{"id":2881,"date":"2021-05-20T21:50:53","date_gmt":"2021-05-20T21:50:53","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=2881"},"modified":"2022-03-02T22:37:21","modified_gmt":"2022-03-02T22:37:21","slug":"10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/","title":{"rendered":"10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.8%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:0px;--awb-spacing-right-large:9.6%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:9.6%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p class=\"p1\"><div class=\"sdm_download_button_box_default\"><div class=\"sdm_download_link\"><a href=\"https:\/\/itegriti.com\/kw022024\/?sdm_process_download=1&download_id=3178\" class=\"sdm_download green\" title=\"10 Essential Steps to Cyber Resilience as Hackers Target Infrastructure\" >DOWNLOAD THIS ARTICLE<\/a><\/div><\/div><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.8%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-2\"><p><strong>Written by Michael Sanchez for Homeland Security Today<\/strong><\/p>\n<p>A motivated hacker will break into a system they target. No doubt, no question. Perhaps you have heard that stated less assertively, but the sentiment is the same. Hackers come in all experience levels and sizes, from individual actors to full nation-state forces. Some cybercriminals depend on teams, bots, harvested intelligence, brute force, and relentless targeting. Sometimes, an attacker is fortunate to encounter just dumb luck. Regardless of the skill level or support, a motivated hacker will ultimately succeed in compromising a set of their targets.<\/p>\n<p>Our job as cybersecurity professionals is to prevent these attacks, and, absent that, to at least minimize their frequency and severity of any successful intrusions. The relentless efforts of a determined attacker call for more than a simple \u201counce of prevention\u201d and companies with gaps in their security practices have learned hard lessons about why more is required. There are countless security breach examples but the recent\u00a0<a href=\"https:\/\/apnews.com\/article\/europe-hacking-government-and-politics-technology-business-333e47df702f755f8922274389b7e920\" target=\"_blank\" rel=\"noopener\">Colonial Pipeline<\/a>\u00a0example reveals the sophistication and reprehensible nature of cyber criminals in their use of ransomware for profit. While all industries can all benefit from 13-plus years of lessons learned in NERC CIP, the mandatory cybersecurity requirements for power companies that operate critical infrastructure, the oil and gas sector will likely be best aided based on their similar technologies and risks.<\/p>\n<p>While every incident is unique, the data from thousands of breaches has taught us how this usually happens.\u00a0This information is freely shared amongst the cyber community, so why does this keep happening? Recent high-profile examples all demonstrate that, as cyber teams improve, the bad guys advance their tactics. Unfortunately, in many cases, cybersecurity only improves as a result of advances in criminals\u2019 maneuvers.<\/p>\n<p>Brian Harrell, former Assistant Secretary for Infrastructure Protection at DHS, recently\u00a0<a href=\"https:\/\/www.hstoday.us\/subject-matter-areas\/infrastructure-security\/white-house-warns-other-sectors-amid-fallout-from-colonial-pipeline-ransomware-attack\/\" target=\"_blank\" rel=\"noopener\">said<\/a>, \u201cOur critical infrastructure sectors are the modern-day battlefield and cyber space is the great equalizer. Hacker groups can essentially attack with little individual attribution and virtually no consequence. With over 85 percent of all infrastructure owned and operated by the private sector, significant investment and attention must be placed on hardening key critical systems. I anticipate more attacks like this happening in the future. A key lesson here is that while technology and automation is good, we must also have the ability to efficiently operate manually as well. Attacks will happen, but how quick can you recover and restore critical services?\u201d<\/p>\n<p>The goal is to \u201crespond\u201d to an incident and not just \u201creact.\u201d What happens when intruders are in your environment?\u00a0Do you have an incident response plan, and a team, and does that team have the necessary tools and intel to respond and recover from the incident?\u00a0Perhaps your organization uses external incident response specialists who can help, but is this enough?\u00a0Experience has taught me that it is not. While these teams may be good at what they do, they cannot address the need for business continuity \u2013 how the business continues to operate until systems are restored, crisis communications, and information protection if these programs were not already in place.<\/p>\n<p>The business need is to provide reliability of the IT systems essential for continued operation. If your organization was compromised by a cybersecurity event, how would the business continue to operate until systems are restored? What information was taken, and was it in a usable state? What information is helpful to share with your employees, customers, and community? All of these questions support the need for cyber-resilient programs that strengthen incident response, redundancy, and disaster recovery by including business continuity, information protection, and crisis communications.<\/p>\n<p>How can you make your organization more resilient? Here is a checklist to achieve these goals.