >
      • 1 Day Deep Dive
      • Penetration Test
      • Cyber Incident Response Workshop
      • vCSO
      • Advanced Security 2023
      • Cyber Projects
      • Compliance
  • Resources
    • Cyber Storm Book
    • Incident Response Guide
    • Free 15 Minute Consult
    • Phishing Simulation
    • Dark Web Scan
    • USM Blog
  • Client Portal
  • Contact Us