Cyber Attack
Cyber Attack
BY
Ishika Tyagi , ROLL NO. – 23/HIS/27
BA(H) HISTORY , SEM- II
PHISING ATTACK
“The Company may be limited in what information it can disclose due to the
investigation. The Company believed that is an isolated event and does not believe its
technology systems have been compromised or that Company data has been
exposed.”
WAYS TO PREVENT
The FBI’s advisory on these scams urges businesses to adopt two-step or two-factor
authentication for email, where available, and/or to establish other communication
channels — such as telephone calls — to verify significant transactions.
Businesses are also advised to exercise restraint when publishing information about
employee activities on their Web sites or through social media, as attackers perpetrating
these schemes often will try to discover information about when executives at the targeted
organization will be traveling or otherwise out of the office.
Ubiquiti noted that as a result of its investigation, the company and its audit committee and
advisors concluded that its internal control over financial reporting were ineffective due to
one or more material weaknesses, though it didn’t disclose what measures it took to close
those security gaps.
LESSONS LEARNT
1.Invest in robust cybersecurity measures: The attack highlighted the importance of investing
in strong cybersecurity defenses. Companies should regularly update their security systems,
conduct thorough risk assessments, and implement multi-layered security protocols to mitigate
the risk of breaches.
2.Enhance employee training: Employees are often the weakest link in cybersecurity defenses.
Providing comprehensive training on cybersecurity best practices, such as recognizing phishing
attempts and practicing good password hygiene, is crucial in preventing successful
cyberattacks.
3.Implement strict access controls: Limiting access to sensitive systems and data can help
minimize the damage caused by a cyberattack. Implementing strict access controls, including
strong authentication methods and least privilege principles, can reduce the risk of
unauthorized access.
4.Monitor for unusual activity: Early detection of cyber threats is essential for mitigating their
impact. Implementing robust monitoring systems that can detect unusual activity or deviations
from normal behavior can help organizations identify and respond to cyberattacks more
effectively.
Conclusion
Cyber security is a critical aspect of modern business and everyday life. As
demonstrated by various cyberattacks on companies like Ubiquiti and
numerous others, the consequences of insufficient cyber security measures
can be severe, ranging from financial losses and reputational damage to
compromise of sensitive data and disruption of essential services.
Furthermore, given the dynamic nature of cyber threats, continuous vigilance
and adaptation are crucial. Cyber security is not a one-time task but an
ongoing process that requires constant monitoring, evaluation, and
improvement. By staying informed about emerging threats, adopting industry
best practices, and collaborating with cyber security experts and peers,
organizations and individuals can better mitigate risks and safeguard against
cyber attacks