• Making IT Work
  • 0800 8047 256
  • information@eacs.com
UK organisations encouraged to take action in response to current situation in and around UkraineUK organisations encouraged to take action in response to current situation in and around UkraineUK organisations encouraged to take action in response to current situation in and around UkraineUK organisations encouraged to take action in response to current situation in and around Ukraine
  • About Us
    • Our Story
    • Customer Charter
    • Customers
      • Case Studies
    • ISO Certifications
    • CSR Statement
    • Awards & Recognition
    • Policy Statements
  • Services
    • Services News
    • Managed Services
      • 24/7 Services
      • Device Services
      • Device as a Service
      • Infrastructure Services
      • Security Service
      • Print Service
      • Managed Support Services
      • Managed WAN
      • Case Studies
      • Datasheets
    • Modern Workplace
      • Digital Transformation
      • Strategy Consulting
      • Current State Assessment
      • Desktop Deployment
      • Hardware Products
      • Data Management Solutions
      • Software & Renewal
      • Procurement Portal
        • eacs Selector
      • Lifecycle Management
      • Benefits of Hardware & Software Services
      • Case Studies
      • Datasheets
    • Hybrid Cloud
      • Journey to the Cloud
      • Optimise Virtual Workspace
      • Cloud Migration
      • Cloud Solutions
      • Architecture & Planning
      • Project Management
      • Cloud Availability Suite
      • Case Studies
      • Datasheets
    • Cyber Security
      • Predict
      • Prevent
      • Detect
      • Respond
      • Cybersecurity Made Simple
      • Cyber Essentials
      • Datasheets
    • Apple Services
      • Case Studies
      • Datasheets
    • Apps & Data
      • The Power Platform
      • Data Intelligence
      • Case Studies
      • Datasheets
  • Partners
    • Hybrid Cloud
    • Modern Workplace
    • Security
    • Frameworks
      • Shared Business Services
  • Optimise IT
    • Agenda
    • Exhibitors
  • News & Resources
    • News
      • Featured News
      • eacs in the news
      • eacs Blogs
      • eacs Newsletters
    • Resources
    • Case Studies
    • Datasheets
  • Community
    • Charitable Activities
    • Environment
    • CSR Statement
  • Careers
    • Careers
      • Recruitment Process
    • People Stories
    • Policies
  • Contact
    • Marketing
✕
Hindsight Cybersecurity
Hindsight Cybersecurity
February 2, 2022
Phishing
Okta Breach Update
March 31, 2022
Published by Marketing on March 2, 2022
Categories
  • Business
  • News
Tags
  • Cybersecurity
  • MFA
  • Ransomware
Image for Data Protection Blog. Image of someone pressing interactive security padlock

UK organisations encouraged to take action in response to current situation in and around Ukraine

As the situation between Russia and Ukraine continues to escalate, governments worldwide are worried the situation could spill over into other countries, becoming an all-out cyberwar.

CISA, NCSC and other security advisory are urging UK organisations to bolster their cyber security resilience in response to reports of an increase in malicious cyber incidents in recent days.  In particular, businesses have been asked to watch out for targetted ransomware attacks.

Businesses are strongly advised to adopt a heightened state of awareness and ensure staff are aware of what to do in the event of an incident.  In addition, we encourage you to review your existing security protocols and, where appropriate, implement additional measures to ensure you remain protected.  In particular, eacs recommends that businesses consider implementing the following actions, if they are not in place already:

  • Strengthen access controls by enforcing multi-factor authentication if it is not already implemented;
  • Apply conditional access policies within MS365 environment to ensure that your controls are as comprehensive as they can be;
  • Check that backup and restore mechanisms are all working as expected;
  • Ensure that all systems are patched to the current appropriate levels; 
  • Test your incident response plan to ensure that it meets your current requirements.

eacs also strongly recommends that you implement regular network vulnerabilities scans looking at your internal-facing network if you do not currently conduct this activity.  If you are unsure how to implement this or require eacs to assist you, please speak to your Service Delivery Manager or Client Manager.

eacs will continue to monitor the latest intelligence provided by NCSC, CISA and other advisories regarding potential exploitation vectors that Russian state sponsored threat actors may utilise.  If you have any questions or are concerned in any way, please get in touch with your Service Delivery Manager or Client Manager, who will be happy to advise you.

To read more from the NCSC, please see their latest press release here.

Share
0
Marketing
Marketing

Related posts

Phishing
March 31, 2022

Okta Breach Update


Read more
evolving networks news
January 19, 2022

eacs supporting Evolving Networks charge into the IT Channel


Read more
September 23, 2021

Development Bank of Wales Group appoints eacs for managed services & technical services


Read more

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

About

About Us

Corporate Social Responsibility

Customer Satisfaction

Services

Managed Services

Professional Services

Cloud Services

Apple Services

Cyber Security

Hardware and Software

Procurement Portal – eacs Selector

Get in Touch

Head Office:
7 Ramsay Court,
Hinchingbrooke Business Park,
Huntingdon, Cambridgeshire.
PE29 6FY

Tel: 0800 8047 256
Fax: 0845 – 3379 147
Email: Click Here

Policies

Cookies

Disclaimer

Policy Statements

Privacy

Supplier Code of Conduct

© 2020 EACS. All Rights Reserved