Virtual Event Today: Supply Chain Security Summit - Register Now

Security Experts:

Connect with us

Hi, what are you looking for?


Incident Response

European Cybersecurity Agencies Issue Resilience Guidance for Decision Makers

The European Union Agency for Cybersecurity (ENISA) and the European Union’s Computer Emergency Response Team (CERT-EU) last week published a set of best practices to help organizations boost their cyber resilience.

The European Union Agency for Cybersecurity (ENISA) and the European Union’s Computer Emergency Response Team (CERT-EU) last week published a set of best practices to help organizations boost their cyber resilience.

The joint guidance is meant for public and private organizations in the EU, specifically CISOs and other decision makers. The document is also recommended for entities that support organizational risk management.

A total of 14 recommendations are outlined, and organizations have been advised to prioritize them based on their specific business needs.

The list includes the implementation of multi-factor authentication, avoiding the reuse of passwords to prevent credential stuffing attacks, ensuring that all software is up-to-date, limiting the access of third parties to internal networks and systems, hardening cloud environments, reviewing data backup strategies, and changing default credentials and disabling protocols that use weak authentication.

The agencies also recommend employing network segmentation, conducting regular training and cyber awareness events, creating a resilient email security environment, deploying protection against denial-of-service (DoS) attacks, limiting internet access for servers and other devices that could be abused for command and control (C&C) purposes by malicious actors, and creating procedures to efficiently communicate with computer security incident response teams (CSIRT).

“By following these recommendations in a consistent, systematic manner, ENISA and CERT-EU remain confident that organisations in the EU will be able to substantially improve their cybersecurity posture and in doing so will enhance the overall cyber resilience of Europe,” the cybersecurity agencies said.

However, the agencies noted that their recommendations can complement guidance issued by national or governmental cybersecurity authorities, but they do not replace it.

While other similar cybersecurity recommendations are available from both the private and public sector, implementing these recommendations is in many cases not an easy task, including due to budget and workforce constraints.

The guidance comes just weeks after major oil terminals in some of Western Europe’s biggest ports were hit by disruptive cyberattacks.

The recommendations also coincide with tensions mounting over a potential Russian invasion of Ukraine. Agencies in the United States have issued several warnings over the past weeks due to the threat posed by Russian cyber groups — while Russia appears to have mainly targeted Ukraine, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) noted that Moscow may expand its “destabilizing actions” outside of Ukraine.

Related: Security Scanners Across Europe Tied to China Govt, Military

Related: Europe’s Hypocrisy Over Personal Data Privacy Exposed

Related: EU Denounces Alleged Russian Hacking Ahead of German Vote

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Twenty-one cybersecurity-related M&A deals were announced in December 2022.