Dear America: White House Pens Open Letter on Ransomware Threat

Clark Hill PLC
Contact

On June 3, the Deputy Assistant to the President and Deputy National Security Advisor for Cyber and Emerging Technology released an open letter to corporate executives and business leaders, imploring them to take immediate actions to address threats from ransomware urgently.

The letter underscores the broad and immediate risks and dangers of ransomware to corporate executives and business leaders. Businesses of all sizes, regardless of industry, should immediately follow the guidance and take steps to ensure that they are prepared to defend against and recover from a ransomware attack.

The private sector plays a significant role in defending against ransomware attacks.

To address the risk, businesses immediately should commence discussing and understanding the ransomware threat, review their security posture, and practice or create incident response plans and business continuity plans to ensure the ability to continue or quickly restore operations following an attack.

ESSENTIAL ACTIONS:

  1. Immediately implement the following security practices:
    1. Enable multifactor authentication (because passwords alone are routinely compromised),
    2. Deploy an endpoint detection & response system (to hunt for malicious activity on a network and block it)
    3. Encrypt all data, at rest and in use (so if data is stolen, it is unusable)
    4. Develop or seek a skilled, empowered security team (to patch rapidly, and share and incorporate threat information in your defenses)
  2. Backup your data, system images, and configurations frequently, regularly test them, and keep the backups offline: Ensure that backups are regularly tested and that they are not connected to the business network.
  3. Update and patch operating systems, applications, and firmware as soon as possible and maintain the process consistently.
  4. Test your Incident Response Plan ( if you do not have one – develop a plan with urgency).
  5. Test your systems and environments for vulnerabilities and gaps. Ask your partners and vendors to do the same.
  6. Segment your Networks and Data.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Clark Hill PLC | Attorney Advertising

Written by:

Clark Hill PLC
Contact
more
less

Clark Hill PLC on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide