01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

level of concern while working remotely. This number is even higher <strong>for</strong> federal employees at 84%.<br />

Remote work can harbor more risk <strong>for</strong> cyber attacks than <strong>for</strong> those in offices because at home<br />

connections are generally less secure, making access easier <strong>for</strong> cybercriminals to find. The report also<br />

notes that only 44% of employees were not confident in their existing security protocols.<br />

For companies, organisations and government agencies, there can be legal repercussions <strong>for</strong><br />

cyberattacks too. According to The Securities and Exchange Commission and Commodity Futures<br />

Trading Commission, while state and federal regulations vary, there may be further reporting required<br />

depending on the conditions of the cyberattack and the type of data that was compromised.<br />

The impact of malware on classified files<br />

Malware operates by infiltrating a point of weakness through a network, beginning the journey of lateral<br />

movement. Bad actors understand this and will intrude through an organisation, undetected, attempting<br />

to gather as much data as possible. For federal agencies, documents that enter government systems at<br />

an unclassified point are viewable <strong>for</strong> a wider audience, however, once they enter into a classification<br />

level -- whether confidential, secret or top secret -- there is a chance of malware being attached.<br />

“Classified” determines in<strong>for</strong>mation specifically designated by a U.S. government agency <strong>for</strong> limited,<br />

restricted dissemination or distribution. When documents are being taken up or down to higher or lower<br />

confidentiality levels, there is valuable in<strong>for</strong>mation at stake. If files that were previously unclassified carry<br />

hidden viruses, there is an opportunity <strong>for</strong> digital adversaries to break into top-secret networks and<br />

infiltrate government in<strong>for</strong>mation. This could enable them to steal trade secrets, learn about secret <strong>for</strong>eign<br />

policies or military tactics, which in turn can put lives at risk.<br />

SolarWinds, one of the most catastrophic cyberattacks in U.S. history, resulted in the hacking of major<br />

enterprises and government agencies including the Department of Homeland Security and the Treasury<br />

Department <strong>for</strong> over 14 months be<strong>for</strong>e being discovered. The hackers were able to break into the<br />

SolarWinds systems by implementing a malicious code into a system known as “Orion” which was<br />

commonly known by companies to handle IT resources. This code is what created an opening <strong>for</strong> the<br />

hackers to install malware that allowed them to spy on companies. Due to the stealth movement of the<br />

hack, some of those involved may still be unaware. Bad actors know how to identify loopholes in the<br />

system to gain access to sensitive in<strong>for</strong>mation. This further proves the value of implementing strict<br />

cybersecurity methods to ensure that sensitive data is protected. There needs to be proactive, zero-trust<br />

cybersecurity methods in place as government documents go through the confidentiality cycle to ensure<br />

that all files are protected and monitored.<br />

How Content Disarm and Reconstruction (CDR) technology can help<br />

It is imperative that federal agencies take a proactive approach in their file security methods. CDR<br />

technology works to clean and rebuild files to a ‘known good’ industry standard by automatically removing<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 19<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!