We’re sitting ducks.

After all these years, we’re still not ready for cyberattacks.

Our own government isn’t ready for more. Most recently, “the US Coast Guard has been urged to improve the cybersecurity infrastructure of the Maritime Transportation System (MTS), which includes ports, waterways, and vessels essential for transporting over $5.4 trillion worth of goods annually,” says Tripwire.com.

Cities, hospitals, schools, and many companies aren’t ready either. 

Most recently, Qantas Airlines said that on June 30, it “detected ‘unusual activity’ on a platform used by its contact center to store the data of six million people, including names, email addresses, phone numbers, birth dates and frequent flyer numbers,” as noted by the BBC.

Columbia University also said its IT system was hacked. 

According to the University:

“We now have initial indications that the unauthorized actor also unlawfully stole data from a limited portion of our network. We are investigating the scope of the apparent theft and will share our findings with the University community as well as anyone whose personal information was compromised. We have not observed threat actor activity on our network since June 24 and will continue to monitor closely for further unlawful activity in our systems.”

Even the U.S. Cybersecurity & Infrastructure Security Agency (CISA) along with the FBI and the NSA are urging organizations to remain vigilant against potential targeted cyber operations by Iranian state-sponsored or affiliated threat actors. 

Sadly, none of us are really prepared for another massive attack – which means you may want to keep an eye on cybersecurity stocks such as Palo Alto (PANW), CrowdStrike (CRWD), Zscaler (ZS), and ETFs such as:

Global X Cybersecurity ETF (BUG)

Headlines are leading traders to the slaughter. If you want the tools to outsmart the herd and fund your financial goals, click here.

“The Global X Cybersecurity ETF (BUG) seeks to invest in companies that stand to potentially benefit from the increased adoption of cybersecurity technology, such as those whose principal business is in the development and management of security protocols preventing intrusion and attacks to systems, networks, applications, computers, and mobile devices,” says Global X.

Sincerely,

Ian Cooper