{"id":129279,"date":"2025-02-12T11:07:19","date_gmt":"2025-02-12T17:07:19","guid":{"rendered":"https:\/\/www.controleng.com\/?p=129279"},"modified":"2025-04-23T18:09:08","modified_gmt":"2025-04-23T23:09:08","slug":"how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa","status":"publish","type":"post","link":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/","title":{"rendered":"How to mitigate the ongoing Salt Typhoon telecom hack: CISA"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Salt Typhoon insights<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Understand what Salt Typhoon hack is<\/strong>, impact and CISA\u2019s mitigation suggestions.<\/li>\n\n\n\n<li><strong>Review CISA cybersecurity roles&nbsp;<\/strong>and the 16 critical infrastructure sections.<\/li>\n\n\n\n<li><strong>Assess what CISA resources&nbsp;<\/strong>you or your organization could to lower cybersecurity risk.<\/li>\n<\/ul>\n\n\n\n<p>Salt Typhoon telecommunication hack is an ongoing exploitation of <a href=\"https:\/\/www.att.com\">AT&amp;T<\/a>, <a href=\"https:\/\/www.lumen.com\/en-us\/home.html\">Lumen<\/a>, <a href=\"https:\/\/www.t-mobile.com\/?gclsrc=aw.ds&amp;&amp;cmpid=MGPO_PB_P_EVGRNPSTPD_43700071606574149_708137424881&amp;gad_source=1&amp;gbraid=0AAAAAD79WuVXihO9xXr5kpf_S3r7p3w5H&amp;gclid=CjwKCAiAqrG9BhAVEiwAaPu5zntvWYXQKm6I1KcdQDrm2XScsEgN53rQQICmhOVuoGKBfkOupsp04xoCRmUQAvD_BwE\">T-Mobile<\/a>, <a href=\"https:\/\/www.verizon.com\/plans\/unlimited\/?customer_id=279-516-8739&amp;cmp=KNC-C-Mobility-NON-R-BPUR-NONE-NONE-2K0VZ0-COE-GAW-586&amp;kpid=go_cmp-12581404974_adg-116456529981_ad-659741214171_kwd-13038366_dev-c_ext-_prd-_sig-CjwKCAiAqrG9BhAVEiwAaPu5ztNEmSKOhf6jIZEEGNHjACvjmcptWigc_8l_WMWz9oPz_BV9IsUiWhoCuwsQAvD_BwE&amp;gad_source=1&amp;gbraid=0AAAAAD6-lLtfjPiSyxgWqh7BdvtqRdNgJ&amp;gclid=CjwKCAiAqrG9BhAVEiwAaPu5ztNEmSKOhf6jIZEEGNHjACvjmcptWigc_8l_WMWz9oPz_BV9IsUiWhoCuwsQAvD_BwE\">Verizon<\/a> and other networks, from a state-sponsored hacking group in October 2024, explained as the worst telecom hack in U.S. history by the <a href=\"https:\/\/www.cisa.gov\">Cybersecurity and Infrastructure Security Agency (CISA)<\/a>  at the 2025 ARC Leadership Forum by <a href=\"http:\/\/www.arcweb.com\">ARC Advisory Group<\/a>. The hack gained access to millions of U.S. call detail records, who talk to, how often, at what times and location data, including highly sensitive law enforcement intelligence and law enforcement data, according to Neal Arnold, cybersecurity advisor \u2013 law enforcement liaison, Region IV, Cybersecurity advisor program, CISA.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig1-Neal-Anderson-768x1024.jpg\" alt=\"Figure 1: Neal Arnold, cybersecurity advisor \u2013 law enforcement liaison, Region IV, Cybersecurity advisor program, Cybersecurity and Infrastructure Security Agency (CISA), explained about the worst and ongoing telecommunications hack in U.S. history, Salt Typhoon, and offered cybersecurity advice at the 2025 ARC Leadership Forum by ARC Advisory Group Feb. 10. Courtesy: Mark T. Hoske, Control Engineering, WTWH Media\" class=\"wp-image-129280\" srcset=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig1-Neal-Anderson-768x1024.jpg 768w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig1-Neal-Anderson-225x300.jpg 225w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig1-Neal-Anderson-1152x1536.jpg 1152w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig1-Neal-Anderson-1536x2048.jpg 1536w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig1-Neal-Anderson-scaled.jpg 1920w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">Figure 1: Neal Arnold, cybersecurity advisor \u2013 law enforcement liaison, Region IV, Cybersecurity advisor program, Cybersecurity and Infrastructure Security Agency (CISA), explained about the worst and ongoing telecommunications hack in U.S. history, Salt Typhoon, and offered cybersecurity advice at the 2025 ARC Leadership Forum by ARC Advisory Group Feb. 10. Courtesy: Mark T. Hoske, Control Engineering, WTWH Media<\/figcaption><\/figure>\n\n\n\n<p>Arnold (see Figure 1) said Salt Typhoon is not a traditional compromise because no confirmation has been given that Salt Typhoon has been evicted from compromised networks. Arnold said Salt Typhoon has embedded itself in older, aging network equipment and in niche networking that\u2019s difficult to detect. In addition:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>On Dec. 4, 2024, CISA published guidance specific to the communication infrastructure, <a href=\"https:\/\/www.cisa.gov\/resources-tools\/resources\/enhanced-visibility-and-hardening-guidance-communications-infrastructure\">providing network engineers and network defenders mitigation information<\/a> (see Figure 2).<\/li>\n\n\n\n<li><\/li>\n\n\n\n<li>CISA and the FBI urged Americans to use fully encrypted text messaging apps to minimize chances of sharing information with the Peoples Republic of China (PRC).<\/li>\n\n\n\n<li>If possible, conduct business over Microsoft Teams, Webex or other similar platforms.<\/li>\n\n\n\n<li>The most sensitive conversations should be in person, including sensitive critical infrastructure and manufacturing-related intellectual property information.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig2-Salt-Typhoon-mitigation-1024x768.jpg\" alt=\"Figure 2: CISA offers guidance on the Salt Typhoon cybersecurity breach, as explained by Neal Arnold, cybersecurity advisor \u2013 law enforcement liaison, Region IV, Cybersecurity advisor program, Cybersecurity and Infrastructure Security Agency (CISA), at the 2025 ARC Leadership Forum by ARC Advisory Group Feb. 10. Courtesy: Mark T. Hoske, Control Engineering, WTWH Media\" class=\"wp-image-129281\" srcset=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig2-Salt-Typhoon-mitigation-1024x768.jpg 1024w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig2-Salt-Typhoon-mitigation-300x225.jpg 300w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig2-Salt-Typhoon-mitigation-768x576.jpg 768w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig2-Salt-Typhoon-mitigation-1536x1152.jpg 1536w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig2-Salt-Typhoon-mitigation-2048x1536.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 2: CISA offers guidance on the Salt Typhoon cybersecurity breach, as explained by Neal Arnold, cybersecurity advisor \u2013 law enforcement liaison, Region IV, Cybersecurity advisor program, Cybersecurity and Infrastructure Security Agency (CISA), at the 2025 ARC Leadership Forum by ARC Advisory Group Feb. 10. Courtesy: Mark T. Hoske, Control Engineering, WTWH Media<\/figcaption><\/figure>\n\n\n\n<p>Arnold\u2019s presentation, \u201cCybersecurity threat landscape: Securing critical infrastructure,\u201d covered industrial cybersecurity from the CISA perspective. He explained that CISA will reach out when operational technology (OT) products have a vulnerability and are being exploited. As with any contact, he recommends verifying and contacting CISA back, though perhaps not via email, which may also be compromised, he said.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does CISA do?<\/h2>\n\n\n\n<p>The five key CISA activities across 16 critical infrastructure sections (Figure 3) are:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. Identify and verify suspicious cyber activity.<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">2. Understand incidents and vulnerabilities.<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">3. Build and maintain partnerships.<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">4. Share timely and actionable information.<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">5. Collaborate with partners to mitigate risk.<\/h4>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-1024x768.jpg\" alt=\"Figure 3: CISA serves critical U.S. infrastructure, helping to mitigate cybersecurity risk in five key ways across 16 critical infrastructure sectors, said Neal Arnold, cybersecurity advisor \u2013 law enforcement liaison, Region IV, Cybersecurity advisor program, Cybersecurity and Infrastructure Security Agency (CISA) at the 2025 ARC Leadership Forum by ARC Advisory Group Feb. 10. Courtesy: Mark T. Hoske, Control Engineering, WTWH Media\" class=\"wp-image-129282\" srcset=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-1024x768.jpg 1024w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-300x225.jpg 300w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-768x576.jpg 768w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-1536x1152.jpg 1536w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-2048x1536.