in STEMGeeks2 years ago (edited)


Is it really possible to destroy a nuclear plant with a thumb drive?

Seems a bit far-fetched right?

But here’s the thing…

This ACTUALLY did happen.

On 2nd July 2020, a huge explosion took place at an Iranian nuclear enrichment facility, damaging some of the country’s most advanced centrifuges.

The root cause was linked to a cyber-attack suspected to originate from a small device, like a thumb drive.

And whilst it lacks the sophistication of the Stuxnet cyber-attack orchestrated by the U.S. and Israel 10 years ago...

It proves yet again how cyberattacks from simple devices like thumb drives can cause catastrophic damage.

And the threat is just as real when it comes to your business.

Now, I’m not saying your company is going to be completely destroyed due to someone uploading a virus on a thumb drive (unless you own a nuclear plant, then you definitely want to double down on this).

But as I will be highlighting in a new eBook in the works, there are many ways your business is exposed to cyber-attacks across your supply chain.

From simple thumb devices containing worms like Stuxnet…

To exploiting 3rd party related network vulnerabilities...

Or from social engineering attacks and ransomware.

The fact is…

The financial and reputational risks for your business are very real.

And with supply-chain-related cyber-attacks on the increase…

It’s only a matter of time before a bad actor finds a weak link in your supply chain and gets access to your company data…

Or worse, completely shuts your business down.

But there is some good news…

When you partner with a ITSM Process & IT Policy Consultant, we can help take of of you. This includes the processes and policies related to your cybersecurity and systems, so you don’t have to worry about it.

Some can even broker for the right MSP that is the right fit for your unique business needs to handle all your technical requirements as well.

This means you and your team can focus on things that move the needle forward for your business.

So, if you want help making sure your business is protected from relentless cybercriminal attacks, get in touch with our experts today.

If you haven’t already, signup for our ITSM Rhino Newsletter and start receiving your FREE Information Technology and Cybersecurity-related eBooks and more.

I hope you enjoy continuing to enjoy our posts and content. Feel free to reach out or comment here if you have suggestions or questions.

Who knows, I'm known to give out Hive tokens for re-blogging, my favorite comments for each post, and sharing on Twitter. Just use the hashtags #itsmrhino and #hive when you tweet.

If you don't have a Hive account, you can create one here at PeakD.


Posted from my blog with Exxp :

Cybersecurity will become extremely important as everyone is moving online, thanks to the covid pandemic. Many businesses that have never considered moving online are doing so and people now know better. The downside is that there will be an uptrend in cyberattacks. Professionals like you will come in handy as time goes by. The destruction of a nuclear plant with a thumb drive analogy is really insane.

Yes, the increase in remote workforce will increase the attack surface for those looking to do harm to a business or organization. Having good ITSM processes and IT policy with proper governance in place, coupled with the technical defenses, will go a long way to help protect an organization.

Thanks for reading and taking the time to comment. Much appreciated.

Thanks for your contribution to the STEMsocial community. Feel free to join us on discord to get to know the rest of us!

Please consider supporting our funding proposal, approving our witness (@stem.witness) or delegating to the @stemsocial account (for some ROI).

Please consider using the STEMsocial app app and including @stemsocial as a beneficiary to get a stronger support. 

To keep up with security trends and threat intelligence is no doubt a very challenging task, especially nowadays, as such It is recommended to secure organization's information including both software and hardware from cyberthreat. Regards to you @joebrochin !

For sure, there is no doubt so many things a business manager or owner needs to worry about beyond cybersecurity, and it alone is enough to keep one awake at night. You have to have help for your head to stay above water.

Exactly, however most business managers give less attention to the threat that might come from cyberthreat as such more awareness should be spread on the issues. Thanks for the hive sent. I appreciate!