Looking into the incident for Digital Journal is James Carder, Chief Security Officer at LogRhythm.
Carder recounts that the issue that afflicted Microsoft has never fully gone away: “We continue to see the effects of the Microsoft Exchange zero-day attack more than six months after news broke of the extensive hacking campaign, including additional vulnerabilities and breaches that followed the March attacks.”
This opens up bigger implications for the control of information technology systems. Carder is forthright when he says: “This serves as a reminder that our government and organizations that support elected officials continue to be highly sought-after targets for hackers because of the public nature and significant impact, the plethora of rich information that can be leveraged and the often-inferior defenses that allow easy exploitation.”
He adds that we must expect attacks to continue in earnest, finding: “Criminal organizations and nation state threat actors continue to ramp up attacks on our government and critical infrastructure entities like we have seen many times this year already.”
There are lessons from the latest attack that needed to be considered by the most vulnerable organizations. Carder recommends: “Government entities and organizations need to recognize that the possibility of a cyberattack is only increasing with time and they must take pivotal steps to successfully prepare for attacks.”
He adds that: “To prepare, organizations must patch aggressively, limit privileged access, create backups, prepare a response plan and prioritize educational training. As with anything in life, it’s about how you can respond to these attacks and that’s not something organizations want to do without practice and a plan.”
Read more: https://www.digitaljournal.com/tech-science/republican-governors-association-email-server-breached-by-hackers/article#ixzz77tOuuGLj
The post Republican Governors Association email servers breached by hackers appeared first on LogRhythm.
*** This is a Security Bloggers Network syndicated blog from LogRhythm authored by Mandy Schnirel. Read the original post at: