{"id":209366,"date":"2024-03-01T17:18:52","date_gmt":"2024-03-01T17:18:52","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/03\/01\/how-recent-cyberattacks-revealed-americas-infrastructure-weaknesses\/"},"modified":"2025-06-25T17:21:24","modified_gmt":"2025-06-25T17:21:24","slug":"how-recent-cyberattacks-revealed-americas-infrastructure-weaknesses","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/03\/01\/how-recent-cyberattacks-revealed-americas-infrastructure-weaknesses\/","title":{"rendered":"How recent cyberattacks revealed America&#8217;s infrastructure weaknesses"},"content":{"rendered":"<p> [ad_1]<br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/content.fortune.com\/wp-content\/uploads\/2024\/03\/GettyImages-1993484055-e1709313095160.jpg?w=2048\" \/><\/p>\n<div data-cy=\"articleContent\">\n<p>The United States has long faced extraordinary levels of threats from cyberattacks targeting critical infrastructure. FBI Director Christopher Wray has so frequently and <a href=\"https:\/\/fortune.com\/2024\/02\/15\/volt-typhoon-voltzite-china-hackers-us-critical-infrastructure\/\" target=\"_self\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">consistently sounded alarms<\/a> about the dangers posed to electrical grids, water treatment facilities, and more that the warnings have become background noise.<\/p>\n<div class=\"paywall\">\n<p>Last week, for at least the second time, the warnings proved prescient, and Americans suffered because of a <a href=\"https:\/\/fortune.com\/asia\/2024\/02\/22\/leaked-documents-github-china-hacking-nato-secretary-general-jens-stoltenberg-microsoft-google\/\" target=\"_self\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">cyberattack against our critical infrastructure<\/a>. One of the country\u2019s largest prescription processors <a href=\"https:\/\/fortune.com\/2024\/02\/23\/unitedhealth-hacking-pharmacy-slowdown\/\" target=\"_self\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">took its systems offline due to a cyberattack<\/a>, forcing pharmacies to use manual procedures, causing long wait times or no service for a customer base that spans the globe, given that the impact included U.S. military clinics.<\/p>\n<p>We have moved from theoretical attacks on our critical infrastructure to actual attacks with immediate and severe impacts on everyday life. Echoing the disruption seen during the Colonial Pipeline cyberattack in 2021, last week\u2019s attack is a harbinger of things to come. China and our other digital adversaries are no longer just stealing valuable intellectual property; they are prepositioning their cyber bombs across our critical infrastructure to attack at a time and place of their choosing. But because these attacks happen in cyberspace, the battlefield is less tangible, and nation-state attacks blend in with service outages like <a href=\"https:\/\/fortune.com\/2024\/02\/26\/att-network-outage-customers-pissed-theyre-only-getting-5-dollars\/\" target=\"_self\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">AT&amp;T\u2019s<\/a>, which turned out to be a software update gone awry and not a cyberattack.<\/p>\n<p>With all the attention given to cyber, Americans might think we are well-defended and prepared; this is, after all, critical infrastructure. We could have been well-defended and prepared. The publicly available <a href=\"https:\/\/urldefense.com\/v3\/__https:\/www.cisa.gov\/resources-tools\/resources\/2013-national-infrastructure-protection-plan__;!!F0Stn7g!H0iP7qNeThsRagk7L_2Q5eKSK6RPC_V7M9cLoLY1VsztB7Qmhwc2jorv1wPNtiTw-zFemBAIH_dG85Ky$\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">National Infrastructure Protection Plan is dated 2013<\/a>, and the sector-specific plans for each of the 16 critical infrastructure sectors are all eight or more years out of date. The most mature of all industries in terms of a public-private partnership and enforced mandatory minimum cybersecurity requirements, the Defense Industrial Base, last published an <a href=\"https:\/\/urldefense.com\/v3\/__https:\/www.cisa.gov\/sites\/default\/files\/publications\/nipp-ssp-defense-industrial-base-2010-508.pdf__;!!F0Stn7g!H0iP7qNeThsRagk7L_2Q5eKSK6RPC_V7M9cLoLY1VsztB7Qmhwc2jorv1wPNtiTw-zFemBAIH-gh0Eyw$\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">updated plan in 2010<\/a>.<\/p>\n<p>The need for a robust defense mechanism is straightforward. Still, the urgency needs to be improved despite a <a href=\"https:\/\/www.reuters.com\/world\/five-eyes-intelligence-chiefs-warn-chinas-theft-intellectual-property-2023-10-18\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">joint statement by the Five Eyes intelligence chiefs<\/a> emphasizing the global scale of the issue, stressing the need for international cooperation and public-private partnerships that safeguard critical infrastructure.<\/p>\n<p>In Munich, <a href=\"https:\/\/www.dhs.gov\/news\/2024\/02\/16\/secretary-mayorkas-delivers-keynote-remarks-munich-cyber-security-conference?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=sendto_newslettertest_technology&amp;stream=top#_ga=2.96298908.1086463230.1708871244-1239338192.1708871244\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">Homeland Security Secretary Alejandro Mayorkas<\/a> advocated for an approach whereby government works directly with the private sector to establish minimum requirements for cybersecurity, making it clear that regulation is inevitable, but industry has been invited to take its seat at the table as part of a thoughtful public-private partnership.<\/p>\n<p>With the vast majority of U.S. infrastructure privately owned and varying widely in cyber defense capabilities, a regulated approach to cybersecurity is not just advisable but essential for national security.<\/p>\n<p>Secretary Mayorkas advises that the mandatory baseline cybersecurity requirements align with existing frameworks published by the National Institute for Standards and Technology, Cybersecurity and Infrastructure Security Agency, and others. There is no need to reinvent the wheel.<\/p>\n<p>We know what to do\u2013and it\u2019s time to do it.<\/p>\n<p><em>Eric Noonan is the founder and CEO of CyberSheath<\/em>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"block-a9c15eee-292b-44aa-9217-08f3279fafcf\">More must-read\u00a0commentary\u00a0published by\u00a0<em>Fortune<\/em>:<\/h2>\n<p><em>The opinions expressed in Fortune.com commentary pieces are solely the views of their authors and do not necessarily reflect the opinions and beliefs of\u00a0<\/em>Fortune<em>.<\/em><\/p>\n<\/div>\n<div class=\"sc-f923d9ed-0 dNwVje article\" data-cy=\"subscriptionPlea\">Subscribe to the new Fortune CEO Weekly Europe newsletter to get corner office insights on the biggest business stories in Europe. <a href=\"https:\/\/fortune.com\/newsletters\/ceo-weekly-europe?&amp;itm_source=fortune&amp;itm_medium=article_tout&amp;itm_campaign=ceo_weekly_europe\" target=\"_self\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">Sign up<\/a> for free.<\/div>\n<\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/fortune.com\/2024\/03\/01\/how-recent-cyberattacks-revealed-america-infrastructure-weaknesses-tech-politics\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] The United States has long faced extraordinary levels of threats from cyberattacks targeting critical infrastructure. FBI Director Christopher Wray has so frequently and consistently<\/p>\n","protected":false},"author":1,"featured_media":209367,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[149],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/209366"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=209366"}],"version-history":[{"count":2,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/209366\/revisions"}],"predecessor-version":[{"id":340957,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/209366\/revisions\/340957"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/209367"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=209366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=209366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=209366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}