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 3: CISA serves critical U.S. infrastructure, helping to mitigate cybersecurity risk in five key ways across 16 critical infrastructure sectors, said Neal Arnold, cybersecurity advisor \u2013 law enforcement liaison, Region IV, Cybersecurity advisor program, Cybersecurity and Infrastructure Security Agency (CISA) at the 2025 ARC Leadership Forum by ARC Advisory Group Feb. 10. Courtesy: Mark T. Hoske, Control Engineering, WTWH Media<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What are the 16 critical infrastructure sections?<\/h2>\n\n\n\n<p>Many of the 16 critical infrastructure sections use automation, control and instrumentation.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. Chemical<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">2. Commercial facilities<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">3. Communications<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">4. Critical manufacturing<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">5. Dams<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">6. Defense industrial base<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">7. Emergency facilities<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">8. Energy<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">9. Financial services<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">10. Food and agriculture<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">11. Government facilities<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">12. Health care and public health<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">13. Information technology<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">14. Nuclear reactors, materials and waste<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">15. Transportation systems<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">16. Water and wastewater systems<\/h4>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Industrial cybersecurity threats, advanced threats<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.controleng.com\/how-cisos-can-overcome-industrial-cybersecurity-talent-resource-shortages\/\">Cyber threat factors<\/a> include ransomware; sophistication phishing; internet of things (IoT) malware and vulnerabilities; data theft, fraud and breaches; supply chain attacks; teleworking; insider threats; lack of protection and policies; and advanced persistent threats (APTs).<\/p>\n\n\n\n<p>Supply chain threats include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Software service providers and outside contractors through exploitation of smaller, typically less-secure companies with access to or credentials for the networks of larger corporations.<\/li>\n\n\n\n<li>Mergers and acquisitions: Inheriting the (lack of) security from smaller companies.<\/li>\n\n\n\n<li>Physical components: Hidden \u201cbackdoors\u201d embedded in software or hardware.<\/li>\n\n\n\n<li>Network services: Do you know the route your digital traffic takes from one point to the next?<\/li>\n\n\n\n<li>IoT may prioritize time to market over security.<\/li>\n<\/ul>\n\n\n\n<p>Advanced threats include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Social engineering: Scattered spider, SIM swapping, account takeovers, reset passwords and multi-factory authentication (MFA) removal, data exfiltration, extortion and ransomware.<\/li>\n\n\n\n<li>Artificial intelligence (AI), a program that can <a href=\"http:\/\/www.controleng.com\/87-of-cyber-professionals-are-worried-about-AI-driven-threats\">sense, reason, act and adapt<\/a>: Machine learning (ML), algorithms whose performance improve when exposed to more data over time; deep learning, an ML subset where multilayered neural networks learn from vast amounts of data; large language models; generative AI; deepfakes; and artificial general intelligence.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Critical infrastructure and industrial cybersecurity hygiene, procedures<\/strong><\/h2>\n\n\n\n<p>Basic cybersecurity hygiene is highly recommended, such as MFA, strong passwords (long, unique and randomly generated), prompt software updates (automatically, if possible), train to recognize and report phishing (one click can install malware), Arnold said.<\/p>\n\n\n\n<p>Be suspicious of emails from unknown senders, do not provide personal or corporate sensitive information requested via email, do not use contact information from the email or phone request. Contact the organizer directly to verify. Do not send personal information on the internet without checking website security first.