<\/p>\n<h2>10 Essential Steps You Can Take Today<\/h2>\n<ol>\n<li>Create a \u201cculture of security\u201d in your company. Your employees, contractors, and vendors can be your greatest asset or weakest links. Support your joint success through continued training and awareness and make sure they understand that your security depends on their security practices. And demand a sound organizational change management plan when changes impact your team.<\/li>\n<li>Know your assets. Creating an accurate asset inventory is the first step. Include hardware and software, and keep updated through change and configuration management. Periodic walkdowns are helpful to validate electronic to physical lists.<\/li>\n<li>Minimize your attack surface. Remove unnecessary and unsupported systems and applications, and deactivate services and ports that are not needed.<\/li>\n<li>Identify your business-critical systems and sensitive data. Place additional security measures over these systems and data, and make them more difficult to access through network segregation and encryption. Unstructured data is a real problem, so for Pete\u2019s sake discover and move sensitive data to common repositories.<\/li>\n<li>Limit and manage cyber and physical boundaries, log and monitor activity. Both the logical and physical entry points into your environment need to be discovered and protected.<\/li>\n<li>Be prepared for real-time events. Are your incident response plans clearly defined, and rehearsed? And are they supported by business continuity, information protection, and crisis communications?<\/li>\n<li>Audit accounts and permissions, adopt the principle of least privilege. It is surprising how often accounts or access are never terminated.<\/li>\n<li>Manage your vulnerabilities. This can be accomplished through a thorough risk assessment. Similarly, while everyone knows how important it is to patch systems we see companies often getting caught short by inconsistent or poor patching programs.<\/li>\n<li>Measure and document your baselines. Knowing what your environment should look like when it is running optimally is the best barometer to indicate when something is amiss.<\/li>\n<li>Review your internal controls to make sure you have a good balance of preventive and detective controls. Remember that untested controls will atrophy so develop an audit plan to test the effectiveness of these controls based on criticality, testing issues or current threat. If you are not sure which common controls are most impactful, take a look at cybersecurity hygiene controls. Assessments are available online but be familiar and trust the portal where you share this information.<\/li>\n<\/ol>\n<p>These recommendations are straightforward but elements in these programs are inter-connected and there is a logical order for development and implementation. Don\u2019t try to boil the ocean; instead, take a measured and methodical approach and continue to evaluate your program maturity. And as beneficial, work with an experienced and trusted cybersecurity partner to assist you through this process. With the correct approach and commitment, you can achieve cyber resilience.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-bg-color:#e2e2e2;--awb-bg-color-hover:#e2e2e2;--awb-bg-size:cover;--awb-border-color:#939393;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-3\"><p><strong><img decoding=\"async\" class=\"alignleft wp-image-132 size-thumbnail lazyload\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/Itegriti_MichaelSanchez200x250-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/Itegriti_MichaelSanchez200x250-66x66.jpg 66w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/Itegriti_MichaelSanchez200x250-150x150.jpg 150w\" data-sizes=\"(max-width: 150px) 100vw, 150px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 150px; --smush-placeholder-aspect-ratio: 150\/150;\" \/><\/strong><strong>Michael Sanchez, CEO (CISA, CCSFP)\u00a0<\/strong>is involved in the scoping and planning of every project, and then serves in an advisory capacity until all deliverables are completed.\u00a0 He has over 33 years of experience in information technology, cybersecurity, physical security, compliance, and audit.\u00a0Michael has held senior leadership positions in the energy, oil &amp; gas, healthcare, and transportation industries. He is a former VP and General Manager for ICF International, a large global management consulting firm, where he served as head of Commercial Cybersecurity and Compliance. In other past roles, he managed IT and OT for a $12-billion energy corporation, assisted in the IT rebuild and redesign for a large power generation company, and served for\u00a0<a href=\"https:\/\/itegriti.com\/kw022024\/2017\/news\/itegriti-honored-fbi-infragard\/\">12 years as a board member for FBI InfraGard Houston<\/a>, helping to facilitate the sharing of information related to domestic physical and cyber threats.