• Partners
  • Contact Us
  • Client Support
Coretelligent
  • About
    • Why Choose Coretelligent As Your Managed Service Provider?
    • Core Values
    • Leadership
    • Testimonials
    • Careers
  • Solutions
    • Overview
    • IT Planning & Strategy
    • Comprehensive IT Support
    • Security & Compliance
    • Unified Cloud Management
    • Backup & Disaster Recovery
    • Co-Managed Services
  • Industries
    • Overview
    • Financial Services
    • Real Estate
    • Life Sciences
    • Technology
    • Professional Services
  • IT Resources
    • Resource Library
    • Blog
    • Events
    • Press Releases
    • Media Coverage
  • Contact
  • Search
  • Menu

Insights Articles

Our Information Technology Views and Articles

Heads of Top Security Agencies Issue Warning on Threat of Chinese Espionage

Insights
July 8, 2022

The heads of the FBI and MI5, Britain’s domestic security service, have warned business executives about threats posed by Chinese digital espionage, the goal of which is often to steal Western companies’ intellectual property.

During the joint appearance on July 6, 2022, Christopher Wray, director of the Federal Bureau of Investigation (FBI), and Ken McCallum, director-general of MI5, reiterated a need for digital caution and ongoing vigilance because of the scale of Beijing’s operation.

“The Chinese government is set on stealing your technology—whatever it is that makes your industry tick—and using it to undercut your business and dominate your market,” Mr. Wray told the audience in attendance. “They’re set on using every tool at their disposal to do it.”

China is engaged in “a coordinated campaign on a grand scale” that represents “a strategic contest across decades,” Mr. McCallum emphasized. “We need to act.”

The Chinese government utilizes state-sponsored hacking to exploit known cybersecurity vulnerabilities in order to establish a more extensive web of compromised infrastructure. Over the last few years, it has exploited several high-severity vulnerabilities that have given these attackers the opportunity to gain entry to many vulnerable devices.

Once the attackers have access to these devices, they assess the critical users and seek to gain further credentials. Utilizing these and other methods, these attackers are continually evolving and adapting their practices to bypass existing defenses, so maintaining a proactive and defensive cybersecurity posture for your business is imperative.

CISA Recommended Best Practices

The US Cybersecurity & Infrastructure Security Agency (CISA) is recommending a variety of best practice actions for combating this threat, including, but not limited to:

  • Applying patches as soon as possible
  • Disabling unnecessary ports and protocols
  • Replacing end-of-life infrastructure
  • Implementing a centralized patch management system

Additional recommendations from Coretelligent’s security experts include:

Remain vigilant

  • Implement multifactor authentication
  • Think before you click a link or open an email attachment.
  • Be wary of new social media requests.
  • Limit the attack surface on all Internet-facing infrastructure

Ensure readiness to respond to a cyber incident

  • Review policies and procedures around incident response.

How to Protect Your Organization?

If you are concerned that your organization’s current cybersecurity posture is not robust enough to sufficiently handle the growing threat, reach out to learn more about Coretelligent’s multi-layered cybersecurity solutions.

by Becca Herring
Tags: cybersecurity, defense, espionage, FBI, hacking, MFA, MI5
« Five Topics to Cover in Your Next IT Strategy SessionHow to Develop an Effective IT Strategy for Your Business »

Latest Insights / Articles

August 2, 2022

Top Emerging Technology Trends in Life Sciences for 2022

July 25, 2022

Disaster Recovery as a Service (DRaaS): Everything You Need to Know

July 12, 2022

How to Develop an Effective IT Strategy for Your Business

July 5, 2022

Five Topics to Cover in Your Next IT Strategy Session

Read our Latest Resources
Defense-in-depth

Multilayered Cybersecurity with Defense-in-Depth

Download Now
Broker Dealer Cybersecurity

Effective Cybersecurity Controls for Broker-Dealer Firms

Download Now
Best Practices for Safeguarding Against Critical Cyber Threats

Safeguard Against Critical Cyber Threats

Download Now

About

  • Why Choose Coretelligent As Your Managed Service Provider?
  • Core Values
  • Leadership
  • Testimonials
  • Partners
  • Careers

Solutions

  • Overview
  • IT Planning & Strategy
  • Comprehensive IT Support
  • Security & Compliance
  • Unified Cloud Management
  • Backup & Disaster Recovery
  • Co-Managed Services

Industries

  • Overview
  • Financial Services
  • Real Estate
  • Life Sciences
  • Technology
  • Professional Services

Contact

Sales & Support: 1-855-841-5888

Email: info@coretelligent.com

Support Service Center

Let’s Talk

Schedule a no-obligation consultation.

Contact Us Today

Locations

Atlanta

Boston

Chicago

Dallas

Houston

Los Angeles

Maryland

New York

Philadelphia

Portland

San Francisco

Stamford

Tampa

Washington, D.C.

West Palm Beach

Virginia

Follow Us

  • Facebook
  • Twitter
  • LinkedIn

© 2022 Coretelligent. All rights reserved.

Privacy Policy

CCPA Privacy Notice

Scroll to top

This site uses cookies. By continuing to use this site, you accept our use of cookies. Our privacy policy was recently updated on November 2, 2018. Learn more about our Privacy Policy here.

I Accept