The Federal Communications Commission has in recent months stepped up its warnings to broadcasters and other communications providers that ransomware and other forms of malware remain a growing threat to day-to-day operations, urging companies to take concrete steps now to reduce their exposure. The Public Safety and Homeland Security Bureau is now going a step further by scheduling a cybersecurity workshop specifically geared for broadcasters. The May 14 event will feature speakers from the FCC and other federal agencies, as well as industry experts.
The Bureau says the event will bring together public- and private-sector representatives to raise awareness of emerging cybersecurity risks, share and promote adoption of best practices, and highlight opportunities for public-private partnership on cybersecurity issues facing broadcasters. While the big companies often have IT teams to address the growing threat, the FCC sees small- and medium-sized broadcasters as potentially the biggest beneficiaries of the workshop. It says panelists and presenters will offer practical guidance for engineers, station managers and company executives on how to strengthen cybersecurity and improve incident response.
The free workshop will start at 10am ET on Thursday, May 14 at the agency’s Washington headquarters. It will also be streamed on the FCC’s website. Pre-registration is suggested for both remote and in-person attendees. Information can be found HERE.
Recent hacks at Gow Media “ESPN 97.5 Houston” KFNC and Virginia Tech Foundation news/talk “Radio IQ” WVTF (89.1) Roanoke, VA have only underscored the risk that broadcasters face. The FCC said in February that it had become aware of ransomware incidents during the past year involving small-to-medium-sized communications companies that disrupted service, exposed information, and locked providers out of critical files.
The Public Safety and Homeland Security Bureau says the events show that some U.S. communications networks are vulnerable to cyber exploits that may pose “significant risks” to national security, public safety, and business operations.
In a public notice released in February, the Bureau said hackers commonly gain initial access through tactics such as social engineering, malicious software downloads, fake or compromised websites, vulnerabilities in remote access software, or stolen credentials. Once inside a network, attackers can move across a system, and ultimately deploy ransomware, after which they typically demand a ransom in exchange for decrypting the files targeted or for preventing the release of stolen data. The Bureau notes that repairing the damage can be “both costly and disruptive” to a company.
To address those risks, the FCC outlined a series of best practices it says communications providers should review and implement. Among them is developing a cybersecurity risk management plan that clearly assigns responsibilities and establishes incident-response procedures. It also recommended regularly updating and patching software; enabling multi-factor authentication; maintaining robust and tested data backups; training employees in cybersecurity awareness; segmenting networks; and adopting a “zero trust” architecture. The FCC said companies also need to be continuously monitoring systems for suspicious activity and evaluating the cybersecurity practices of third-party vendors.
The Bureau also stressed the importance of acting quickly if an attack occurs since it can help to isolate affected systems, preserve forensic evidence, and restore data from clean backups if an attack does occur. The FCC noted that certain ransomware incidents may trigger mandatory reporting obligations, including the unauthorized transmission of Emergency Alert System codes like what happened in Houston. The agency also recommended companies consider notifying the Commission and federal law enforcement even when reporting rules are not strictly triggered.
