Defining the resilience of cybersecurity

Issue 6 2022 Cyber Security, Security Services & Risk Management


Henk Olivier.

For a long time, cybersecurity was something that only kept the security professionals awake at night. They would wave red flags, alert decision-makers and generally annoy people with their rules, regulations and ongoing training. Now, the landscape has changed.

Now, the chief security officer (CISO) and security professionals are sitting at the table and playing a significant role in decision-making and cybersecurity investment. Why? Because cybercrime has become so prevalent and sophisticated that it’s hitting every bottom line and business, and regulations and legislation are fining companies that aren’t paying attention.

The awareness that every company is at risk and that no business is absolutely protected has seen a shift in focus from cybersecurity towards cyber resilience. The former is the training, the technology, the firewalls and the services put in place to protect the organisation and its people from the cyber onslaught. The latter is the ability to not just protect against cybercrime, but to anticipate attacks, adapt to attacks, resolve compromises and respond to uncertainty with agility. It is the organisation’s ability to bend and flex against the cybercrime current and find its feet in the aftermath of an event.

Steps to resilience

“There are a few things that need to be in place to ensure that a company is fully cyber resilient,” says Henk Olivier, managing director at Ozone Information Technology Distribution. “First, you need to undertake a basic risk management analysis that allows you to unpack how your organisation and its employees will react, should an event take place. This ensures that if X happens, then everyone knows that they need to do Y to ensure that the business is capable of undertaking normal operations while the incident is resolved.”

Having a clear ‘if this, then that’ plan in place ensures that high-risk and high-priority operations are shut down or protected instantly, and that any attack focused on these systems is resolved as a matter of urgency. This process also ensures that the business knows exactly which systems are the ones that will effectively bring the company to a stop if they are attacked. Undertaking this analysis should also include unpacking the customer interaction levels to determine any vulnerabilities or risk factors, and the user and employee touchpoints that can put the company at risk.

Do the basics first

“There are also several different aspects of any cyber resilience programme that should always be in place,” says Olivier. “Basic security hygiene is a must. This includes keeping all operating systems and devices up to date with the latest patches, having firewalls in place to control internal and external traffic and provide visibility into network traffic, and putting strong passwords and policies in place.”

Training has to be ongoing. Employees need to constantly be reminded about ransomware, malware, phishing and viruses, and know how to detect them. These attack vectors have become so sophisticated that it’s increasingly hard for even the most alert user to identify the fakes and not make a stupid mistake. Add to this some other essential steps, like avoiding the use of company email addresses on public networks and ensuring that there is clear reporting and insight into the firewall and devices.

“Cyber resilience is also defined by the plans you have in place should the attack succeed, and it will succeed, at least once,” says Olivier. “Have a data recovery plan and process in place and always have backups – plural. You need more than one backup and you need to keep one set offline so that any ransomware doesn’t have time to populate a backup.”

Cyber resilience is no one single solution or platform, rather it is a network of cybersecurity technologies, methodologies, policies, frameworks and behaviours that work collaboratively and cohesively to create a security posture that’s agile, flexible and, most importantly, prepared.

For more information contact Ozone IT Distribution, +27 10 591 5588, [email protected], www.ozone.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Industrial control systems under attack
News Cyber Security
According to Kaspersky ICS CERT statistics, from January to September 2022, 38% of computers in the industrial control systems (ICS) environment in the META region were attacked using multiple means.

Read more...
Top fraud trends to watch in 2023
News Security Services & Risk Management
Even though financial concerns remain a significant obstacle for companies in implementing new anti-fraud technologies, 60% of businesses expect an increase in their anti-fraud technology budgets in the next two years.

Read more...
Be cautious when receiving deliveries at home
News Perimeter Security, Alarms & Intruder Detection Security Services & Risk Management
Community reports of residents being held up at their gate when collecting fast food deliveries at home are once again surfacing.

Read more...
OSINT: A new dimension in cybersecurity
Cyber Security
The ancient Chinese strategist Sun Tzu noted, you should always try to know what the enemy knows and know more than the enemy.

Read more...
Sasol ensures Zero Trust for SAP financials with bioLock
Technews Publishing Editor's Choice Cyber Security Security Services & Risk Management
Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.

Read more...
Building a holistic application security process
Altron Arrow Cyber Security
Altron Arrow asks what it means to build a holistic AppSec process. Learn what’s involved in a holistic approach and how to get started.

Read more...
Managing data privacy concerns when moving to the cloud
Cyber Security
While the cloud offers many business benefits, it can also raise concerns around compliance, and some organisations have taken the approach of staying out of the cloud for this reason.

Read more...
Accelerating your Zero Trust journey in manufacturing
IT infrastructure Cyber Security Industrial (Industry)
Francois van Hirtum, CTO of Obscure Technologies, advises manufacturers on a strategic approach to safeguarding their businesses against cyber breaches.

Read more...
The democratisation of threats
Cyber Security
Bugcrowd looks at some of the primary vulnerabilities the world faced in 2021, and the risks moving forward with growing attack surfaces and lucrative returns on crime.

Read more...
Protecting yourself from DDoS attacks
Cyber Security Security Services & Risk Management
A DDoS attack, when an attacker floods a server or network with Internet traffic to prevent users from accessing connected online services, can be costly in both earnings and reputation.

Read more...