SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Cybersecurity Implications of the Capitol Hill’s Riot

By Marc R.

2 min read
in Blog
Credit: Jason Andrew for The New York Times

From a cybersecurity standpoint, the events at Capitol Hill could not have come at a worse time. While many government agencies are still assessing the extent of the damage suffered from the SolarWinds hack, yesterday’s riots just opened the door for more cyber attacks against institutions, businesses and individuals in the US.

Phillip Reitinger, president and CEO of the Global Cyber Alliance, affirms: “There’s likely an elevated cybersecurity threat level, as some may try to take advantage of disruption.”

In fact, the threats are multiple and everybody, especially the cybersecurity professionals working for the Federal Government, should remain in high alert.

2 hours of physical breach offered ample time to any attacker to do a lot of harm.

Credentials could have been stolen. Intelligence could have been gathered. Personal information of lawmakers and their staffers could have been collected for future use in social engineering attacks. Bad actors could have gained physical access to critical federal computer systems. Disinformation campaigns, fake photos/audios/videos related to the events are already circulating online and will keep spreading like wildfire.

I want to believe that swift actions are being taken to mitigate the risks and avoid the worst consequences of yesterday’s disturbance.

I imagine that the IT network is being thoroughly and immediately swept.

I imagine that most physical devices (modems, WiFi routers, PCs, cameras, microphones) are being examined and replaced.

I also imagine that lawmakers’ personal devices such as smartphones, tablets and laptops are all being checked and may be updated.

I imagine a lot being done to remove any potential vulnerability, and to restore faith and trust in the system.

The media and all of us, cyber citizens, can also help. For instance, we should refrain from sharing unverified news and content.

After witnessing the lax physical security at the Capitol Building, now more than ever, we know that we can’t take anything for granted.

Related

Tags: BlogBlog 2021Capitol HillCybersecurityJanuaryPrivacyRiots
6
VIEWS
ADVERTISEMENT

Related Posts

What Are the Stages of Pen Testing?

What Are the Stages of Pen Testing?

April 29, 2022
About Multi Factor Authentication

About Multi Factor Authentication

January 6, 2022

7 Books about Deepfake

April 5, 2021

7 Cybersecurity and Quantum Computing Books

April 5, 2021

More Articles

Course

Computer Forensics

April 19, 2022
Alerts

Cisco Security Advisory (AV22-080)

February 16, 2022

Psychology of Passwords

October 23, 2020
Alerts

[Control Systems] ABB Security Advisory

December 6, 2021
Entertainment

Hacking Humans Podcast

February 24, 2021
Hardware

HackRF One Bundle

September 27, 2020
Book

The Coming Cyber War: What Executives, the Board, and You Should Know

December 28, 2021
Podcast

Cross-Site Scripting Attacks – Secure Digital Life #93

April 20, 2021
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....