DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home

Cybersecurity Implications of the Capitol Hill’s Riot

By Marc R.

Reading Time: 2 mins read
in Blog, IoT
Credit: Jason Andrew for The New York Times

From a cybersecurity standpoint, the events at Capitol Hill could not have come at a worse time. While many government agencies are still assessing the extent of the damage suffered from the SolarWinds hack, yesterday’s riots just opened the door for more cyber attacks against institutions, businesses and individuals in the US.

Phillip Reitinger, president and CEO of the Global Cyber Alliance, affirms: “There’s likely an elevated cybersecurity threat level, as some may try to take advantage of disruption.”

In fact, the threats are multiple and everybody, especially the cybersecurity professionals working for the Federal Government, should remain in high alert.

2 hours of physical breach offered ample time to any attacker to do a lot of harm.

Credentials could have been stolen. Intelligence could have been gathered. Personal information of lawmakers and their staffers could have been collected for future use in social engineering attacks. Bad actors could have gained physical access to critical federal computer systems. Disinformation campaigns, fake photos/audios/videos related to the events are already circulating online and will keep spreading like wildfire.

I want to believe that swift actions are being taken to mitigate the risks and avoid the worst consequences of yesterday’s disturbance.

I imagine that the IT network is being thoroughly and immediately swept.

I imagine that most physical devices (modems, WiFi routers, PCs, cameras, microphones) are being examined and replaced.

I also imagine that lawmakers’ personal devices such as smartphones, tablets and laptops are all being checked and may be updated.

I imagine a lot being done to remove any potential vulnerability, and to restore faith and trust in the system.

The media and all of us, cyber citizens, can also help. For instance, we should refrain from sharing unverified news and content.

After witnessing the lax physical security at the Capitol Building, now more than ever, we know that we can’t take anything for granted.

Tags: BlogCybersecurityJanuaryPrivacy
ADVERTISEMENT

Related Posts

Why should email security matter to you?

Why should email security matter to you?

March 16, 2023
How To Browse The Internet Safely With A VPN

How To Browse The Internet Safely With A VPN

March 10, 2023
How To Browse The Internet Safely With A VPN

How To Protect Yourself with Cyber Insurance

March 1, 2023
How To Protect Your Data with Encryption

How To Protect Your Data with Encryption

February 23, 2023

More Articles

Fujitsu says stolen data being sold on dark web ‘related to customers’

August 31, 2021
Book

Vapor: A True Story of How I Fell Victim to Catfishing

November 19, 2021
Incidents

Exposed server leaks sensitive US military emails for two weeks

February 23, 2023
Alerts

QBot phishing abuses Windows Control Panel EXE to infect devices

November 18, 2022
Alerts

Blockchain security firm warns of new MetaMask phishing campaign

August 9, 2022
AI

The TWIML AI Podcast

March 17, 2021
Course

Managing Security Vulnerabilities: Enterprise and Cloud

July 7, 2022
Book

Threat Hunting with Elastic Stack

June 29, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.