ACT NOW TO PROTECT AGAINST INCREASED CYBER RISKS
In light of the Russian military attack on Ukraine, the global threat of cybersecurity risks also are on the rise, both on the international and local level. The military action already has been accompanied by cyber attacks on the Ukrainian government and critical infrastructure organizations.
While there are no specific or credible cyber threats to the U.S. homeland at this time, the Cybersecurity and Infrastructure Security Agency (CISA) is warning organizations of the potential for Russia’s destabilizing actions to impact organizations both within and beyond the region, particularly in the wake of sanctions imposed by the United States and its Allies. Every organization -- large and small -- must be prepared to respond to disruptive cyber activity.
CISA has launched a new Shields Up site to provide the latest guidance and information to help organizations increase their resilience to cyber attacks and protect people and property. This robust catalog of free resources will be especially helpful today, as the cybersecurity threats facing the world have increased exponentially.
REPORT A CYBER INCIDENT
Cybercrime includes identity theft, cyber-attacks (such as ransomware, malware, denial-of-service, etc.), fraud, and violating privacy. Whether you are an organization experiencing a cyber-attack or an individual who is a victim of identity theft, follow the below steps to report the cybercrime and begin recovering.
New government reporting requirements: Indiana lawmakers passed legislation in 2021 that will increase the amount of information sharing regarding cyberattacks and other threats across state agencies and local government. This new law requires public-sector entities to report incidents such as ransomware, software vulnerability exploitations, denial-of-service attacks and more. Learn more.
How do I report an incident if I am a government entity?
The law requires a primary contact for each governmental organization. Organizations can provide multiple contacts as long as they are authorized to report incidents and receive any information resulting from incident reporting.
SIGN UP TO BE A POINT OF CONTACT FOR YOUR ORGANIZATION:
REPORT A CYBERSECURITY INCIDENT:
Known as a form of malware designed to encrypt files on a device, rendering any files and the systems they rely on as unusable, Ransomware is used by malicious actors to demand a ransom in exchange for decryption. StopRansomware.gov is the U.S. Government's official, one-stop source for resources to tackle this problem more effectively.
- Security Magazine
- FOX Business - Cybersecurity
- CNBC - Tech | Cybersecurity
- Dark Reading
- Naked Security
- The Hacker News
- Threat Post
THREAT DETECTING AND SHARING RESOURCES
- SANS Internet Storm Center
- Cyber Security & Information Systems Information Analysis Center (CSIAC)
- Common Vulnerabilities and Exposures (Mitre CVE list)
- Cyber Information Sharing and Collaboration Program (CISCP)
- Enhanced Cybersecurity Services (ECS)
- Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
- Multi-State Information Sharing & Analysis Center (MS-ISAC)
- Infrastructure Protection Gateway (IP Gateway)
- Indiana InfraGard
- ISAO Standards Org - Information Sharing Groups
- Department of Homeland Security’s (DHS) free Automated Indicator Sharing (AIS)