Cybersecurity Preparedness: What the Russia-Ukraine War Means for  U.S. Companies

04.13.22 10:04 AM
Currently, the impact of the Russia-Ukraine war is felt across the globe. Supply chain disruptions and
rising gas prices are the clearest examples of the broader impact. However, they aren’t the only issues 
those living in the U.S. are experiencing. 

As the conflict continued, U.S. government agencies warned that cyberattacks originating from Russia
might become more prevalent. The reason for the uptick is multi-faceted. One aspect is malicious cyber 
activities serving as a potential avenue to showcase Russian disapproval of the United State’s position on 
the conflict. This includes as a response to sanctions or support to Ukraine, both by state-sanctioned 
actors and individuals. 

Cyberattacks could also allow those who are financially cut off to secure outside funds, especially 
through the use of ransomware. The sanctions and ceasing of certain banking activities created a 
significant hardship, one that some groups may attempt to navigate using cryptocurrency, a common 
request during ransomware attacks. 

Since the risk of malicious cyber activity is growing and may remain high while the conflict continues, 
companies should take extra precautions to protect systems and assets. For those looking to shore up 
their cybersecurity capabilities, here are some tips. 

Update Software Regularly 

Most software – including antivirus and antimalware solutions – rely on regular patches and updates to 
remain current. Since cyber threats evolve with continuously, companies should ensure that any new 
software versions are reviewed and applied as quickly as possible. That way, organizations have the 
latest protection against known threats. 

Implement Multi-Factor Authentication 

Companies need to embrace multi-factor authentication. With that strategy, attackers can’t access 
systems with login credentials alone. Instead, a second step – such as a one-time code – is required to 
make the connection. That provides additional protection, as attackers would need to gain access to 
multiple pieces of information to gain entry. 

Validate Remote Access 

Similarly, validating remote access is a fundamental way to limit attackers' access to critical business 
systems and data. Review all remote access programs to determine if any credentials or permissions 
need revoking, limiting services to only those who genuinely require remote connectivity. 

Introduce New Cybersecurity Training 

Often, people are the weakest link in the broader security equation. Clicking on malicious links by 
mistake, providing information through phishing attempts, and similar activities are often the greatest 
vulnerabilities companies face and are typically the hardest to protect against. 

Companies should release updated cybersecurity training to all employees. Along with reviewing 
cybersecurity best practices, provide information regarding new or rising attack vectors that are 
occurring in the wider landscape. By ensuring employees are informed, the odds that they’ll take the 
right action when an issue occurs increases dramatically. 

Report Anomalous Cyber Incidents 

If your company experiences an anomalous cybersecurity incident, report the vent to the U.S. 
Cybersecurity & Infrastructure Security Agency (CISA). Providing information promptly helps government 
agencies track, analyze, and prevent cyberattacks on a grander scale. Plus, the agency may be able to 
provide direct support. 

Ultimately cybersecurity should always be a top priority. However, with the increased risk, it’s even more 
critical. Take extra precautions at every level, ensuring your company can remain safe today and over the 
long term. 

Need help trying figure out the multiple cybersecurity options in today's marketplace? Contact us below for a free consultation.

Derek Roush