{"id":5963,"date":"2025-05-18T05:36:15","date_gmt":"2025-05-17T21:36:15","guid":{"rendered":"https:\/\/cicserver.com\/keep-your-network-safe-from-double-trouble-cyberattack-weather-event\/"},"modified":"2025-05-18T05:36:15","modified_gmt":"2025-05-17T21:36:15","slug":"keep-your-network-safe-from-double-trouble-cyberattack-weather-event","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/keep-your-network-safe-from-double-trouble-cyberattack-weather-event\/","title":{"rendered":"Keep Your Network Safe from Double Trouble Cyberattack + Weather Event"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div data-module=\"content\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">As if the escalating threat of a cyberattack or natural disaster alone weren\u2019t enough to make businesses sweat, they also have a very real two-headed monster to deal with: a cyberattack purposely timed with a natural disaster or extreme weather event to prey on businesses and infrastructure when they\u2019re especially vulnerable.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">This phenomenon, a \u201ccompound physical-cyber threat,\u201d where a cyberattack is intentionally launched around a heatwave or hurricane, for example, would have outsized and potentially devastating effects on businesses, communities, and entire economies, according to a <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0306261923009418\">2024 study<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> led by researchers at Johns Hopkins University.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">\u201cCyber-attacks are more disruptive when infrastructure components face stresses beyond normal operating conditions,\u201d the study asserted.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Businesses and their IT and risk management people would be wise to take notice, because both cyberattacks and weather-related disasters are increasing in frequency and in the cost they exact from their victims. In the US, <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/blog.checkpoint.com\/research\/a-closer-look-at-q3-2024-75-surge-in-cyber-attacks-worldwide\/\">cyberattacks have risen by 56% year-over-year<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> in 2024, according to Check Point. At an <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.ibm.com\/reports\/data-breach\">average cost of almost $4.9 million<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> per data breach in 2024, 10% higher than in 2023, according to IBM and the Ponemon Institute, the financial risk associated with a cyberattack is also growing.<\/span><\/p>\n<p data-component=\"related-article\" class=\"RelatedArticle\"><span data-testid=\"related-article-title\" class=\"RelatedArticle-Title\">Related:<\/span><a class=\"RelatedArticle-RelatedContent\" href=\"https:\/\/www.networkcomputing.com\/network-security\/the-network-impact-of-cloud-security-and-operations\" target=\"_self\" data-discover=\"true\">The Network Impact of Cloud Security and Operations<\/a><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">It\u2019s a similar story with the physical side of the two-headed monster. Through October, the US already had recorded <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.ncei.noaa.gov\/access\/billions\/time-series\">24 billion-dollar weather and climate disaster\u00a0events in 2024<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> at a total cost that\u2019s expected to exceed $160 billion once damage from hurricanes Helene and Milton is fully tabulated.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">In a risk-fraught landscape like this, now is the time for organizations to ensure their cyber defenses are sophisticated enough to protect their business operations, IT infrastructure, data and other assets from the disruption that weather-related disasters can invite, and the damage the two-headed cyber-physical threat can inflict. Follow these five best practices to guide you during the process:<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">1. ASSESS: Conduct a risk analysis to gauge your organization\u2019s current level of protection<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">.<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\"> <\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Your first step should be to evaluate the state of your company\u2019s cyber defenses, including communications and IT infrastructure, and the cybersecurity measures you already have in place\u2014identifying any vulnerabilities and gaps. One vulnerability to watch for is a dependence on multiple security platforms, patches, policies, hardware, and software, where a lack of tight integration can create gaps that hackers can readily exploit. Consider using operational resilience assessment software as part of the exercise, and if you lack the internal know-how or resources to manage the assessment, consider enlisting a third-party operational resilience risk consultant.<\/span><\/p>\n<p data-component=\"related-article\" class=\"RelatedArticle\"><span data-testid=\"related-article-title\" class=\"RelatedArticle-Title\">Related:<\/span><a class=\"RelatedArticle-RelatedContent\" href=\"https:\/\/www.networkcomputing.com\/network-security\/nvidia-beefs-up-its-ai-security-capabilities-with-doca-argus\" target=\"_self\" data-discover=\"true\">NVIDIA Beefs up its AI Security Capabilities with DOCA Argus<\/a><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">2. PLAN: Develop an operational resilience blueprint.