Think the March 2022 Cyber Incident Reporting Critical Infrastructure Act (CIRCIA) doesn't apply to your clients' businesses because they're too small? Think again. Some 311,000 thousand ‘small entities’ are subject to proposed reporting rules and regulations under the new CIRCIA law, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said this month.Under proposed rules, covered entities (those organizations subject to the regulation) must report major cyber incidents to the CISA within 72 hours and ransom payments within 24 hours. The regulation is unlikely to take effect until late 2025 at the earliest, and possibly not until 2026, CISA said.Why are these important figures for MSPs and MSSPs? Because small businesses are in the wheelhouse of many MSPs and MSSPs. And, of course, many MSPs and MSSPs are themselves small businesses, making it doubly important to understand the scope and reach of the CIRCIA legislation.While a good number of small businesses hire a dedicated IT manager, MSPs and MSSPs are often part or all of the IT strategy for small and mid-sized companies. By outsourcing the responsibility of network monitoring, IT management, and cybersecurity to a third-party provider, internal IT teams or managers at small businesses can focus on strategic initiatives and core objectives rather than getting bogged down by day-to-day IT tasks and troubleshooting.Of the estimated 316,244 covered entities, CISA estimates that 310,855 would be considered small entities, including businesses, some government agencies and organizations. Of the 264 NAICS codes with available revenue data, 99.2% had a revenue impact of less than or equal to 1%. CISA estimated that the average cost per non-covered entity would be $33.58 and the average cost per covered entity experiencing a single covered cyber incident would be $4,139.60. Costs for covered entities will include “becoming familiar with the proposed rule, followed by the recurring data and records preservation requirements, and then reporting requirements,” CISA said.In the NPRM, CISA said it “wants to assist small entities in understanding this proposed rule so that they can better evaluate its effects on them and participate in the rulemaking.”Of particular note, CISA will not “retaliate against small entities that question or complain about this proposed rule or any policy or action of the CISA.”CISA discusses its process for determining key definitions in the rule (including approaches it considered and ultimately discarded). Provides an overview of current cyber incident reporting requirements in the U.S. (as part of a discussion regarding its harmonization efforts, for which a lot of us had high hopes that will not be realized). Gives us examples of what may and may not constitute a reportable incident under the rule (for example, short-term unavailability of a business system or temporary rerouting of network traffic, or even exploitation of a known vulnerability by a threat actor that is quickly detected and remediated, typically would not be considered reportable incidents).
Channel markets, Channel, Ransomware
SMBs Must Report Ransom Payments in 24 Hours: CISA

.
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
You can skip this ad in 5 seconds