The Potential Risks Of Using Russian Tech

Share post:

The National Cyber Security Centre (NCSC) has advised organizations to look for alternatives to Russian-linked software or products.

This is because using these products as part of their network or supply chain makes them vulnerable to cyberattacks.

According to the NCSC, Russian law contains legal obligations on companies to assist the Russian Federal Security Service (FSB). The pressure to obey the obligation may intensify in a time of war.

Organizations providing services to Ukraine and organizations or individuals engaging in activities countering Russian actions could become targets.

NCSC advises critical infrastructure, the public sector, and high-profile organizations to evaluate the risks of using Russia-linked software and technology products.

“This conflict has changed the world order, and the increased risk and uncertainty aren’t going away any time soon. However, the best thing to do is to make plans, ensure your systems are as resilient as practical, and have good recovery plans,” Ian Levy, technical director at the NCSC said.

For more information, read the original story in ZDNet.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, April 26, 2024 – Patch warnings for Cisco ASA gateways and a WordPress plugin

This episode reports on the malicious plugin worm that refuses to die

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways