Intensified US Cyber Attacks Might Increase Vulnerability for Companies Caught in the Line of Fire
In a series of warnings and recommendations, cybersecurity expert Brandon Robinson has highlighted the potential impacts of a recent shift in U.S. funding towards offensive cyber operations.
Robinson advises that businesses should be aware of the increased risk of retaliatory cyber attacks from foreign adversaries, a consequence of the U.S. engaging in more proactive cyber operations. He emphasizes the importance of periodic cyber hygiene exercises, such as phishing simulations, training, and awareness programs, to ensure all employees are vigilant against suspicious emails and know what to do in the event of a response.
The expert also warns against a situation where everybody is responsible for patch management, and nobody is accountable. This could lead to persistent vulnerabilities, he says. To address this, Robinson recommends centralized management and responsibility for maintaining patches and upgrades on all software and computing systems.
Robinson further recommends promoting a cybersecurity culture of robust reporting and investing in the IT and security workforce to handle cyber incidents. He also emphasizes the importance of vendor and supply chain risk management, including conducting due diligence on vendors, having strong contractual protections, and establishing clear communication and incident response plans.
The shift in funding could be a proactive measure against nation states that are already targeting the U.S., or it could be to send a message abroad as a signal of strength. However, Robinson does not place a value judgment on whether this shift was a good or bad idea.
The legal implications of the U.S. openly and explicitly conducting offensive cyber operations are not something Robinson would be an expert to discuss. But he does advise businesses to be aware of the potential legal ambiguity and liability that could arise from such operations.
The coordination and execution of U.S. cyber defense units in the context of budget adjustments are primarily the responsibility of federal agencies such as the U.S. Cyber Command (USCYBERCOM) and the Department of Homeland Security (DHS). The budget changes imply a strategic shift favoring offensive cyber capabilities within military domains, coordinated by these specialized entities.
Robinson also advises businesses to be concerned about the potential budget cuts to civilian cybersecurity funding, as it may affect agencies like the Cybersecurity and Infrastructure Security Administration, ISACs, and the National Science Foundation's Scholarship for Service program.
Lastly, Robinson recommends having clear communication strategies to manage public disclosure and stakeholder engagement in the event of increasing frequency and severity of cyber incidents. With the potential for more offensive cyber operations, businesses must be prepared to handle the fallout effectively.