By Shawn Waldman, CEO – Secure Cyber
The United States and Israel are now at war with Iran.
If you’re asking, “What does that have to do with cybersecurity?” — the answer is simple:
Every modern kinetic war includes cyber warfare. Every single time.
We saw it in Ukraine. We saw it when the U.S. eliminated Soleimani and the IRGC retaliated with cyberattacks against American water and wastewater utilities. In that case, attackers specifically targeted utilities using Israeli-made technology that was directly exposed to the internet.
Most of this activity never makes headlines.
But it’s happening.
And if history is any indicator, we are entering a heightened cyber threat environment inside the United States.
Here are 13 immediate actions network defenders should take right now.
Attacks come in two forms:
If you have exposed assets and they aren’t patched, you are a potential victim.
It doesn’t matter whether you’re:
Automated scanning doesn’t care about your size.
Your perimeter devices should be your top priority.
That includes:
Action steps:
If it’s internet-facing, it’s a priority.
This is not the time to rip and replace security tools.
Instead:
Coverage gaps are where attackers live.
If you outsource IT, contact your Managed Service Provider today.
Ask:
Many breaches start through compromised service providers.
Now is the time to verify — not assume.
Most next-generation firewalls have features that block:
Attackers frequently purchase fresh domains to launch phishing or malware campaigns. These domains are often flagged within the first 30–90 days.
Turn these protections on.
Your Intrusion Prevention System (IPS) may be set conservatively to reduce false positives.
In a heightened threat environment:
Think of it as raising your internal DEFCON level.
Security should operate in rings.
As geopolitical tension rises, so should your defensive posture.
You may not be at DEFCON 1 nationally — but internally, you should be tightening controls now.
Security is not static. It adjusts with threat levels.
If you use:
Understand this:
Microsoft and Google secure the platform’s availability.
You are responsible for your tenant's security.
Action steps:
The cloud is not “set it and forget it.”
Attackers exploit war, natural disasters, and breaking news.
Expect phishing emails offering:
Train users to:
Humans remain the most targeted attack surface.
Open your cyber insurance policy.
Most policies include a war exclusion clause.
If an investigation determines:
Your claim could be denied.
This risk is real.
Know your exposure before you need the coverage.
If you do not conduct business in certain countries, consider blocking them at the firewall.
Yes, geo-filtering can occasionally break legitimate services that rely on global CDNs.
But in elevated threat conditions, reducing attack surface may outweigh convenience.
This is a business decision — not just a technical one.
If you don’t know where to begin:
Download the CIS Top 18 Controls.
Start with:
Implementation Group 1 (IG1)
This is foundational cyber hygiene.
Security is not built overnight.
Eat the elephant one bite at a time.
Nation-state collaboration is common during conflict.
Iran may leverage:
We have personally investigated incidents inside the U.S. where compromised traffic originated from Russian IP addresses.
Threat actor infrastructure is global.
Don’t narrow your detection lens too tightly.
If you are in local government or oversee utilities:
This is especially urgent.
Ensure operators can run the plant manually.
Test manual mode regularly.
If the control system fails, operations must continue safely.
Logs may be the only forensic evidence after an incident.
Cyber conflict does not wait for press releases.
It runs parallel to kinetic war.
Most activity happens quietly — until it doesn’t.
Now is the time to:
Stay vigilant.
Cyber threats don’t wait — and neither should your organization.
Whether you need a third-party assessment, incident response readiness, compliance guidance, or fully managed security services, SecureCyber is here to help.
Take the next step today:
🌐 www.secdef.com
📞 937.388.4405
📧 sales@secdef.com
Schedule a consultation and start building a stronger, more resilient cybersecurity program.