top of page
  • Deborah

The Cybersecurity and Infrastructure Security Agency (CISA) is developing a Catalog of Bad Practices in cybersecurity to help critical infrastructure providers prioritize their cybersecurity responsibilities.

The catalog will focus on those bad practices that are ‘exceptionally risky, especially in organizations supporting Critical Infrastructure or National Critical Infrastructure (‘NCFs’)’ including but not limited to the:

  • Use of unsupported (or end-of-life) software in service of Critical Infrastructure and NCFs.

  • Use of known/fixed/default passwords and credentials in service of Critical Infrastructure and NCF.

Both practices are considered dangerous as they significantly elevate the risk to national security, national economic security, and national public health and safety and are described as especially egregious in internet-accessible technologies.

CISA will expand the list in due course and following market participants’ feedback.

Concerned entities should take notice and monitor CISA's Catalog, this will help them shape and adjust, where relevant, their cybersecurity framework.

Recent Posts

See All

Information, Communication Technology (ICT) systems, generally includes all hardware, software, applications and systems that combined enable people and organizations to communicate digitally. ICT enc

25 January 2023 - Comments requested on Financial Conduct Authority (FCA) proposed Sustainability Disclosure Requirements (SDR) and investment labels. 6 February 2023 - Comment period closes for the u

Last November, 2022 the Bank for International Settlements (BIS) and the International Organization of Securities Commissions (IOSCO) published their Level 3 assessment of cyber resilience on 37 Finan

bottom of page