Defining the resilience of cybersecurity

Issue 6 2022 Information Security, Security Services & Risk Management


Henk Olivier.

For a long time, cybersecurity was something that only kept the security professionals awake at night. They would wave red flags, alert decision-makers and generally annoy people with their rules, regulations and ongoing training. Now, the landscape has changed.

Now, the chief security officer (CISO) and security professionals are sitting at the table and playing a significant role in decision-making and cybersecurity investment. Why? Because cybercrime has become so prevalent and sophisticated that it’s hitting every bottom line and business, and regulations and legislation are fining companies that aren’t paying attention.

The awareness that every company is at risk and that no business is absolutely protected has seen a shift in focus from cybersecurity towards cyber resilience. The former is the training, the technology, the firewalls and the services put in place to protect the organisation and its people from the cyber onslaught. The latter is the ability to not just protect against cybercrime, but to anticipate attacks, adapt to attacks, resolve compromises and respond to uncertainty with agility. It is the organisation’s ability to bend and flex against the cybercrime current and find its feet in the aftermath of an event.

Steps to resilience

“There are a few things that need to be in place to ensure that a company is fully cyber resilient,” says Henk Olivier, managing director at Ozone Information Technology Distribution. “First, you need to undertake a basic risk management analysis that allows you to unpack how your organisation and its employees will react, should an event take place. This ensures that if X happens, then everyone knows that they need to do Y to ensure that the business is capable of undertaking normal operations while the incident is resolved.”

Having a clear ‘if this, then that’ plan in place ensures that high-risk and high-priority operations are shut down or protected instantly, and that any attack focused on these systems is resolved as a matter of urgency. This process also ensures that the business knows exactly which systems are the ones that will effectively bring the company to a stop if they are attacked. Undertaking this analysis should also include unpacking the customer interaction levels to determine any vulnerabilities or risk factors, and the user and employee touchpoints that can put the company at risk.

Do the basics first

“There are also several different aspects of any cyber resilience programme that should always be in place,” says Olivier. “Basic security hygiene is a must. This includes keeping all operating systems and devices up to date with the latest patches, having firewalls in place to control internal and external traffic and provide visibility into network traffic, and putting strong passwords and policies in place.”

Training has to be ongoing. Employees need to constantly be reminded about ransomware, malware, phishing and viruses, and know how to detect them. These attack vectors have become so sophisticated that it’s increasingly hard for even the most alert user to identify the fakes and not make a stupid mistake. Add to this some other essential steps, like avoiding the use of company email addresses on public networks and ensuring that there is clear reporting and insight into the firewall and devices.

“Cyber resilience is also defined by the plans you have in place should the attack succeed, and it will succeed, at least once,” says Olivier. “Have a data recovery plan and process in place and always have backups – plural. You need more than one backup and you need to keep one set offline so that any ransomware doesn’t have time to populate a backup.”

Cyber resilience is no one single solution or platform, rather it is a network of cybersecurity technologies, methodologies, policies, frameworks and behaviours that work collaboratively and cohesively to create a security posture that’s agile, flexible and, most importantly, prepared.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.