Cybersecurity

After several high-profile cyber attacks, fed security officials hope to increase cybersecurity protocols to prevent further attacks. But establishing regulations that are effective and timely isn’t easy.
Hackers gained entry into the networks of Colonial Pipeline Co. on April 29 through a virtual private network account, which allowed employees to remotely access the company’s computer network.
The breach of a Florida water treatment system that could have poisoned citizens sent shockwaves through local government. No-cost assessment tools and low-cost fixes can increase security in this sector.
The state depends almost entirely on the Colonial Pipeline, which recently was shut down for several days after a cyber attack. While industry advocates say pipelines are secure and green, officials may want to consider other options.
It’s a bold attempt to transform cybersecurity. State and local government organizations, along with their vendors, will benefit from strengthened federal requirements.
The breach highlighted the ability of ransomware to interrupt the vital services on which Americans rely. The incident raises important legal and ethical questions surrounding ransomware payments. Just because paying off cyber attackers may be lawful in some contexts, that still doesn’t make it the morally correct thing to do.
An online lending platform called Kabbage sent 378 pandemic loans worth $7 million to fake companies (mostly farms) with names like “Deely Nuts” and “Beefy King.”
The state lost millions of dollars to fraud last year, as criminals took advantage of the sharp increase in pandemic-related unemployment. Now, officials are seeing another spike in fraudulent claims, but this time they’re better prepared.
Legislators want more resiliency since the state has only one natural gas pipeline. About half of all gas stations in North Carolina still don’t have fuel following the Colonial Pipeline shutdown last week.
The cyber attack gained access to the department’s computer system that contained sensitive data about two dozen police officers, including social security numbers, fingerprints, birthdates, financial history and more.