Tag Archive for: Consistent

DOST hack consistent with ransomware attack, but no ransom demanded so far – DICT


This is AI generated summarization, which may have errors. For context, always refer to the full article.

Renato Paraiso, DICT Assistant Secretary for Legal Affairs, says at least 20 of the DOST’s systems were compromised in the April 3 attack, and at least two terabytes of data were compromised

MANILA, Philippines – The nature of the cyberattack that caused the defacement of at least three websites of the Department of Science and Technology (DOST) was consistent with a ransomware attack, though no ransom has been demanded so far, according to Renato Paraiso, Department Of Information and Communications Technology Assistant Secretary for Legal Affairs.

Speaking with reporters on Thursday, April 4, Paraiso said an investigation was ongoing regarding the extent of the cyberattack’s damage. He mentioned, however, that DOST personnel were apparently locked out of their systems, much like in a standard ransomware hack.

Paraiso added at least 20 of the DOST’s systems were compromised in the April 3 attack, and at least two terabytes of data, such as schematics and designs – including old or already-created designs of inventions held by the DOST – were compromised. Backups and redundancies were also compromised, though he did not elaborate on what was taken versus what was deleted.

The effects of the hack – both in the short- and long-term – have yet to be determined while they investigate, however, and Paraiso didn’t discount the possibility that the amount of data accessed could have been larger.

As of April 4, he said they’ve partially regained access to their systems.

Paraiso added that while the site defacements were a means of communication by the hackers, and that digital footprints were consistent with local threat actors, they have not made any demands other than posting political statements on some affected DOST sites.

Earlier on April 3, according to a Manila Bulletin report, sources at the Department of Information and Communications Technology had said the hackers also deleted 25 terabytes of data. – Rappler.com

Source…

Keeping One Step Ahead – Consistent Cybersecurity for your Business


What’s the best way to provide consistent security, at scale, at all times throughout your business? Nick Burrows explains how the successful path to Industry 4.0 is undoubtedly through cybersecurity.

Industrial manufacturing is increasingly at a tipping point as organisations attempt to embrace Industry 4.0. It’s no longer a maybe – it’s about when and how. And the biggest challenges include how do I change decades of people, process, policies and technology to achieve this change? Manufacturing has never faced such a mountain to climb, and a need to achieve it within a very short period of time to ensure survival. Industrial manufacturing is all about up-time, safety, keeping plants running and people safe. It’s about supply chain integration and, increasingly, it’s about modernising the factory floor with sensors, wireless technologies, analytics and machine learning that reduces costs and keeps manufacturing relevant to today’s world.

Functionality and production efficiency

While functionality and production efficiency are understandably seen as having a higher priority than cybersecurity, no company should attempt the move to Industry 4.0 without focusing on cybersecurity as a vital component in every decision and process. Cyber-attacks increasingly target not just IT systems, but also critical operational technologies (OT) – sensors, devices and software used in manufacturing operations. The convergence of these systems means that attacks against either IT or OT systems (or both) have the potential to ruin production efficiency and cause significant financial impact. A recent report by the Ponemon Institute suggests that the average cost of a successful cyber-attack is more than US$5m. As threats continue to evolve, the industry is being forced to change and manufacturing needs to keep a step ahead.


Cybersecurity – image courtesy of Rutgers

Image Courtesy of Rutgers

How should industrial manufacturers respond?  Several starting points are:

• Operational Technology (OT) and SCADA (Supervisory Control and Data Acquisition) are just as critical as Information Technology (IT) in cybersecurity…

Source…

Still No Consistent Computer Security Plan at SC Agencies – WLTX.com


Government Technology

Still No Consistent Computer Security Plan at SC Agencies
WLTX.com
He says state agencies might all be doing as much as possible to protect your information, but since there's not one agency overseeing computer security, there's no way to know what they're doing. Since it's too late in the legislative session to get a
SC has no consistent computer security planHilton Head Island Packet
SC has no consistent computer security plan – WMBF NewsWMBF

all 27 news articles »

“computer security” – read more