Defining the resilience of cybersecurity

Issue 6 2022 Information Security, Security Services & Risk Management


Henk Olivier.

For a long time, cybersecurity was something that only kept the security professionals awake at night. They would wave red flags, alert decision-makers and generally annoy people with their rules, regulations and ongoing training. Now, the landscape has changed.

Now, the chief security officer (CISO) and security professionals are sitting at the table and playing a significant role in decision-making and cybersecurity investment. Why? Because cybercrime has become so prevalent and sophisticated that it’s hitting every bottom line and business, and regulations and legislation are fining companies that aren’t paying attention.

The awareness that every company is at risk and that no business is absolutely protected has seen a shift in focus from cybersecurity towards cyber resilience. The former is the training, the technology, the firewalls and the services put in place to protect the organisation and its people from the cyber onslaught. The latter is the ability to not just protect against cybercrime, but to anticipate attacks, adapt to attacks, resolve compromises and respond to uncertainty with agility. It is the organisation’s ability to bend and flex against the cybercrime current and find its feet in the aftermath of an event.

Steps to resilience

“There are a few things that need to be in place to ensure that a company is fully cyber resilient,” says Henk Olivier, managing director at Ozone Information Technology Distribution. “First, you need to undertake a basic risk management analysis that allows you to unpack how your organisation and its employees will react, should an event take place. This ensures that if X happens, then everyone knows that they need to do Y to ensure that the business is capable of undertaking normal operations while the incident is resolved.”

Having a clear ‘if this, then that’ plan in place ensures that high-risk and high-priority operations are shut down or protected instantly, and that any attack focused on these systems is resolved as a matter of urgency. This process also ensures that the business knows exactly which systems are the ones that will effectively bring the company to a stop if they are attacked. Undertaking this analysis should also include unpacking the customer interaction levels to determine any vulnerabilities or risk factors, and the user and employee touchpoints that can put the company at risk.

Do the basics first

“There are also several different aspects of any cyber resilience programme that should always be in place,” says Olivier. “Basic security hygiene is a must. This includes keeping all operating systems and devices up to date with the latest patches, having firewalls in place to control internal and external traffic and provide visibility into network traffic, and putting strong passwords and policies in place.”

Training has to be ongoing. Employees need to constantly be reminded about ransomware, malware, phishing and viruses, and know how to detect them. These attack vectors have become so sophisticated that it’s increasingly hard for even the most alert user to identify the fakes and not make a stupid mistake. Add to this some other essential steps, like avoiding the use of company email addresses on public networks and ensuring that there is clear reporting and insight into the firewall and devices.

“Cyber resilience is also defined by the plans you have in place should the attack succeed, and it will succeed, at least once,” says Olivier. “Have a data recovery plan and process in place and always have backups – plural. You need more than one backup and you need to keep one set offline so that any ransomware doesn’t have time to populate a backup.”

Cyber resilience is no one single solution or platform, rather it is a network of cybersecurity technologies, methodologies, policies, frameworks and behaviours that work collaboratively and cohesively to create a security posture that’s agile, flexible and, most importantly, prepared.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.