Capitol Building Breach: Physical and Cyber Failures
Posted: January 8, 2021 to News.
How Big of a Cyber Security Risk?
In all likelihood, the rioters/domestic terrorists are probably not sophisticated hackers. In fact, they may not even know how to turn a computer on. At this point, we just don't know. But, if someone somewhere was able to procure a stray laptop, it's possible they could hand it over to a person with more experience. If a device was stolen, and the victim was following cyber safety protocols, it's likely that it was encrypted or at least password protected. However, we are aware of just how lackluster the US government's cyber hygiene has notoriously been. Also, if it was left open - say a person was quickly evacuated and didn't have the time or foresight to shut it down - a looter could have taken pictures or read anything left up on the computer. There's also a possibility, though it is slight, that one of the people who broke in uploaded malicious software onto the devices they came across, especially in this time of political turmoil. There is no evidence as of yet that this was done, but it's important to consider and examine. The biggest concern, however, is with the possibility that confidential documents may potentially have been taken, if they were printed off and left on a desk. Again, it's likely that computers were encrypted, but clearly, papers on a desk were not.The Cyber Fallout
And likely, this attack will cause some national self-examination of not only physical security but cybersecurity, as well. In both cases, however, the US just simply wasn't well enough prepared to properly handle the threat, and there will be repercussions from that.
Protect Your Business Today
Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.