MCP’s website is updated regularly with content pertaining to cybersecurity. So far, all of it has been focused on helping our clients prevent cyberattacks, or at least reducing their likelihood by the greatest extent possible. Of particular importance are the threat assessments that we regularly issue, and the “cyber chats” conducted each month by Mike Beagles, MCP’s director of technology and cybersecurity services, who is a certified Cisco CyberOps associate.
One of our clients recently suffered a significant cybersecurity breach that caused extensive damage to its networks and systems. (It’s important to note at this juncture that MCP is providing numerous services to this client, but none related to cybersecurity.) The city only discovered that it had been hacked when Federal Bureau of Investigation (FBI) agents visited its information technology (IT) department.
The FBI had been monitoring the dark web and found numerous indicators that something nefarious was happening. Digging further, aided by a white-hat hacker firm, they discovered that the cyberattacker not only had wormed his or her way into the city’s network infrastructure but also had been there for some time and had infiltrated many aspects of the city’s network. It was a very sophisticated attack that affected numerous organizations.
It also was a devastating attack. The city’s network infrastructure was destroyed, many network servers and devices were infected, and the Active Directory structure, which enables IT administrators, to organize network elements into a hierarchical containment structure, was severely impacted. One of the outcomes was that the city’s 911 center had to operate without its computer-aided dispatch (CAD) system for a month — talk about stress! And because the network infrastructure was destroyed and the Active Directory was compromised severely, IT personnel in every affected agency had to touch every physical and virtual network device to assess and correct the damage, which complicated the recovery effort and lengthened the timeline. For example, the city’s police department had to reimage every device in use, e.g., in-vehicle laptops and in-station desktops, and then reload them with all of the requisite applications — now multiply this scenario across dozens of city agencies.
This event got me thinking, and the first thought that popped into my head was that no matter how vigilant an organization is, there’s a very good chance that a cyberattack will be successful. That’s because cyberattackers have become very sophisticated, they are very good at what they do, and their tactics evolve rapidly, seemingly by the hour. They also can be very persistent and patient and are highly motivated. In this way, a cyberattacker is very much like a burglar, who will spend weeks observing a target to determine whether it is worth breaching and if so, the best time and approach for doing so. And if a burglar really wants what is inside, he is going to find a way in.
All of that is not to say that you should give up on cybersecurity — it’s still good thinking to do everything possible to prevent cyberattacks. But it’s equally good thinking to develop a strategy and tactics designed to lessen the severity of such an attack if it occurs. Here’s where to start:
MCP has numerous subject-matter experts who can help you develop strategies for preventing cyberattacks and mitigating them if they occur — please reach out.
Bob Kaelin is MCP’s vice president, public safety. He can be emailed at RobertKaelin@MissionCriticalPartners.com.