Home / Blogs

FCC Alert on Cybersecurity Risks

The FCC recently took the unusual step of warning telecom companies about an increased risk of ransomware attacks. The FCC is warning telecom companies to regularly patch their systems, enable multifactor authentication, and segment their networks to avoid falling victim to ransomware attacks. The alert cited data that shows a fourfold increase in attacks on telecom companies from 2022 to 2025.

In the alert, the FCC said it has become aware over the past year of an increase in ransomware incidents involving small- to medium-sized communications companies. These attacks have disrupted service, exposed company and customer information, and have locked ISPs and carriers out of critical files.

The FCC alert talks about how ransomware works and offers advice on how to protect against the problem. The FCC also offers advice on how to respond to a ransomware scammer, including advice for contacting the FCC and the FBI.

The most interesting recommendation was to monitor the cybersecurity practices of your critical vendors, which I take to mean vendors who supply network electronics or software systems. The FCC warns that a significant number of telecom intrusions have resulted from weaknesses in vendor-supplied systems. I’m not really sure how a small ISP is supposed to monitor this, because every major vendor you work with will swear they have safe practices.

The FCC alert includes all of the standard cybersecurity practices related to regularly backing up data and training employees to avoid phishing and other bad practices. They also say that every ISP ought to have an incident response plan of how to deal with cybersecurity problems and to test it regularly.

An appendix to the FCC alert lists best practices recommended by the FCC’s Communications Security, Reliability, and Interoperability Council. This is a group formed that includes the FCC, large ISPs, and carriers. This list recommends taking additional steps, such as requiring validation of software patches before using them.

This Council also strongly recommends using the least-privilege principle (PoLP) for network access. This is a process that limits access to critical software systems to only those who need it. It also involves granting minimum access rights so that users can access only the parts of a system they need, while blocking access elsewhere. It can mean granting people temporary access only for the duration of a needed task. Finally, this means granting access by job function, and not by user identity.

It’s obviously impossible to fully protect a company from external attacks, as was witnessed when the Salt Typhoon hackers gained access to a number of giant corporations and government agencies that supposedly have world-class cybersecurity. But it’s worth reviewing your practices and systems, because of the downside of being unlucky enough to be a victim of one of these attacks.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By Doug Dawson, President at CCG Consulting

Dawson has worked in the telecom industry since 1978 and has both a consulting and operational background. He and CCG specialize in helping clients launch new broadband markets, develop new products, and finance new ventures.

Visit Page

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign