March 1, 2022

How to Bolster your Cybersecurity Response Amid Tensions Between Russia and Ukraine

by: Align

How to Bolster your Cybersecurity Response Amid Tensions Between Russia and Ukraine 

Following the Russian attack on Ukraine, the Cybersecurity & Infrastructure Security Agency (CISA) has recommended that U.S. organizations apply “Shields Up” due to the high probability that we will continue seeing cyberattacks against Ukrainian allied governments and interests. While there have yet to be any credible attacks on the U.S., CISA predicts it is only a matter of time before adversaries leverage cyber-attacks. You can read more details on CISA’s Shields Up directive here.

Our Tips:  

  • Educate your employees and users with cyber training and security awareness. This will prevent social engineering and phishing attacks as your first line of defense. Align clients can leverage our Security Awareness Training.
  • Deploy MFA (Multi Factor-Authentication) to as many activities as you can to weed out potential threats. At the very least, validate that remote and administrative access require MFA.
  • Patch vulnerable software, prioritizing updates that address the known exploited vulnerabilities identified by CISA.
  • Audit which applications and devices are available from the internet and be sure nothing is accessible unnecessarily.
  • Create a plan with a designated crisis-response team. Clearly identify the main points of contact including department leads to avoid confusion in the heat of the moment during an incident.
  • Test backup procedures to ensure critical data can be recovered quickly in the event of a cyber-attack, and ensure that backups are isolated from network connections.

What We're Doing:  

  • For Align Managed customers, the Network Operations Team will continue to patch Align IT Suite Platform endpoints in accordance with its normal day to day practices.
  • Clients that are leveraging Managed Threat Protection (Guardian endpoint and Guardian network) will have continued 24x7x365 monitoring by our Security Operations Center (SOC) against known and unknown threats in real-time, enabling us to continuously monitor, detect and respond to suspicious activity in your network and safeguard your critical infrastructure from malicious hackers.

Key Takeaways from John Araneo, Managing Director, Align Cybersecurity:John Araneo_BW

  • In times of heightened cyber risks, always start with the fundamentals, by ensuring the core technological, operational and governance controls are in place and being actively administered.
  • A model cybersecurity risk management program is, by its nature, both proactive and reactive; the former by way of the various preventative controls (such as data loss prevention, monitoring, access rights and controls and employee education) and the latter manifested through elements such as incident response plans, communication controls and post-breach governance structures.
  • Take care in creating and maintaining qualitative, active and meaningful third-party relationships with your IT, compliance and cybersecurity advisors.

Additional Resources:

Align Cybersecurity™

Align’s leading-edge cloud services and robust cybersecurity advisory practice can help safeguard your business from threats like this. It assesses and addresses evolving cybersecurity threats, and allows our clients to create customizable solutions that mitigate risk and compliance burdens while empowering secure, agile, mission-critical services.

Contact Us

Continue Reading

Related Articles


“Align is our trusted provider for all our Managed Services and cybersecurity needs. They provide us best-in-class IT services that not only help drive productivity and growth, but ensure we meet both current and evolving compliance and security requirements with ease. As consultants to financial advisors, trust and reliability are indispensable to our operations, which is why we never hesitate to refer Align to our very own client base. Align isn’t just our partner, they are an extension of our team. We look forward to entrusting them with our IT infrastructure for years to come.”

Ed Fasano - Experienced Advisory Consultants LLC