As geopolitical relations fracture, it’s worth thinking about global risk from the vantage point of cyber security. 

The fallout from current geopolitical tensions is evident on the ground within Ukraine, but it may also quickly make itself apparent within the US markets and elsewhere around the world.

In a call on Tuesday, FBI Cyber Section chief David Ring asked US-based leaders to consider how a ransomware attack might affect critical infrastructure; from banking institutions to energy producers.

Amidst the ominous warnings, companies can and should do everything possible to manage and mitigate cyber security risks.

Managing current risks

The following can protect a wide variety of industries from malicious intrusions.

Protecting against DDoS attacks

Check Point’s Quantum gateways offer a suite of capabilities that address the impact of a DDoS attack. These include specialized Intrusion Prevention Signatures, operating system and gateway configuration settings, management automated responses, and commands that can dynamically block attack sources. Further information about such settings can be found within the Check Point Support Center.

More DDoS insights…Further, Check Point offers a dedicated DDoS mitigation solution. DDoS Protector and DDoS Protector Cloud Service represent key elements of Check Point’s Quantum Network security solutions. DDoS Protector functions as a perimeter attack mitigation device that protects businesses from emerging network and application threats. DDoS Protector helps organizations avoid network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other attack types.

Preventing ransomware and wipers

Check Point’s Infinity Architecture provides protection from ransomware and wipers, along with other types of malicious software.

    1. Gateways – Configure IPS to prevent, not just to detect, attacks using recommended policies. Opting for a ‘prevent-first’ strategy increases defense profiles significantly and simplifies future remediation activities. Check Point IPS protects against the most relevant attack vectors known to spread ransomware and wipers.
    2. Deploy Check Point Harmony Endpoint and Check Point Anti-Ransomware on user devices, thereby adding another layer of protection.
    3. Minimize potential downtime via continuous data backups and system’s patching.

Misinformation and phishing 

Threat actors continually deploy both known and unknown phishing and social engineering attacks. These kinds of attacks could include emails and text messages that persuade victims to click on malicious links or to download malicious files.

Therefore, it’s imperative to:

    1. Provide year-round cyber security awareness and education to employees.
    2. Prevent phishing attacks on emails, endpoints and mobile devices via anti-phishing software.
    3. Leverage threat emulation and extraction protections in Check Point Quantum and Check Point Harmony offerings.
    4. Use zero-phishing capabilities of products like Check Point Harmony Endpoint

Protecting remote employees

In our current hybrid work environment, organizations must provide remote employees with secure access to corporate resources. To protect remote employees, use the following solutions:

    1. Check Point Harmony Connect, which leverages protection at the edge to block malicious attacks.
    2. Check Point Harmony Endpoint and Mobile, which block a wide variety of advanced attacks on user devices.

Check Point research teams are continuously monitoring threat events, and will provide further insights into actionable prevention and defense recommendations as intelligence becomes available. Get the rest of this story from this Check Point blog.

For more insights into America’s ransomware warnings, see CyberTalk.org’s past coverage.