The United States government, states, municipalities, and private companies all have been trying to defend themselves from cyber warfare from foreign adversarial governments, including Russia, China, and North Korea, for years—actually, for decades. Even when I started practicing full time in this area of law in the early 2000s, we were talking about not traveling to those countries with work laptops for fear that data on the laptop would be stolen or misappropriated.

Every time a foreign adversarial government attacks a U.S. government agency or business with a cyberattack, it should be viewed like what it is: a bomb. Although it does not blow up bricks and mortar, it blows up the ability for the target to do business and forces it to rebuild its network and system in order to function. Every time a ransomware or malware code, or other bug, virus, or malicious tool is downloaded into a system, it should be viewed as what it is as well: an act of war by an adversary.

Last week, President Biden called out Russia for its part in wreaking havoc on tens of thousands of businesses when it launched the SolarWinds attack, and put sanctions in place. This will not be the last word in cyber warfare.

Russia and other foreign adversaries have sophisticated capabilities in cyber warfare. We don’t want to talk about it, but cyber warfare could cripple the economy, critical infrastructure, monetary transactions, health care, food supply, access to accurate information, communication, and our livelihoods. Everything is connected to the internet. Everything. And everything is vulnerable to cyber warfare.

Take time to determine what you would need in the face of cyber warfare. I liken it to what you would need if a very powerful hurricane came through, taking out the power, the water, the banking system, the grid, the ability to use a credit card (because there is no power), to get food and sustenance, gas or electricity for your car, or to get medical supplies or treatment. Some thoughts about what to stock up on include cash, a generator or other power supply, potable water, non-perishable food, medical supplies, an alternate form of communication and supply of energy, an escape route, and an escape plan. Whether it is cyber warfare, a hurricane, or worse, preparing for an emergency will help you weather it, and hopefully, the preparation will never be needed.

Photo of Linn Foster Freedman Linn Foster Freedman

Linn Freedman practices in data privacy and security law, cybersecurity, and complex litigation. She is a member of the Business Litigation Group and the Financial Services Cyber-Compliance Team, and chairs the firm’s Data Privacy and Security and Artificial Intelligence Teams. Linn focuses her…

Linn Freedman practices in data privacy and security law, cybersecurity, and complex litigation. She is a member of the Business Litigation Group and the Financial Services Cyber-Compliance Team, and chairs the firm’s Data Privacy and Security and Artificial Intelligence Teams. Linn focuses her practice on compliance with all state and federal privacy and security laws and regulations. She counsels a range of public and private clients from industries such as construction, education, health care, insurance, manufacturing, real estate, utilities and critical infrastructure, marine and charitable organizations, on state and federal data privacy and security investigations, as well as emergency data breach response and mitigation. Linn is an Adjunct Professor of the Practice of Cybersecurity at Brown University and an Adjunct Professor of Law at Roger Williams University School of Law.  Prior to joining the firm, Linn served as assistant attorney general and deputy chief of the Civil Division of the Attorney General’s Office for the State of Rhode Island. She earned her J.D. from Loyola University School of Law and her B.A., with honors, in American Studies from Newcomb College of Tulane University. She is admitted to practice law in Massachusetts and Rhode Island. Read her full rc.com bio here.