CISA, International Counterparts Highlight Mistakes Organizations Make After a Cyber Intrusion

CISA, International Counterparts Highlight Mistakes Organizations Make After a Cyber Intrusion

The Cybersecurity and Infrastructure Security Agency collaborated with similar allied authorities in issuing an extensive list of best practices for preempting malicious cyber actors and navigating related crises in the moment. 


“Today’s joint alert is the first of its kind for CISA since our formal establishment in 2018 and one I’ve aimed for since day one,” CISA Director Christopher Krebs said in a press release Tuesday.


CISA has partnered with the United Kingdom’s National Cyber Security Centre in the past to call attention to specific nation-state actors and threats. Tuesday’s advisory takes a more general, proactive approach, and includes the Australian Cyber Security Centre, New Zealand’s National Cyber Security Centre and Computer Emergency Response Team, and Canada’s Communications Security Establishment, in addition to the U.K.’s NCSC.


“With our allied cybersecurity government partners, we work together every day to help improve and strengthen the cybersecurity of organizations and sectors of our economy that are increasingly targeted by criminals and nation states alike,” Krebs said. “Fortunately, there’s strength in numbers and this unified approach to combining our experiences with a range of malicious actors means that we’re able to extend our defensive umbrella on a global scale.”


The release highlighted five mistakes network defenders tend to make when responding to an incident that suggest a global need to focus more on the long game rather than impulsive reactions.


These often overlooked steps include: “Mitigating the affected systems too early, which could allow the adversary to notice and change their tactics; touching adversary ..

Support the originator by clicking the read the rest link below.