The recent ransomware attack on Colonial Pipeline should serve as a glaring reminder of how easily a single cybersecurity incident can cripple a fragile infrastructure. Despite the government’s appeals for drivers to resist panic buying, many gas stations throughout the Southeast were running dry last week. The issue wasn’t a gas shortage, but rather a problem with distribution.
Georgia-based Colonial Pipeline provides nearly half of the east coast’s fuel, with its main pipeline traveling from Houston, TX to Linden, NJ. After the cyber attack was discovered on May 7, Colonial took proactive measures and shut down operations. Details are still emerging about what exactly led to the attack, but it was likely a combination of a few different factors, including poor security practices from users.
The attack has been linked to ransomware group DarkSide which first emerged on Russian hacking forums in August 2020. The group claims that they’re apolitical and only motivated by obtaining money from large companies. They forbid its affiliates from attacking certain industries like healthcare, education, public sector and non-profits.
Although this was a targeted attack, organizations would be wise to brush up on their cybersecurity and vendor due diligence practices to ensure that the proper safeguards are in place to protect against a similar incident. Here are three ways to do this:
Ransomware attacks and other cybersecurity events will always be a part of our interconnected and technology driven world, but there are ways to protect yourself from being a victim. By ensuring that you and your third parties are adhering to these best practices, you can lessen your risk of facing an attack.
Not sure if your vendor's cybersecurity is where it should be? Download our Vendor Cybersecurity Checklist to ensure your organization is protected.