<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> Take what you learn from the risk assessment to develop a detailed plan that outlines the steps your organization intends to take to preserve cybersecurity, business continuity, and network connectivity during a crisis. Whether you\u2019re a B2B or B2C organization, your customers, employees, suppliers and other stakeholders expect your business to be \u201calways on,\u201d 24\/7\/365. How will you keep the lights on, the lines of communications open, and your network insulated from cyberattack during a disaster? Your plan should identify and prioritize protective strategies for on-premises hardware and brick-and-mortar IT infrastructure (like data centers) as well as digital infrastructure. And because an organization\u2019s risk profile will tend to shift over time, be sure to revisit that plan annually, updating it as needed.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">3. SHIFT: Consider a move to the cloud. <\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Aging network communications hardware and software, including on-premises systems and equipment, are top targets for hackers during a disaster because they often include a single point of failure that\u2019s readily exploitable. The best counter in many cases is to move the network and other key communications infrastructure (a contact center, for example) to the cloud. Not only do cloud-based networks such as SD-WAN, (software-defined wide area network) have the resilience and flexibility to preserve connectivity during a disaster, they also tend to come with built-in cybersecurity measures.<\/span><\/p>\n<p data-component=\"related-article\" class=\"RelatedArticle\"><span data-testid=\"related-article-title\" class=\"RelatedArticle-Title\">Related:<\/span><a class=\"RelatedArticle-RelatedContent\" href=\"https:\/\/www.networkcomputing.com\/network-security\/edge-computing-and-the-burgeoning-iot-security-threat\" target=\"_self\" data-discover=\"true\">Edge Computing and the Burgeoning IoT Security Threat<\/a><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">4. FORTIFY: Shore up your cyber defenses. <\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Phishing, ransomware, third-party associate attacks\u2014the cyber threats that businesses must protect against are growing more nefarious and persistent. And that means a business isn\u2019t fully protected without multiple cyber defense layers in place. Those layers could include, for example, a next-generation firewall, zero-trust network access (ZTNA) and\/or cloud access security brokers (CASBs). Even small and midsized businesses are putting measures like this in place.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">In some cases, the risk analysis could suggest an even stronger security stance is warranted. Indeed, many businesses today are embracing a multi-layered, enterprise-level cybersecurity strategy that incorporates a software stack based in the cloud, such as SASE (secure access service edge) or SSE (security service edge) to secure all endpoints, users and applications on their network.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">As a fully converged, cloud-based package that bundles network connectivity (via SD-WAN) with multiple security layers into a single managed service, SASE is perhaps today\u2019s cybersecurity gold standard for a business. SSE is similar to SASE with one big difference: It\u2019s network-agnostic, meaning it can be integrated with an existing network without requiring a shift to SD-WAN.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Also as part of the fortification effort, you may want to consider enlisting a third-party cybersecurity expert. As managed services, SASE and SSE come with an expert built-in that serves as an extension of your own internal IT and cybersecurity teams and a first responder should disaster strike\u2014someone to integrate, configure, implement, monitor, update and troubleshoot the entire security package for you. That\u2019s important nowadays, with IT teams running lean and challenged to attract and keep cybersecurity talent.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">5. TEST: Conduct a simulation to stress-test your plan and your network.<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> Now it\u2019s time to see how your operational resilience plan, network and cybersecurity measures perform under simulated disaster and cyberattack conditions. Conduct a simulation (perhaps using incident simulation software and\/or a third-party cybersecurity expert), then address any remaining deficiencies.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">This final step is a crucial one, because the day soon may come when the dreaded two-headed monster tests your organization\u2019s cyber defenses. Here\u2019s hoping they\u2019re up to the task.<\/span><\/p>\n<\/div>\n<p><script defer=\"\" async=\"\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v18.0\" data-ot-ignore=\"true\"><\/script><br \/>\n<br \/><\/p>","protected":false},"excerpt":{"rendered":"<p>As if the escalating threat of a cyberattack or natural disaster alone weren\u2019t enough to make businesses sweat, they also have a very real two-headed monster to deal with: a cyberattack purposely timed with a natural disaster or extreme weather event to prey on businesses and infrastructure when they\u2019re especially vulnerable. This phenomenon, a \u201ccompound [&hellip;]<\/p>","protected":false},"author":3,"featured_media":5964,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-5963","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=5963"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5963\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/5964"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=5963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=5963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=5963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}