A lot of the recommended preparation involves measures organizations should have in place already.

US-led sanctions on Russia for its invasion of Ukraine earlier this week have sparked considerable concern about retaliatory and spillover cyberattacks from the region on US organizations and those based in other allied nations.
Many expect the attacks to run the gamut from destructive campaigns involving the use of disk-wipers and ransomware, to distributed-denial-of-service attacks, phishing, disinformation, misinformation and influence campaigns. Security experts expect that some of the attacks will be targeted and executed by state-backed Russian threats. Others are likely going to launched by actors sympathetic to Russian interests, and yet others will likely just spill over from Ukraine and cause collateral damage in the same way that NotPetya malware did a few years ago.
Here are seven measures that security experts say organizations need to take right now to be prepared for these attacks. Most of the advice includes measures that organizations should have in place already. But if they don’t, now is a good time to implement them, say the experts.
1. Assess Your Exposure: Not Everyone Faces the Same Risks
Chester Wisniewski, principal research scientist at Sophos, says the exposure that organizations face to Russian cyberattacks varies significantly.
Companies that have done or are doing business in Ukraine should expect the worst and make sure that all their security controls are as up-to-date as possible. Monitoring for credential abuse is especially key. “You should expect communications to be unreliable and have backup plans for how to communicate via other means if you intend to Read more:https://bit.ly/3M7jjno