The components of and need for cyber resilience

Issue 3 2022 Information Security, Security Services & Risk Management


Hayden Sadler.

Cybersecurity is a constantly evolving field, with new technologies opening new avenues for cyberattacks. Furthermore, while significant security breaches are frequently publicised, organisations need to learn how to improve their security posture and become more cyber resilient.

This rapid development and adoption of new technologies make it difficult for organisations to stay on top of and keep their cybersecurity programmes agile enough to react. This is due to known skills shortages that are difficult to quantify, specifically in the cybersecurity space. This makes it hard for organisations to find the right person, or even for a comprehensive cybersecurity task team to address a business-specific cybersecurity strategy in need of implementation.

However, what is important is that businesses must invest in world-class security development and training for employees tasked with overseeing security implementations. Dedicated budgets will aid in skills development on an ongoing basis. Although a versatile Head of Skills is a great resource, it is difficult for such an individual to provide attention to key areas or become a dedicated expert in a required skill.

Effective cyber resilience

Organisations need to implement a comprehensive cyber resilience solution with novel capabilities and better performance for modern data protection, backup, disaster recovery and business continuity to protect against ever-more complex and rising cyberthreats.

There is also the option of outsourcing; many third-party vendors and services companies can provide a much more focused and skilled approach to a business need, especially for implementing, maintaining, and incident response pertaining to cyber resilience. Cloud vulnerabilities are also a significant threat yet can be addressed through best practices being followed during implementation, alongside an understanding of whether the service provider or end-user business is responsible for mitigating them. Denial of Service (DoS) attacks designed to halt a business in their tracks are common, especially in politically motivated and grudge-driven attacks.

Cyber resilience must be a high priority

Outdated approaches such as basic search and monitoring are no longer sufficient, and rolling out standard anti-malware solutions is a common pitfall. The actual implementation of a security strategy needs to be followed up by a rigorous investigation and analysis of what was implemented. Locking down the expansion of these components will give organisations a sturdy grip on what has been rolled out in the infrastructure, thus mitigating unknown vulnerabilities.

Another pitfall is the assumption that a backup is a panacea to a cyberattack. However, the focus should be on how quickly the data can be safely restored. Large-scale recovery can be a lengthy process and thus have a negative impact on business. What can make a significant difference is having a consolidated backup with immutable snapshots, meaning the backup cannot be altered or deleted. Furthermore, recovery to the previous points-in-time can assist greatly, whereby the latest or best version of the backup can be recovered quickly with minimal downtime.

Organisations need to consider the need for a highly secure and effective authorisation and authentication process to safeguard external access. They need to also determine what is an acceptable use for business-supplied devices and appropriately lock down those devices . A resilient data protection strategy will need to be adopted too. This involves the backing up of data, implementing encryption, and regulating device use.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Balancing security and ease-of-use
Technews Publishing SMART Security Solutions Access Control & Identity Management Security Services & Risk Management
Fraud incidents have financial repercussions and erode consumer trust, leading businesses to become more aware, though this awareness does not necessarily translate into confidence in their identity authentication processes.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
From QR code to compromise
Information Security News & Events
A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.

Read more...
Boost revenue streams for MNOS
News & Events Security Services & Risk Management Financial (Industry)
ReveNet has introduced its new solution, designed to safeguard and potentially boost revenue streams in an increasingly challenging landscape for MNOS. The new platform combines advanced analytics and is built on trust, transparency, and sustainability principles.

Read more...
Organisations fear AI-driven cyberattacks, but lack key defences
Kaspersky Information Security News & Events Training & Education
A recent Kaspersky study reveals that businesses are increasingly worried about the growing use of artificial intelligence in cyberattacks, with 56% of surveyed companies in South Africa reporting a rise in cyber incidents over the past year.

Read more...
Vodacom Business unveils new cybersecurity report
Information Security IoT & Automation
Cybersecurity as an Imperative for Growth offers insights into the state of cybersecurity in South Africa, the importance of security frameworks in digital resilience and the latest attack methods adopted by cyberattackers.

Read more...