Cybersecurity
Companies Should Adopt Default No Trust Position on Programs to Protect Against Cyberattacks
Panelists identified risks in employees freely accepting links without thinking about their associated risks.

WASHINGTON, August, 24, 2022 – Companies should assume that new programs installed on company systems pose a threat to their networks to ensure a vigilant position on hacking risks, according to an expert on cybersecurity, after the country faced a number of high-profile cyberattacks recently.
The zero trust approach in which the default position is one of distrust of new programs was touted by Osman Saleem, cybersecurity and privacy director of operational technology and internet of things at professional services firm PricewaterHouseCoopers in Canada, who was speaking as a panelist on a Fierce Telecom event on Monday.
The event heard that the vast majority of security breaches at companies were a result of human error, including clicking on links containing malicious software (malware) that can wreak havoc on and suspend company systems. Data, in the case of a ransomware attack, can be locked away until the company pays a monetary sum to get it back.
Fred Gordy, director of cybersecurity at smart building company Intelligent Buildings, said companies sometimes don’t even back-up their systems in the event of an attack and only end up doing so in response to an attack.
Gordy also encouraged the zero trust approach to company security by assuming all digital programs and software have malware.
Opportunities for better cybersecurity
Saleem proposed that cybersecurity documents be reviewed and revised regularly because the cyber landscape always changes. This, he said, can protect the digital infrastructure of the companies’ systems, operations and employees.
Meanwhile, Congress has been pressing the issue, following the high-profile cyberattacks on software company SolarWinds, financial services company Robinhood, meat producer JBS, and oil transport company Colonial Pipeline. President Joe Biden earlier this year signed, as part of a larger budget bill, the Cyber Incident Reporting for Critical Infrastructure Act of 2022, which requires certain critical infrastructure companies to report cyberattacks to the federal government.
A House Oversight and Reform committee investigation concluded that certain hacks on companies were perpetrated through, in one example, an employee accepting a fake browser update. In the case of Colonial Pipeline and JBS, the use of many devices connected to the internet (IoT), the investigation found mass-produced factory password settings may have been the point of vulnerability.
Cybersecurity
Large Telecoms Pitch Strike Force for Internet Traffic Security Over Global Gateway
Verizon, AT&T and Lumen warned about prescriptive rules that could diminish security.

WASHINGTON, February 23, 2023 – Verizon, AT&T and Lumen Technologies have proposed that the Federal Communications Commission adopt and lead a strike force consisting of various industry, government and international participants to come up with policy mechanisms to secure internet traffic over the global gateway.
The proposals are particular to the border gateway protocol, which is how global traffic is routed. The problem is that there are no security features to ensure trust of the information being routed, according to the FCC, which opened a proceeding on the matter on February 28 last year asking for commentary on what to do about the issue. The concern is that without security measures, bad network actors can redirect traffic to itself instead of the intended recipient, which exposes Americans to the theft of identity, extortion, financial transactions, and state spying, the commission noted.
In the letter last week, the three telecommunications companies proposed that secure internet traffic routing practices over the border gateway protocol first focus on critical infrastructure entities in the United States and its allies to allow these telecommunications companies to protect the traffic routes via filtering.
The filtering would involve registering traffic origins and identifying where to filter traffic along the route, including at interconnection peering points and customer routers. The proposed strike force would involve Big Tech companies and cloud platforms, which the FCC asked if it should include in its original proceeding document, as they have networking equipment and BGP routers. The internet service providers, who have their own filtering practices, also floated the possibility of the Cybersecurity and Infrastructure Security Agency requiring other agencies to provide that information.
The proposal also includes “collaborative assurances” in which the ISPs would provide confidential technical briefings about the practices.
But they advise against the FCC making prescriptive rules about such practices, noting that different ISPs have different approaches by design, and that any onerous approach could jeopardize security, not bolster it.
Questions about FCC’s jurisdiction over a fundamentally global internet routing system
The trio also questioned the jurisdiction of the commission on the routing ecosystem, which is fundamentally global.
“Asserting prescriptive regulatory control over internet protocols could have cascading effects, prompting international regulators – and authoritarian regimes in general – to seek greater internet control at the global level through” the United Nation’s telecommunications regulatory, the International Telecommunication Union.
“This would create barriers to U.S. leadership in the global digital economy and U.S. national security and is directly contrary to core interests of the United States and our free market democratic allies,” they added.
The FCC’s notice came just days after Russia’s invasion of Ukraine, which resulted in reports of increased cyberattacks from the warring regions. In fact, the FCC accused Russian network operators of inexplicably routing traffic through its country, including from traffic from Google, Facebook, Apple, Microsoft and major credit card companies MasterCard and Visa.
It also came before a law was passed that requires critical infrastructure companies to report to the federal government within a certain timeframe when they have experienced a hack or breach, as the country grapples with a number of high-profile attacks since the pandemic began.
The FCC has targeted national security threats by halting license authorizations to Chinese firms and putting on a blacklist a number of companies whose equipment American telecommunications companies are expected to remove from their networks.
Cybersecurity
Smaller Companies Facing Cybersecurity Insurance Headwinds: Equifax Executive
Cost of insurance for cybersecurity could be a problem for smaller companies.

