Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.
An integrated resilience workspace that seamlessly integrates 10 core solutions into one, easy-to-use software platform.
The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.
Explore Noggin's integrated resilience software, purpose-built for any industry.
Think your critical infrastructure assets are protected? Think again. Compliance drivers haven’t been sufficient incentive for asset owners and operators. But maybe the attack on Costa Rican government systems will wake them up. What’s going on, here?
Earlier this year, a ransomware gang infiltrated Costa Rican government systems. This wasn’t an everyday attack.
Capitalizing on a new presidency, the gang quickly proceeded to increase the pressure, upping its demand to USD 20 million and calling for a government overthrow.
The newly inaugurated President also acknowledged a broader attack than what was previously publicized. In total, 27 government institutions, including municipalities and state-run utilities, had been targeted.
Nor is Costa Rica alone. Russia was said to be behind a cyberattack that disrupted satellite connections across Europe just before the invasion of Ukraine, according to official statements from the U.K., U.S., and EU.
Attacks on critical infrastructure assets aren’t new. Their intensity and frequency are increasing markedly, however. No doubt catalyzed by geopolitical events.
How then can asset owners protect themselves? A few best-practice measures should be of help. In particular, critical infrastructure asset owners should keep a register of information relating to their assets.
That register should be kept as part of an overall risk management program specifically implemented for the asset in question and involving all major stakeholders. That program would help in the following respects:
Of course, these programs aren’t self-executing. And many asset owners flounder when it comes to implementing their programs quickly and efficiently. What would help? It’s recommended to invest in dedicated critical infrastructure protection software.
What capabilities make the difference? Consider the following three, key critical infrastructure protection software capabilities:
Those capabilities, however, don’t even scratch the surface of what’s needed. But they serve as a good start if you’re trying to secure your assets against attack. What other capabilities matter? Download our buyer’s guide to critical infrastructure protection software for the full run down.