Think before responding to a suspicious email, use virtual private networks when possible and, yes, take time to update your laptop software.
Ryan Wright, an IT security and privacy expert in the University of Virginia’s McIntire School of Commerce, provided to UVA Today these tips when asked for what the everyday U.S. citizen should be doing in preparation for a possible Russian cyberattack as the war in Ukraine progresses.
Wright, the C. Coleman McGehee Professor of Commerce and McIntire’s associate dean for faculty and research, acknowledged the inconvenience that comes with the last bit of his advice – “The annoying updates that everyone puts off,” he said – but knows that any piece of proactivity can be beneficial during these unpredictable times.
As a reaction to the severe sanctions placed on it, Russia is likely to target the U.S. at some point, Wright said.
“While it’s really hard to say when it’ll happen, I think it’s key to start having a sense of vigilance,” he said. “The organizations and the cybersecurity professionals, yeah, they’re always vigilant, but I think what’s different now is to raise the average person’s awareness.
Ryan Wright is an IT security and privacy expert at UVA’s McIntire School of Commerce. UVA law professor Kristen Eichensehr is the director of the National Security Law Center. (Photos courtesy of McIntire, School of Law)
“We’ve talked a lot since 9/11 about, ‘You see something, you say something.’ Well, I think that is what we now need to translate into the cyberworld. So if something is happening on your machine, if something is happening on the machine of someone you know or something just strange is going on, this is one of those times when you need see it and you say it. And that actually helps organizations and helps people respond to those incidents.”
Recent history suggests Russia is more than capable of a cyber ambush. In April 2021, the United States government formally attributed the SolarWinds intrusion – an attack of a Texas-based software supply chain that compromised thousands and allowed infiltration of U.S. government networks – to the Russian Foreign Intelligence Service.