<\/p>\n\n\n\n<p>If you have been affected, report it immediately, including proper points of contact in an organization; prevent the spread by isolating the infected computers and systems. Disconnect from the internet, but do not turn off the machine. Try to identify the type of ransomware to help understand what you are working with. Work with cybersecurity professional trained in resolving these issues. Recover your data from your backups after you test the backups to ensure the data on the backups is safe to restore.&nbsp;<\/p>\n\n\n\n<p>Only about 20% of critical infrastructure cybersecurity incidents are reported. There are no mandates, but Arnold said mandates are likely in the future, adding that reporting to CISA is confidential and protected against litigation, sunshine laws and civil litigation. CISA cyber services are paid through tax dollars and should be used when appropriate, including assessments, vulnerability scanning and hygiene. Better to have us do a CISA Cyber Hygiene Assessment than to have a hacker do so (Figure 4). CISA also offers physical security assessments, he said. Results from assessments can help with grants and funding for cybersecurity upgrades.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig4-help-1024x768.jpg\" alt=\"Figure 4: Cybersecurity resources and assessments were listed by Neal Arnold, cybersecurity advisor \u2013 law enforcement liaison, Region IV, Cybersecurity advisor program, Cybersecurity and Infrastructure Security Agency (CISA) at the 2025 ARC Leadership Forum by ARC Advisory Group Feb. 10. Courtesy: Mark T. Hoske, Control Engineering, WTWH Media\" class=\"wp-image-129284\" srcset=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig4-help-1024x768.jpg 1024w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig4-help-300x225.jpg 300w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig4-help-768x576.jpg 768w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig4-help-1536x1152.jpg 1536w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig4-help-2048x1536.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 4: Cybersecurity resources and assessments were listed by Neal Arnold, cybersecurity advisor \u2013 law enforcement liaison, Region IV, Cybersecurity advisor program, Cybersecurity and Infrastructure Security Agency (CISA) at the 2025 ARC Leadership Forum by ARC Advisory Group Feb. 10. Courtesy: Mark T. Hoske, Control Engineering, WTWH Media<\/figcaption><\/figure>\n\n\n\n<p><strong>Mark T. Hoske<\/strong>, editor-in-chief,\u00a0<em>Control Engineering,\u00a0<\/em>WTWH Media<em>,<\/em>\u00a0<a href=\"mailto:mhoske@wtwhmedia.com\">mhoske@wtwhmedia.com<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>CONSIDER THIS<\/p>\n\n\n\n<p>Are you following government-available guidance on critical infrastructure cybersecurity?<\/p>\n\n\n\n<p>ONLINE<\/p>\n\n\n\n<p>Read more on <a href=\"http:\/\/www.controleng.com\/industrial-cyber-security\">industrial cybersecurity <\/a>from Control Engineering.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Salt Typhoon insights Salt Typhoon telecommunication hack is an ongoing exploitation of AT&amp;T, Lumen, T-Mobile, Verizon and other networks, from a state-sponsored hacking group in October 2024, explained as the worst telecom hack in U.S. history by the Cybersecurity and Infrastructure Security Agency (CISA) at the 2025 ARC Leadership Forum by ARC Advisory Group. The [&hellip;]<\/p>\n","protected":false},"author":4032,"featured_media":129283,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[104076,109314],"tags":[109831,109828,109826,109827,109833,109829,109340,109832,109830,109836,109835,109834],"tracking-metrics":[],"display-location":[109353],"class_list":{"2":"type-post"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to mitigate the ongoing Salt Typhoon telecom hack: CISA - Control Engineering<\/title>\n<meta name=\"description\" content=\"ARC Leadership Forum, 2025: CISA industrial cybersecurity expert offers risk mitigation tips in the worst telecom hack in U.S. history.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to mitigate the ongoing Salt Typhoon telecom hack: CISA - Control Engineering\" \/>\n<meta property=\"og:description\" content=\"ARC Leadership Forum, 2025: CISA industrial cybersecurity expert offers risk mitigation tips in the worst telecom hack in U.S. history.