{"id":8672,"date":"2020-11-19T07:00:00","date_gmt":"2020-11-19T12:00:00","guid":{"rendered":"https:\/\/vweisfeld.com\/?p=8672"},"modified":"2021-02-16T08:20:38","modified_gmt":"2021-02-16T13:20:38","slug":"covid-in-an-era-of-cyber-insecurity","status":"publish","type":"post","link":"https:\/\/vweisfeld.com\/?p=8672","title":{"rendered":"Covid in an Era of Cyber Insecurity"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignright size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"410\" height=\"392\" src=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2020\/11\/Internet-2.jpg?resize=410%2C392&#038;ssl=1\" alt=\"\" class=\"wp-image-8671\" srcset=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2020\/11\/Internet-2.jpg?w=410&amp;ssl=1 410w, https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2020\/11\/Internet-2.jpg?resize=300%2C287&amp;ssl=1 300w, https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2020\/11\/Internet-2.jpg?resize=150%2C143&amp;ssl=1 150w, https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2020\/11\/Internet-2.jpg?resize=314%2C300&amp;ssl=1 314w\" sizes=\"auto, (max-width: 410px) 100vw, 410px\" \/><\/figure><\/div>\n\n\n\n<p><strong>12\/3 Update: The <a href=\"https:\/\/www.washingtonpost.com\/world\/coronavirus-vaccine-hackers-phish-ibm-cold-chain\/2020\/12\/03\/27a5b0b2-355d-11eb-9699-00d311f13d2d_story.html\">attacks on health care entities <\/a>attempting to address the Covid pandemic continue, with the latest hacker target&#8211;the cold chain necessary to distribute vaccines.<\/strong><\/p>\n\n\n\n<p>Since 2014, the United States has faced an increasing number of well-publicized cyber attacks. Although some have been severe, none have crossed the \u201ctraditional threshold of war,\u201d as described by <a href=\"https:\/\/www.wired.com\/story\/general-paul-nakasone-cyber-command-nsa\/\">Garrett M. Graff<\/a> in a November 2020 <em>Wired<\/em> article. To recap a few of these: In 2014, there was China\u2019s theft of government personnel records and North Korea\u2019s suspected hack of Sony; in 2016, Russia attempted to manipulate the presidential election; and more recently, we\u2019ve seen numerous ransomware attacks on institutions and municipal governments, both large (Atlanta, Baltimore) and small.<\/p>\n\n\n\n<p>In response to such threats, New York City created a citywide <a href=\"https:\/\/www1.nyc.gov\/site\/cyber\/about\/about-nyc-cyber-command.page\">cyber command<\/a> (the NYCCC) in July 2017. This centralized organization works across NYC agencies and offices \u201cto prevent, detect, respond, and recover from cyber threats.\u201d Geoff Brown, head of the NYCCC, described its challenges in a recent online briefing moderated by <a href=\"https:\/\/www.thecipherbrief.com\/about-us\">Cipher Brief<\/a> founder Suzanne Kelly. A consolidated approach certainly has face validity, compared to asking a hundred different entities with personnel of varying training, skill, and interest to cobble together their own separate, inevitably not interoperable security plans. As Brown said, \u201cWe can\u2019t predict what\u2019s coming around the curve, but if we build resilient systems overall, we can respond well.\u201d<\/p>\n\n\n\n<p>Over the last year, in the face of Covid, the NYCCC has used its technical environment to \u201cdefend the defenders.\u201d When city agencies moved to remote operations, that process also was aided by the NYCCC\u2019s work. Not surprisingly, cyber adversaries took advantage of concerns about Covid to expand their intrusion attempts, knowing people would more quickly respond to queries and data requests that appeared to be Covid-related and ignore potential red flags.<\/p>\n\n\n\n<p>It was incredibly sobering, Brown said, to reflect on how, in the middle of a life-threatening crisis, the health network itself became so vulnerable. As a result, NYCCC has worked with both the public and the private hearth care sectors to increase awareness of cyber vulnerabilities and strengthen their defenses. Never forget, he warned, that without extreme vigilance, the consequences can be deadly. He cited how a ransomware attack led to the <a href=\"https:\/\/www.technologyreview.com\/2020\/09\/18\/1008582\/a-patient-has-died-after-ransomware-hackers-hit-a-german-hospital\/\">recent death of a German man<\/a>. <\/p>\n\n\n\n<p>Understandably, health care systems have a fundamental concern about patient privacy, although even that makes the system <a href=\"https:\/\/www.politico.eu\/article\/cybercriminal-extorts-finnish-therapy-patients-in-shocking-attack-ransomware-blackmail-vastaamo\/\">subject to attack<\/a>. Clearly, such attacks are corrosive, with damage beyond their initial impact, by damaging citizens\u2019 all-important trust in governmental, public health, and social institutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>12\/3 Update: The attacks on health care entities attempting to address the Covid pandemic continue, with the latest hacker target&#8211;the cold chain necessary to distribute vaccines. Since 2014, the United States has faced an increasing number of well-publicized cyber attacks. &hellip; <a href=\"https:\/\/vweisfeld.com\/?p=8672\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Covid in an Era of Cyber Insecurity - Cyber attacks and couterattacks are on the rise.","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[35,186,104],"tags":[1746],"class_list":["post-8672","post","type-post","status-publish","format-standard","hentry","category-real-life","category-technology","category-the-morgue","tag-cipher-brief"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2NkiT-2fS","_links":{"self":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/8672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8672"}],"version-history":[{"count":4,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/8672\/revisions"}],"predecessor-version":[{"id":8705,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/8672\/revisions\/8705"}],"wp:attachment":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}