|
Hello. Post-mortem reports on cyberattacks are largely secret and even closely held within the victim company.
But reports studying how a local government handled a hack are often made public, to uphold accountability to residents. These accounts can be good reading, with useful intelligence and lessons learned.
Take the "after action report" from Nevada's technology office about what happened during and after a ransomware attack detected Aug. 24 that disrupted 60 state agencies, some for 28 days. Info Tech Research Group came in to dissect the incident, top to bottom. Its report is pretty revealing about what went wrong, tracing the problem to a state employee months earlier downloading malware from a spoofed site. He thought he was grabbing a legitimate administration tool.
The report also lays out what went right, including highly orchestrated internal meetings during recovery, prior funding for cyber insurance and muscle memory from annual incident-response simulations. Recommended reading.
More news below.
|