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/\" \/>\n<meta property=\"og:site_name\" content=\"Control Engineering\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-12T17:07:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T23:09:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-SLIDER.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mark Hoske, editor-in-chief\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:site\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Hoske, editor-in-chief\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/\"},\"author\":{\"name\":\"Mark Hoske, editor-in-chief\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/c3e3529162019138a435bc287eaaac70\"},\"headline\":\"How to mitigate the ongoing Salt Typhoon telecom hack: CISA\",\"datePublished\":\"2025-02-12T17:07:19+00:00\",\"dateModified\":\"2025-04-23T23:09:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/\"},\"wordCount\":1120,\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-SLIDER.jpeg\",\"keywords\":[\"ARC 2025\",\"ARC Advisory Group\",\"ARC Forum\",\"ARC Leadership Forum\",\"CISA\",\"CISA assessments\",\"control engineering\",\"critical infrastructure\",\"industrial cybersecurity\",\"Salt Typhoon cybersecurity risks\",\"Salt Typhoon hack\",\"Salt Typhoon mitigation\"],\"articleSection\":[\"Cybersecurity\",\"Industrial Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/\",\"url\":\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/\",\"name\":\"How to mitigate the ongoing Salt Typhoon telecom hack: CISA - Control Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-SLIDER.jpeg\",\"datePublished\":\"2025-02-12T17:07:19+00:00\",\"dateModified\":\"2025-04-23T23:09:08+00:00\",\"description\":\"ARC Leadership Forum, 2025: CISA industrial cybersecurity expert offers risk mitigation tips in the worst telecom hack in U.S. history.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#primaryimage\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-SLIDER.jpeg\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-SLIDER.jpeg\",\"width\":1024,\"height\":768,\"caption\":\"Courtesy: WTWH Media\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.controleng.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to mitigate the ongoing Salt Typhoon telecom hack: CISA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.controleng.com\/#website\",\"url\":\"https:\/\/www.controleng.com\/\",\"name\":\"Control Engineering\",\"description\":\"Control Engineering covers and educates about automation, control and instrumentation technologies\",\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.controleng.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.controleng.com\/#organization\",\"name\":\"Control Engineering\",\"url\":\"https:\/\/www.controleng.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"width\":300,\"height\":93,\"caption\":\"Control Engineering\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\",\"https:\/\/x.com\/controlengtips\",\"https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/c3e3529162019138a435bc287eaaac70\",\"name\":\"Mark Hoske, editor-in-chief\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bd1801ce53cd132b0ee6eb473bad99d46bc2e6516069dfc5ecddefeed3f36728?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bd1801ce53cd132b0ee6eb473bad99d46bc2e6516069dfc5ecddefeed3f36728?s=96&d=mm&r=g\",\"caption\":\"Mark Hoske, editor-in-chief\"},\"url\":\"https:\/\/www.controleng.com\/author\/mark-hoske-editor-in-chief\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to mitigate the ongoing Salt Typhoon telecom hack: CISA - Control Engineering","description":"ARC Leadership Forum, 2025: CISA industrial cybersecurity expert offers risk mitigation tips in the worst telecom hack in U.S. history.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/","og_locale":"en_US","og_type":"article","og_title":"How to mitigate the ongoing Salt Typhoon telecom hack: CISA - Control Engineering","og_description":"ARC Leadership Forum, 2025: CISA industrial cybersecurity expert offers risk mitigation tips in the worst telecom hack in U.S. history.","og_url":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/","og_site_name":"Control Engineering","article_publisher":"https:\/\/www.facebook.com\/ControlEngineeringMagazine","article_published_time":"2025-02-12T17:07:19+00:00","article_modified_time":"2025-04-23T23:09:08+00:00","og_image":[{"width":1024,"height":768,"url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-SLIDER.jpeg","type":"image\/jpeg"}],"author":"Mark