classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Understand the difference
November 2018, IT infrastructure

It is essential to understand the difference between business continuity and disaster recovery because of how closely aligned business continuity is to disaster recovery. Disaster recovery can be seen as a subset of business continuity in terms of disaster only; both however work in parallel to continue business operations.

Dragan Petkovic.
Dragan Petkovic.

The local threat landscape

South Africa is a connected economy and the country can be affected by what transpires in other countries. Rather than asking the question about how good or bad the local threat landscape is, the question should be; what is the state of the security controls South Africa employs and how do they measure against the countries it deals with?

If South African organisations are doing business with countries that employ more sophisticated security controls, cybercriminals are more likely to target the ‘low hanging fruit’. Locally, the threat landscape can be measured by comparing the security controls put in place by the countries South Africa deals with.

South Africa is also the only African country in the G20 international forum, aimed at discussing policies to promote international financial stability. Cybercrime is often based on effort versus reward and criminals will always try to exploit a healthy economy. This increases the threat for South Africa versus other countries in Africa.

What should businesses be doing to safeguard themselves against threats they do not know yet?

There is no such thing as hundred percent security; the most prudent measure to undertake would be to employ user and entity behaviour analytics that pick up anomalies. It is no secret that cybercriminals are constantly working to refine their attacks, making them sophisticated enough to bypass security barriers. Businesses need to do the same to keep up.

Automation can help businesses win this battle with systems such as the recently introduced Oracle’s Autonomous Database. The Autonomous Database automatically encrypts all data, provides security updates and changes with no downtime to provide protection from both external attacks and potentially malicious users.

What are some of the fundamentals that must be included in a solid business continuity plan?

A business continuity plan comes into play when there is a problem; it is by no means a proactive measure. Fundamental to a good business continuity plan is a business having access to backup plans when facing cases such as ransomware to restore and support the business’s essential operations.

Having a team with members from a range of departments helps understand the severity for each line of business. For example, a stakeholder from the finance team would understand the severity of cyber extortion and how detrimental it could be for business operation whereas an HR stakeholder could be more concerned about the privacy of the information accessed, making it crucial to have a representative from each department.

What would you say are some of the top challenges businesses face when it comes to business continuity and disaster recovery planning?

Preparing for a disruptive event is one thing, managing the process is another challenge. The plan kicks in when things go bad; preparation determines how well a business goes through it. All too many businesses have plans put in place but those fall apart when facing ransomware and extreme cyber extortion.

We saw this with Uber’s attempt at concealing a breach and the company allegedly paying hackers a $100 000 ransom to delete the data and not publicise the breach to media and regulators. Whether an event includes an outage or a breach, it is crucial to be prepared and manage the process, in a state of panic most business succumb to this particular challenge.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • The building blocks of safe and smart cities
    November 2018, Technews Publishing, This Week's Editor's Pick, Integrated Solutions, IT infrastructure, Government and Parastatal (Industry)
    Hi-Tech Security Solutions asks NEC XON and Vox for insights into what some of the foundations of a safe and smart city are.
  • Managing business continuity and disaster recovery
    November 2018, Technews Publishing, IT infrastructure, Security Services & Risk Management
    Organisations are increasingly reliant on their IT systems and data, but they are faced with risks in the form of anything from accidental data loss, to deliberate acts of sabotage.
  • Advanced Metering Infrastructure survey
    November 2018, Pinnacle Instruments SA, News, IT infrastructure
    Pinnacle has revealed the results of research conducted on behalf of Huawei Technologies into the global Advanced Metering Infrastructure (AMI) market.
  • AI: It’s in your home
    November 2018, IT infrastructure
    Gartner has predicted that by 2022 AI devices may have achieved such a level of emotional intelligence that they will know more about a person’s family than they do.
  • Datacentre management as a service
    November 2018, Pelco by Schneider Electric, IT infrastructure
    For an increasing number of organisations, data management is vital but it is not their core business. In that case, data centre management as a service (DMaaS) is the ideal solution.
  • Disaster Recovery 2.0
    November 2018, This Week's Editor's Pick, IT infrastructure
    Protecting your business from the unexpected can mitigate the financial and reputational risks of uncontrolled downtime.
  • Better city, better life
    November 2018, Ruckus Networks, Integrated Solutions, IT infrastructure
    Cities already account for approximately 70% to 80% of the world’s economic growth, and this will only increase as cities continue to grow.
  • Blockchain explained
    November 2018, IT infrastructure, Cyber Security
    Blockchain: What is it, how it works and how it is being used in the market? A closer look at the technology that is rapidly growing in popularity.
  • Smart security hub
    November 2018, Sentian, Products, Integrated Solutions, IT infrastructure
    With Sentian, commercial users can upgrade their installed security assets, and installers can upsell smart security to their existing clients, at a significant cost advantage because it builds off existing, installed security solutions.
  • Where’s the footage?
    November 2018, IT infrastructure, CCTV, Surveillance & Remote Monitoring
    Security surveillance systems are only as good as the fit-for-purpose footage they are capable of delivering.
  • Turning cyber threat into cyber opportunity
    November 2018, Transport (Industry), Integrated Solutions, IT infrastructure
    The Internet of Things (IoT) has completely changed the way business works, this is as true of the heavy hauling and freight industry as any other.
  • Will business data survive?
    November 2018, Technews Publishing, This Week's Editor's Pick, IT infrastructure, Security Services & Risk Management
    Access to your data, even in a worst-case scenario, is the key to successful recovery from a disaster says Iniel Dreyer, MD at Gabsten Technologies.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.