Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CloudZ Malware Abuses Phone Link to Steal SMS OTPs

May 6, 2026

Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks

May 6, 2026

CISA Urges CI to Make Plans to Remain Active if hit by Cyber-Attack

May 6, 2026
Facebook X (Twitter) Instagram
Wednesday, May 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»CISA Urges CI to Make Plans to Remain Active if hit by Cyber-Attack
News

CISA Urges CI to Make Plans to Remain Active if hit by Cyber-Attack

Team-CWDBy Team-CWDMay 6, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Critical infrastructure (CI) operators have been urged to plan for  the ability to disconnect from third-party networks and recover compromised systems in the event of a cyber-attack sooner rather than later. 

The call came from the US Cybersecurity and Infrastructure Security Agency (CISA), which launched the initiative, named CI Fortify on Tuesday, as a planning framework for sectors including water, energy, transportation and communications.

CISA framed the program around a worst-case scenario in which telecommunications, internet, vendors and upstream service providers cannot be trusted, and threat actors already have a foothold in the OT network.

Isolation and Recovery as Emergency Objectives

The guidance set two core planning goals. Isolation involved proactively cutting OT systems off from third-party and business networks to prevent cyber impacts from spreading and to keep essential services running in a degraded communications environment.

CISA recommended that operators identify their critical customers, including military and lifeline services, set service delivery targets and update business continuity plans to enable safe operations in isolation for weeks or months at a time.

Recovery focused on documenting systems, backing up critical files and rehearsing the replacement of components or a transition to manual operations if isolation failed.

The agency also asked operators to share the guidance with managed service providers, system integrators and vendors to map out communications dependencies and workarounds.

Read more on OT cybersecurity guidance: IT and OT Are Not Equal. IT Can Fail. Your OT Cannot

Industry Reaction and the Limits of Isolation

CISA Acting Director Nick Andersen said the agency strongly encouraged operators to act on the recommendations.

“CI Fortify is timely, actionable guidance that helps organizations protect their networks and critical services from cyber threat actors that aim to degrade or disrupt infrastructure,” he said. 

“We strongly encourage organizations to review this guidance, implement the recommended actions and collaborate with CISA to strengthen CI defenses against opportunistic threat actors.”

Industry voices welcomed the focus on continuity but cautioned that disconnection alone would not stop an active intruder.

Duncan Greatwood, CEO of Xage Security, said attackers frequently moved through trusted connections, third parties or compromised credentials well before any crisis response began. “If organizations don’t have control within the environment, then isolation on its own is not enough,” he said.

Greatwood added that the most prepared operators would be those that layered control and containment into their environments, building on the direction set out in CISA’s earlier zero-trust guidance for OT.

The parallel benefit, CISA noted, is that operators who invest in these capabilities end up with infrastructure that is easier to defend across all disruptions, from cyber-attacks to weather events and routine component failures.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMicrosoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
Next Article Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks
Team-CWD
  • Website

Related Posts

News

CloudZ Malware Abuses Phone Link to Steal SMS OTPs

May 6, 2026
News

Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks

May 6, 2026
News

Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

May 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Here’s what you should know

February 6, 2026

Look out for phony verification pages spreading malware

September 14, 2025

Here’s how to avoid a ‘second strike’

April 11, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.