{"id":5284,"date":"2024-02-23T17:21:23","date_gmt":"2024-02-23T22:21:23","guid":{"rendered":"https:\/\/www.wradrb.org\/?p=5284"},"modified":"2024-02-28T17:48:01","modified_gmt":"2024-02-28T22:48:01","slug":"fbi-epa-cisa-outline-top-cyber-actions-for-securing-water-systems","status":"publish","type":"post","link":"https:\/\/www.wradrb.org\/fbi-epa-cisa-outline-top-cyber-actions-for-securing-water-systems\/","title":{"rendered":"FBI EPA & CISA Outline Top Cyber Actions for Securing Water Systems"},"content":{"rendered":"\n
The Cybersecurity & Infrastructure Security Agency (CISA), the Environmental Protection Agency (EPA), and the Federal Bureau of Investigation (FBI) updated the joint fact sheet\u00a0Top Cyber Actions for Securing Water Systems<\/a>. This update includes additional resources\u2014from American Water Works Associatio<\/a>n, the WaterISAC<\/a>, and MS-ISAC<\/a>\u2014to support water systems in defending against malicious cyber activity.\u00a0 For every recommended action item, the fact sheet provides links to free resources. <\/p>\n\n\n\n The fact sheet outlines practical actions Water and Wastewater Systems (WWS) Sector entities can take to better protect water systems from malicious cyber activity and provides actionable guidance to implement concurrently:<\/p>\n\n\n\n CISA, EPA, and FBI urge all WWS Sector and critical infrastructure organizations to review the fact sheet and implement the actions to improve resilience to cyber threat activity. Organizations can visit\u00a0cisa.gov\/water<\/a>\u00a0for additional sector tools, information, and resources.<\/p>\n\n\n\n If you require additional support for implementing any of these actions, contact EPA’s Technical Assistance Program for the Water Sector<\/a> and\/or your regional CISA cybersecurity advisor<\/a> for assistance.<\/p>\n","protected":false},"excerpt":{"rendered":" The Cybersecurity & Infrastructure Security Agency (CISA), the Environmental Protection Agency (EPA), and the Federal Bureau of Investigation (FBI) updated the joint fact sheet\u00a0Top Cyber Actions for Securing Water Systems. […]<\/p>\n","protected":false},"author":2,"featured_media":5287,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[20],"tags":[115,112,113,67,38,114,81],"acf":[],"_links":{"self":[{"href":"https:\/\/www.wradrb.org\/wp-json\/wp\/v2\/posts\/5284"}],"collection":[{"href":"https:\/\/www.wradrb.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wradrb.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wradrb.org\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wradrb.org\/wp-json\/wp\/v2\/comments?post=5284"}],"version-history":[{"count":1,"href":"https:\/\/www.wradrb.org\/wp-json\/wp\/v2\/posts\/5284\/revisions"}],"predecessor-version":[{"id":5288,"href":"https:\/\/www.wradrb.org\/wp-json\/wp\/v2\/posts\/5284\/revisions\/5288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wradrb.org\/wp-json\/wp\/v2\/media\/5287"}],"wp:attachment":[{"href":"https:\/\/www.wradrb.org\/wp-json\/wp\/v2\/media?parent=5284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wradrb.org\/wp-json\/wp\/v2\/categories?post=5284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wradrb.org\/wp-json\/wp\/v2\/tags?post=5284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n