When hit by a ransomware attack, how adept are critical infrastructure companies at identifying, fending off and recovering from a cyber hijack? Not so much, according to a 2021 study crafted by CyberRisk Alliance’s (CRA) business intelligence unit.
(Full disclosure: CyberRisk Alliance is the parent company of MSSP Alert and ChannelE2E.)
According to findings in CRA’s Cybersecurity in U.S. Critical Infrastructure report, less than 30 percent of critical infrastructure organizations have set a baseline reference to monitor for suspicious activity. And, fewer than one in four have the ability to enforce configuration policies on target systems with unpatched vulnerabilities.
The survey’s questions mapped to the U.S. Commerce Department’s National Institute of Standards and Technology five cybersecurity domains-- Identify, Protect, Detect, Respond, Recover-- a set of NIST cybersecurity framework guidelines and best practices to help organizations build and improve their cybersecurity posture.
Here are some of the study’s key findings (by percentage/input of respondents):
On identifying and protecting systems, assets, data, and capabilities from cyber attacks.
On financial services’ and insurance firms’ progress to detect and respond to cyber events.
On ransomware recovery and backups.
On top security gaps of companies in financial services and insurance, healthcare, chemical and critical manufacturing.
Identify & Protect:
Detect & Respond:
Recovery:
The survey spanned 380 security security professionals, including members of InfraGard, a nonprofit public-private partnership between U.S. businesses and the Federal Bureau of Investigation. Participants spanned the manufacturing, chemical, healthcare, and financial services sectors.
Managed detection and response (MDR) providers eSentire and Palo Alto Networks' Cortex XDR sponsored the work.