May 11, 2022 By Jennifer Gregory 2 min read

President Joe Biden warned U.S. businesses of possible cyberattacks from the Russian government in March. His statement suggested business owners should work to reduce vulnerabilities and prevent attacks.

President addresses cybersecurity risks

In his statement, Biden said, “I have previously warned about the potential that Russia could conduct malicious cyber activity against the United States, including as a response to the unprecedented economic costs we’ve imposed on Russia alongside our allies and partners. It’s part of Russia’s playbook. Today, my Administration is reiterating those warnings based on evolving intelligence that the Russian Government is exploring options for potential cyberattacks.”

Biden promised that his administration will continue “to use every tool to deter, disrupt and, if necessary, respond to cyberattacks against critical infrastructure.” Businesses also need to do their part. He then urged “private sector partners to harden your cyber defenses immediately by implementing the best practices we have developed together over the last year.”

Anne Neuberger, the deputy national security adviser for cyber and emerging technology, also released a warning. She told the New York Times that the government had observed some movement that can signal an upcoming attack, such as scanning websites. She said that the administration was addressing the private sector because the private sector manages most critical infrastructure.

Increased threats since start of the war

Since the beginning of the Russia-Ukraine war, cybersecurity workers and the U.S. government have become more concerned about potential attacks by Russian threat actors. In February, IBM Security X-Force issued a research advisory about the detection of a wiper malware called HermeticWiper that was running on systems belonging to Ukrainian companies.

Based on current knowledge, IBM Security X-Force recommends that businesses remain in the highest alert posture based on the rapidly evolving war. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) also provides updated information on its website regarding the current threats related to Russia. The agency also advises all organizations who face cyber anomalies or incidents to contact CISA.

Reducing risks of attacks

To provide further guidance on best practices for U.S. entities, the White House also issued a fact sheet.

Suggestions include:

  • Mandating the use of multi-factor authentication
  • Deploy modern security tools
  • Patch systems against all known vulnerabilities
  • Change network passwords
  • Back up data and keep offline backups
  • Conduct drills of emergency plans
  • Encrypt data
  • Educate employees about potential schemes, such as phishing and websites
  • Work with the local FBI field office or CISA Regional Office.

By creating an action plan and monitoring the situation, businesses can reduce their risk of attack. The concerns with the Russian government may pass. However, the plans and defenses you made will also help improve your overall cybersecurity program. That, in turn, will help keep your data safer from attacks.

More from News

Regulatory harmonization in OT-critical infrastructure faces hurdles

3 min read - In an effort to enhance cyber resilience across critical infrastructure, the Office of the National Cyber Director (ONCD) has recently released a summary of feedback from its 2023 Cybersecurity Regulatory Harmonization Request for Information (RFI).The responses reveal major concerns from critical infrastructure industries related to operational technology (OT), such as energy, transport and manufacturing. Their worries include the current fragmented regulatory landscape and difficulty adapting to new cyber regulations. The frustration appears to be unanimous.Meanwhile, the magnitude of the threat…

Why the Christie’s auction house hack is different

3 min read - Christie's, one of the world's leading auction houses, was hacked in May, and the cyber group RansomHub has claimed responsibility. On May 12, Christie’s CEO Guillaume Cerutti announced on LinkedIn that the company had “experienced a technology security incident.” RansomHub threatened to leak “sensitive personal information” from exfiltrated ID document data, including names, dates of birth and nationalities. On the group’s dark website, RansomHub claims to possess 2GB of data on “at least 500,000” Christie’s clients from around the world.…

Should there be a total ban on ransomware payments?

3 min read - The debate about the United States government banning companies from making ransomware payments is back in the headlines. Recently, the Ransomware Task Force for the Institute for Security and Technology released a memo on the topic. The task force stated that making a ban on ransomware payments in the U.S. at the current time will worsen the harm to victims, society and the economy. Additionally, small businesses cannot withstand a lengthy business disruption and might go out of business after…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today