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-large button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type fusion-has-button-gradient\" style=\"--button_accent_color:#002868;--button_border_color:#ffaa22;--button_accent_hover_color:#002868;--button_border_hover_color:#ffaa22;--button-border-radius-top-left:3px;--button-border-radius-top-right:3px;--button-border-radius-bottom-right:3px;--button-border-radius-bottom-left:3px;--button_gradient_top_color:#ffed64;--button_gradient_bottom_color:#ffaa22;--button_gradient_top_color_hover:#ffaa22;--button_gradient_bottom_color_hover:#ffed64;--button_margin-top:10px;--button_margin-bottom:10px;\" target=\"_self\" href=\"\/cybersecurity\/\"><span class=\"fusion-button-text\">MORE INFO ON CYBER RESILIENT PROGRAMS<\/span><\/a><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-text fusion-text-4\"><p><strong>Courtesy of HSToday:<\/strong> www.hstoday.us\/subject-matter-areas\/infrastructure-security\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Regardless of the skill level or support, a motivated hacker will ultimately succeed in compromising a set of their targets. Implement these 10 essential steps.<\/p>\n","protected":false},"author":3,"featured_media":1785,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,2182],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure - kw022024<\/title>\n<meta name=\"description\" content=\"Regardless of the skill level or support, a motivated hacker will ultimately succeed in compromising a set of their targets. Implement these 10 essential steps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure\" \/>\n<meta property=\"og:description\" content=\"Regardless of the skill level or support, a motivated hacker will ultimately succeed in compromising a set of their targets. Implement these 10 essential steps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-20T21:50:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-02T22:37:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Sanchez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Sanchez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/\"},\"author\":{\"name\":\"Michael Sanchez\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd\"},\"headline\":\"10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure\",\"datePublished\":\"2021-05-20T21:50:53+00:00\",\"dateModified\":\"2022-03-02T22:37:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/\"},\"wordCount\":3767,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg\",\"articleSection\":[\"Cybersecurity\",\"Op-ed\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/\",\"name\":\"10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg\",\"datePublished\":\"2021-05-20T21:50:53+00:00\",\"dateModified\":\"2022-03-02T22:37:21+00:00\",\"description\":\"Regardless of the skill level or support, a motivated hacker will ultimately succeed in compromising a set of their targets. Implement these 10 essential steps.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd\",\"name\":\"Michael Sanchez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g\",\"caption\":\"Michael Sanchez\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/itegriti\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure - kw022024","description":"Regardless of the skill level or support, a motivated hacker will ultimately succeed in compromising a set of their targets. Implement these 10 essential steps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure","og_description":"Regardless of the skill level or support, a motivated hacker will ultimately succeed in compromising a set of their targets. Implement these 10 essential steps.","og_url":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2021-05-20T21:50:53+00:00","article_modified_time":"2022-03-02T22:37:21+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg","type":"image\/jpeg"}],"author":"Michael Sanchez","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Michael Sanchez","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/"},"author":{"name":"Michael Sanchez","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd"},"headline":"10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure","datePublished":"2021-05-20T21:50:53+00:00","dateModified":"2022-03-02T22:37:21+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/"},"wordCount":3767,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg","articleSection":["Cybersecurity","Op-ed"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/","url":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/","name":"10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg","datePublished":"2021-05-20T21:50:53+00:00","dateModified":"2022-03-02T22:37:21+00:00","description":"Regardless of the skill level or support, a motivated hacker will ultimately succeed in compromising a set of their targets. Implement these 10 essential steps.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/IBMThreatIntel-Itegriti.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/10-essential-steps-to-cyber-resilience-as-hackers-target-critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"10 Essential Steps to Cyber Resilience as Hackers Target Critical Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd","name":"Michael Sanchez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g","caption":"Michael Sanchez"},"url":"https:\/\/itegriti.com\/kw022024\/author\/itegriti\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2881"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=2881"}],"version-history":[{"count":12,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2881\/revisions"}],"predecessor-version":[{"id":3185,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2881\/revisions\/3185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/1785"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=2881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=2881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=2881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}