By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Cisa tells US organisations to harden endpoint management after Stryker attack | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Cisa tells US organisations to harden endpoint management after Stryker attack | Computer Weekly
News

Cisa tells US organisations to harden endpoint management after Stryker attack | Computer Weekly

News Room
Last updated: 2026/03/19 at 9:00 PM
News Room Published 19 March 2026
Share
Cisa tells US organisations to harden endpoint management after Stryker attack | Computer Weekly
SHARE

In the wake of a wave of cyber attacks over the past week, including an ongoing incident at medical technology firm Stryker, the US Cybersecurity and Infrastructure Security Agency (Cisa) has urged organisations to immediately harden their endpoint management system configurations against intrusion by Iran-linked threat actors and others.

The 11 March incident at Michigan-based Stryker targeted its Microsoft Intune endpoint management systems, and saw Microsoft devices wiped and data stolen, resulting in widespread disruption and, in some cases, knock-on effects for frontline healthcare services.

It was swiftly claimed by the Iranian hacktivist Handala operation as retaliation for the continued Israeli-US war on Iran.

Since then, Cisa said it has been working closely with its US partners, including the FBI, to identify further threats and risks to organisations.

“To defend against similar malicious activity that misuses legitimate endpoint management software, Cisa urges organisations to implement Microsoft’s newly released best practices for securing Microsoft Intune,” said Cisa in a statement.

“The principles of these recommendations can be applied to Intune and more broadly to other endpoint management software,” the agency added.

Organisations are advised to use Intune’s role-based access control features to enforce principles of least privilege, giving users the minimum permissions necessary to complete their day-to-day tasks; to rigorously enforce phishing-resistant multi-factor authentication and privileged access hygiene with Microsoft Entra; and to reconfigure Intune access policies to require the approval of multiple administrators for sensitive or high-impact actions.

Global peers

Keven Knight, CEO of Talion, said that Cisa’s guidance was applicable beyond the US, and said he anticipated similar alerts from Cisa’s global peers – the UK’s National Cyber Security Centre (NCSC) has already published a wider cyber alert concerning the Iran war.

“What made the Stryker attack so damaging is that it wasn’t executed for money, its motivation was pure destruction, and unlike typical ransomware attacks, there was no option to pay the attackers and get the data back,” he said. “If backups were not in place, it essentially means game over and rebuilding everything from scratch.

“It’s safe to say that given the current geopolitical climate, these types of destructive attacks are going to be happening more frequently. Hardening endpoints, applying least privileged access, running frequent backups and having well-rehearsed incident response plans in place are all essential steps.

“These attacks are executed to inflict harm to countries and it’s vital organisations are prepared,” said Knight.

Tip of the iceberg

The attack on Stryker has been the most high-profile incident of Iran’s retaliatory cyber war against the US – which attacked the oil-rich state just two days after talks over its nuclear programme edged closer to a landmark deal – however, according to observers, it may be the tip of a much larger iceberg.

Michael Smith, field chief technology officer at DigiCert, said he had tracked almost 4,500 total threats from 43 active groups, with the most prolific threat actors in the region launching hundreds of attacks each in the past few weeks. He said that by and large, these cyber attacks are designed to be intimidating rather than destructive.

“There are a lot more attacks happening that aren’t being reported,” said Smith. “We’ve seen lots of DDoS attacks against our customers that we’ve mitigated without causing an outage. We also monitor hacktivist chatter for indications and warnings, and that has been incredibly active.

“Attacks like this are a way of telling people in other countries that you can still reach out and touch them even though they’re on a different continent. That makes them more of an intimidation tactic.”

Kathryn Raines, Cyber Threat Intelligence team lead for the National Security Solutions team at Flashpoint, added: “Cyber activity tied to this conflict is becoming more focused on disruptive operations against organisations.

“Groups like Handala are amplifying claims of large-scale attacks, including data destruction and the exposure of sensitive information tied to both private companies and individuals. Even when some of these claims are difficult to verify, they still contribute to uncertainty and can have real downstream impact on trust, operations and response efforts.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Now Live: MetaWinners Community Launches $METAWIN Token Presale | HackerNoon Now Live: MetaWinners Community Launches $METAWIN Token Presale | HackerNoon
Next Article Best MacBook deal: Save 0 on 15-inch 2025 MacBook Air M4 Best MacBook deal: Save $200 on 15-inch 2025 MacBook Air M4
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Take 40% Off the Editors’ Choice-Winning JBL Boombox 3 Speaker With This Deal
Take 40% Off the Editors’ Choice-Winning JBL Boombox 3 Speaker With This Deal
News
The Murder That Shook a Village | HackerNoon
The Murder That Shook a Village | HackerNoon
Computing
Google finally bringing Gemini app to Mac after Apple partnership
Google finally bringing Gemini app to Mac after Apple partnership
News
Amazon Big Spring Sale 2026: Amazon device deals on Echo, Fire TV, Kindle, and more
Amazon Big Spring Sale 2026: Amazon device deals on Echo, Fire TV, Kindle, and more
News

You Might also Like

Take 40% Off the Editors’ Choice-Winning JBL Boombox 3 Speaker With This Deal
News

Take 40% Off the Editors’ Choice-Winning JBL Boombox 3 Speaker With This Deal

6 Min Read
Google finally bringing Gemini app to Mac after Apple partnership
News

Google finally bringing Gemini app to Mac after Apple partnership

1 Min Read
Amazon Big Spring Sale 2026: Amazon device deals on Echo, Fire TV, Kindle, and more
News

Amazon Big Spring Sale 2026: Amazon device deals on Echo, Fire TV, Kindle, and more

6 Min Read
Amazon Is Selling A 3-In-1 Charging Station For  – BGR
News

Amazon Is Selling A 3-In-1 Charging Station For $19 – BGR

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?