The components of and need for cyber resilience

Issue 3 2022 Cyber Security, Security Services & Risk Management

Hayden Sadler.

Cybersecurity is a constantly evolving field, with new technologies opening new avenues for cyberattacks. Furthermore, while significant security breaches are frequently publicised, organisations need to learn how to improve their security posture and become more cyber resilient.

This rapid development and adoption of new technologies make it difficult for organisations to stay on top of and keep their cybersecurity programmes agile enough to react. This is due to known skills shortages that are difficult to quantify, specifically in the cybersecurity space. This makes it hard for organisations to find the right person, or even for a comprehensive cybersecurity task team to address a business-specific cybersecurity strategy in need of implementation.

However, what is important is that businesses must invest in world-class security development and training for employees tasked with overseeing security implementations. Dedicated budgets will aid in skills development on an ongoing basis. Although a versatile Head of Skills is a great resource, it is difficult for such an individual to provide attention to key areas or become a dedicated expert in a required skill.

Effective cyber resilience

Organisations need to implement a comprehensive cyber resilience solution with novel capabilities and better performance for modern data protection, backup, disaster recovery and business continuity to protect against ever-more complex and rising cyberthreats.

There is also the option of outsourcing; many third-party vendors and services companies can provide a much more focused and skilled approach to a business need, especially for implementing, maintaining, and incident response pertaining to cyber resilience. Cloud vulnerabilities are also a significant threat yet can be addressed through best practices being followed during implementation, alongside an understanding of whether the service provider or end-user business is responsible for mitigating them. Denial of Service (DoS) attacks designed to halt a business in their tracks are common, especially in politically motivated and grudge-driven attacks.

Cyber resilience must be a high priority

Outdated approaches such as basic search and monitoring are no longer sufficient, and rolling out standard anti-malware solutions is a common pitfall. The actual implementation of a security strategy needs to be followed up by a rigorous investigation and analysis of what was implemented. Locking down the expansion of these components will give organisations a sturdy grip on what has been rolled out in the infrastructure, thus mitigating unknown vulnerabilities.

Another pitfall is the assumption that a backup is a panacea to a cyberattack. However, the focus should be on how quickly the data can be safely restored. Large-scale recovery can be a lengthy process and thus have a negative impact on business. What can make a significant difference is having a consolidated backup with immutable snapshots, meaning the backup cannot be altered or deleted. Furthermore, recovery to the previous points-in-time can assist greatly, whereby the latest or best version of the backup can be recovered quickly with minimal downtime.

Organisations need to consider the need for a highly secure and effective authorisation and authentication process to safeguard external access. They need to also determine what is an acceptable use for business-supplied devices and appropriately lock down those devices . A resilient data protection strategy will need to be adopted too. This involves the backing up of data, implementing encryption, and regulating device use.

For more information contact Infinidat,,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Sustainability School opens for enrolment
Education (Industry) News Security Services & Risk Management
Three-part programme, first developed for Schneider Electric employees, is now available for free for companies worldwide. Attendees learn how to future-proof their businesses and accelerate their decarbonisation journeys.

Cyber attackers used over 500 tools and tactics in 2022
Cyber Security News
The most common root causes of attacks were unpatched vulnerabilities and compromised credentials, while ransomware continues to be the most common ‘end game’ and attacker dwell time is shrinking – for better or worse.

Success in business process best practices
Technews Publishing Kleyn Change Management Editor's Choice Integrated Solutions Security Services & Risk Management
This month we commandeer time with the woman who is spearheading our national conversation on Women in Security, Lesley-Anne Kleyn, to get to know the lady herself a little better.

Addressing the SCADA in the room
Industrial (Industry) Cyber Security
Few other sectors command the breadth of purpose-built and custom devices necessary to function, as the industrial and manufacturing industries. These unique devices create an uncommon risk that must be assessed and understood to fully protect against incoming attacks.

Security awareness training
Training & Education Security Services & Risk Management
It is critically important to have a security awareness solution that uses the limited time available to train effectively, and one that provides targeted education that is relevant to users.

Recession or stress?
Cyber Security News
The economic landscape has seen many technology companies lay off vast numbers of employees, but for cybersecurity, the picture looks very different – a dynamic mixture of excitement, challenges and toxicity.

Technology to thwart solar panel thieves
Asset Management, EAS, RFID Security Services & Risk Management Products
A highly efficient industrial network is coming to the rescue of the solar industry, as solar panels, inverters and batteries are being targeted by thieves and threaten to destabilise the industry.

Banking the unbanked comes with security risks
Financial (Industry) Security Services & Risk Management
As grim as it was, the pandemic of recent years and its resultant global economic crisis were a prime catalyst for record number of first-time bank users, the previously unbanked.

Vulnerabilities in industrial cellular routers’ cloud management platforms
Industrial (Industry) Cyber Security Security Services & Risk Management
Research from OTORIO, a provider of operational technology cyber and digital risk management solutions, unveils cyber risks in M2M protocols and asset registration that expose hundreds of thousands of devices and OT networks to attack

SAFPS to launch a platform to combat fraud
Editor's Choice News Security Services & Risk Management
In response to the growing need for a proactive approach to fraud prevention, the SAFPS is developing a product called Yima, which will be a one-stop-shop for South Africans to report scams, secure their identity, and scan any website for vulnerabilities.