WASHINGTON, February 15, 2023 – Smaller companies may face increasing cybersecurity insurance costs as the market evolves, warned an executive at credit bureau company Equifax.
Cybersecurity insurance will be extraordinarily important for small-to-medium-sized businesses, said Jamil Farshchi, executive vice president and chief information security officer. But premium cybersecurity insurance coverage has increased in recent years, with many small-to-medium-sized businesses relying on that cybersecurity insurance to keep them safe.
“These are small businesses that don’t have the resources that larger organizations do,” Farshchi said. “So I worry as the insurance market evolves, the premiums and the coverage levels are getting such that is very difficult.”
Equifax was a victim of one of the country’s most infamous breaches, when in 2017 the data of 147 million Americans were stolen by hackers. The company settled for hundreds of millions of dollars with the Federal Trade Commission.
Experts have urged companies to assume that any outside program is vulnerable to hacking, a position known as “zero trust.” This way, they can take the necessary measures to address the attack.
The United States has been on heightened alert when it comes to cybersecurity issues. Over the last two years, a number of high-profile cybersecurity breaches have impacted a software company, an oil transporter, and a meat producer. Those cybersecurity problems have triggered legislation that requires that the federal government be alerted when critical industries suffer such breaches.
After Russia invaded Ukraine early last year, a number of cybersecurity hacks emerged from those countries, according to an Atlas VPN report shortly after the invasion.
Cybersecurity
CES 2023: Consumers Need to Understand Personal Cybersecurity, Says White House Cyber Official
Consumers must better understand how to weigh risks and protect themselves in the digital world, said Camille Stewart Gloster.

LAS VEGAS, January 7, 2023 – In addition to building a more robust cybersecurity workforce, policymakers should consider consumer education, said Camille Stewart Gloster, deputy national cyber director for technology and ecosystem for the White House, speaking Saturday at the Consumer Electronics Show.
CES 2023 has featured numerous discussions of cybersecurity in sectors ranging from transportation to Internet of Things home devices. On Thursday, an official from the Department of Homeland Security argued that manufactures should design and pre-configure devices to be secure, thus reducing the security burden on consumers.
For their own protection, consumers must better understand how to weigh risks and protect themselves in the digital world, Stewart Gloster said Saturday. “The sooner that people understand that their physical security and digital security are inextricably linked the better,” she argued. According to the panel’s moderator, Consumer Technology Association senior manager for government affairs John Mitchell, 82 percent of data breaches in 2021 involved “the human element, stolen credentials, phishing, misuse.”
Stewart Gloster’s team is working on a national cyber-workforce and education strategy, she said, which will address the federal cyber workforce, the national cyber workforce, cyber education, and “digital safety awareness.”
Stewart Gloster said workforce initiatives should promote the participation of “people of a diverse set of backgrounds who are highly skilled and multidisciplinary who can take a look at the problem space, who can apply their lived experiences, apply the things they’ve observed, apply their academic backgrounds to a challenging and ever evolving landscape.”
-
Fiber4 weeks ago
‘Not a Great Product’: AT&T Not Looking to Invest Heavily in Fixed Wireless
-
Broadband Roundup3 weeks ago
AT&T Floats BEAD in USF Areas, Counties Concerned About FCC Map, Alabama’s $25M for Broadband
-
Big Tech2 weeks ago
Preview the Start of Broadband Breakfast’s Big Tech & Speech Summit
-
Big Tech4 weeks ago
House Innovation, Data, and Commerce Chairman Gus Bilirakis to Keynote Big Tech & Speech Summit
-
Big Tech3 weeks ago
Watch the Webinar of Big Tech & Speech Summit for $9 and Receive Our Breakfast Club Report
-
#broadbandlive2 weeks ago
Broadband Breakfast on March 22, 2023 – Robocalls, STIR/SHAKEN and the Future of Voice Telephony
-
Infrastructure1 week ago
BEAD Build Timelines in Jeopardy if ‘Buy America’ Waivers Not Granted, White House Budget Office Told
-
#broadbandlive3 weeks ago
Broadband Breakfast on March 8: A Status Update on Tribal Broadband