Cyber resiliency is the key to business continuity

By: Rohit Thakur

Cyber-attacks are a continual threat to business continuity. It’s not only about the sheer volume of intrusions but also the increasing level of sophistication cybercriminals display. Breaches are penetrating deeper into the stack, from hardware and software layers to business applications, network and even chip-level infrastructure. The consequences of these cyber attack are becoming more serious.

Average total cost of data breach, according Ponemon’s 2017 Cost of Data Breach study, is $3.62 million. Often, these costs include not just financial loss but reputation damage and regulatory action. Early detection and recovery from a data breach can substantially reduce its impact. That’s why when it comes to recovering from a breach — any outage, for that matter — every second counts.

Harness the full power of your core business applications

The cyber resiliency mindset

While there is a need to prevent all means of unauthorized entry, this approach is no longer enough. Despite best protection, there’s a more than 1 in 4 chance than a given company will incur a data breach, according to the Ponemon report.

Many organizations are starting to rethink their cyber strategy and are adopting an integrated, holistic approach that includes not only prevention but also rapid recovery once a breach occurs. While these cyber incidents may be impossible to prevent entirely, how an enterprise reacts to them can mean the difference between a nuisance and an outright catastrophe.

Cyber resiliency is the new mindset, combining both information security and business continuity. By taking a life cycle approach to cyber resiliency, organizations can prepare, protect, detect, respond and rapidly recover from cyber-attacks. The overall goal is to minimize downtime and loss and to take a more business-focused, customer-oriented mindset. This type of model helps build a high level of trust between the enterprise and its customers, leading to stronger brand loyalty and increasing faith in the organization as a safe and reliable steward of critical data.

Rapid recovery

In a typical cyber-attack, continuous network exposure results in corruption spreading to disaster recovery sites, rendering them unusable. Recovery from traditional tape and disk backups is time-consuming, especially when we look at the large enterprise landscape. This problem is compounded by some of the newest ransomware viruses, which target disaster recovery and backup copies directly. Some of the new attacks blow up into full-scale disruption within hours, allowing little time to respond and recover.

To respond to these challenges and manage rapid recovery from a cyber disruption, organizations should orchestrate platform configuration and data recovery. There should be a mechanism of real time testing and validation of configuration changes to protect data, device, virtual machine and bare-metal systems configuration. Companies should rely on user-validated data to make a golden copy for restoring data in case of a data breach. For data recovery, copy data management and cloud object storage enable efficient, fast recovery.

At the same time, a “write once, read more” (WORM) architecture helps maintain the integrity of the immutable storage environment. An air gap mechanism should provide protection from network exposure. The entire recovery process should be well-orchestrated, with real-time reporting and response capabilities that enable the enterprise to achieve rapid recovery needs against outages and keep pace with an always-on world.

Organizations should regularly test the effectiveness of their cyber recovery capabilities. Extensive visibility and reporting of cyberincident recovery testing processes will help ensure compliance and readiness. These are essential for enabling a cyber resilient enterprise.

For further information on the role of cyber resiliency in modern IT environments, attend our webinar as part of Business Continuity Week.

In depth: business continuity topics

Understand how to plan for and react when business disruptions are happening.

Adapt and respond to risks with a business continuity plan (BCP)

How to defend against cyber attacks

Do you have your disaster recovery plan (DRP)?

Defend against ransomware attacks?

What is data breach and how to defend against one?

What is a recovery time objective (RTO) and how does it affect disaster recovery for your enterprise?

What is an RPO (recovery point objectives)?

Topics: , , , ,

About The Author

Rohit Thakur

Head of Marketing, IBM Resiliency Orchestration and Global Portfolio Marketing Manager

Rohit has over fifteen years of experience building and scaling up marketing teams for software organizations. He has been recognized as one of the Most Influential Marketing Technology Leaders in India, by World Marketing Congress in 2015. In his previous role as the Director Marketing for Sanovi Technologies, he was a part of the leadership... Read more