“You have the power, the capacity, and the responsibility to strengthen the cybersecurity and resilience of the critical services and technologies on which Americans rely. We need everyone to do their part to meet one of the defining threats of our time — your vigilance and urgency today can prevent or mitigate attacks tomorrow.” President Biden
On March 21, President Biden issued an important statement on our nation’s cyber defenses, stating “This is a critical moment to accelerate our work to improve domestic cybersecurity and bolster our national resilience.” The statement is a plea to corporate America to immediately harden our cyber defenses, recognizing our shared responsibility for national digital security. “Most of America’s critical infrastructure is owned and operated by the private sector and critical infrastructure owners and operators must accelerate efforts to lock their digital doors.”
The statement is accompanied by a Fact Sheet that outlines the steps that can be taken right away, along with Shields Up Guidance from the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA).
I thought it was important to revisit these guidelines, not just for my own organization, but for our customers and partners as well as you run your own assessments and make decisions about how to best protect your networks moving forward.
The CISA guidelines fall into four key areas for organizations of all sizes to protect critical assets:
- Reduce the likelihood of a damaging cyber intrusion through robust access authentication methods, frequent software updates that address known vulnerabilities, and good cyber hygiene that includes vulnerability scanning
- Take steps to quickly detect a potential intrusion with active monitoring and rapid assessment of unusual network behavior
- Ensure that the organization is prepared to respond if an intrusion occurs by having crisis response teams, technology and plans in place
- Maximize the organization’s resilience to a destructive cyber incident through tested backup/restoration procedures
I’ve talked about this many times, but I felt it was important to say it again. Security is at the heart of our private 5G service. We designed our solution based on Zero Trust principles. We deploy our solution behind your firewall for added protection and data control. Through our Security and Service Operations Center, we use Artificial Intelligence and US-based engineers to continuously scan, assess, and respond to vulnerabilities and attacks 24×7. Because it’s critical to your business, and to our national resilience, security is not an afterthought for Betacom. It is our core guiding principle.
Johan Bjorklund
CEO, Betacom