Hoske, editor-in-chief","twitter_card":"summary_large_image","twitter_creator":"@controlengtips","twitter_site":"@controlengtips","twitter_misc":{"Written by":"Mark Hoske, editor-in-chief","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#article","isPartOf":{"@id":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/"},"author":{"name":"Mark Hoske, editor-in-chief","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/c3e3529162019138a435bc287eaaac70"},"headline":"How to mitigate the ongoing Salt Typhoon telecom hack: CISA","datePublished":"2025-02-12T17:07:19+00:00","dateModified":"2025-04-23T23:09:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/"},"wordCount":1120,"publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"image":{"@id":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-SLIDER.jpeg","keywords":["ARC 2025","ARC Advisory Group","ARC Forum","ARC Leadership Forum","CISA","CISA assessments","control engineering","critical infrastructure","industrial cybersecurity","Salt Typhoon cybersecurity risks","Salt Typhoon hack","Salt Typhoon mitigation"],"articleSection":["Cybersecurity","Industrial Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/","url":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/","name":"How to mitigate the ongoing Salt Typhoon telecom hack: CISA - Control Engineering","isPartOf":{"@id":"https:\/\/www.controleng.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#primaryimage"},"image":{"@id":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-SLIDER.jpeg","datePublished":"2025-02-12T17:07:19+00:00","dateModified":"2025-04-23T23:09:08+00:00","description":"ARC Leadership Forum, 2025: CISA industrial cybersecurity expert offers risk mitigation tips in the worst telecom hack in U.S. history.","breadcrumb":{"@id":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#primaryimage","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-SLIDER.jpeg","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2502_WEB_ARC_Cybersecurity-CISA-Fig3-Roles-16-sectors-SLIDER.jpeg","width":1024,"height":768,"caption":"Courtesy: WTWH Media"},{"@type":"BreadcrumbList","@id":"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.controleng.com\/"},{"@type":"ListItem","position":2,"name":"How to mitigate the ongoing Salt Typhoon telecom hack: CISA"}]},{"@type":"WebSite","@id":"https:\/\/www.controleng.com\/#website","url":"https:\/\/www.controleng.com\/","name":"Control Engineering","description":"Control Engineering covers and educates about automation, control and instrumentation technologies","publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.controleng.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.controleng.com\/#organization","name":"Control Engineering","url":"https:\/\/www.controleng.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","width":300,"height":93,"caption":"Control Engineering"},"image":{"@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ControlEngineeringMagazine","https:\/\/x.com\/controlengtips","https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/"]},{"@type":"Person","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/c3e3529162019138a435bc287eaaac70","name":"Mark Hoske, editor-in-chief","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bd1801ce53cd132b0ee6eb473bad99d46bc2e6516069dfc5ecddefeed3f36728?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd1801ce53cd132b0ee6eb473bad99d46bc2e6516069dfc5ecddefeed3f36728?s=96&d=mm&r=g","caption":"Mark Hoske, editor-in-chief"},"url":"https:\/\/www.controleng.com\/author\/mark-hoske-editor-in-chief\/"}]}},"_links":{"self":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/users\/4032"}],"replies":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/comments?post=129279"}],"version-history":[{"count":0,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129279\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media\/129283"}],"wp:attachment":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media?parent=129279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/categories?post=129279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tags?post=129279"},{"taxonomy":"tracking-metric","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tracking-metrics?post=129279"},{"taxonomy":"display-location","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/display-location?post=129279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}