Becoming more cyber resilient

Issue 4 2022 Infrastructure

Cybersecurity is a constantly evolving field, with new technologies opening new avenues for cyberattacks. Furthermore, while significant security breaches are frequently publicised, organisations need to learn how to improve their security posture and become more cyber resilient.


Hayden Sadler.

This rapid development and adoption of new technologies makes it difficult for organisations to stay on top of and keep their cybersecurity programmes agile enough to react. This is due to known skills shortages that are difficult to quantify, specifically in the cybersecurity space. This makes it difficult for organisations to find the right person, or even a comprehensive cybersecurity task team, to address a business-specific cybersecurity strategy in need of implementation.

However, what is important is that businesses must invest in world-class security development and training for employees tasked with overseeing security implementations. Dedicated budgets will aid in skills development on an ongoing basis. Although a versatile Head of Skills is a great resource, it is difficult for such an individual to provide attention to key areas or become a dedicated expert in a required skill.

Organisations need to implement a comprehensive cyber resilience solution with novel capabilities and better performance for modern data protection, backup, disaster recovery and business continuity, to protect against ever-more complex and rising cyberthreats.

There is also the option of outsourcing; many third-party vendors and services companies can provide a much more focused and skilled approach to a business need, especially for implementing, maintaining and incident response pertaining to cyber resilience. Cloud vulnerabilities are also a significant threat, yet they can be addressed by following best practices during implementation, alongside an understanding of whether the service provider or end-user business is responsible for mitigating them. Denial of Service (DOS) attacks designed to halt a business in their tracks are common, especially in politically motivated and grudge-driven attacks.

Cyber resilience must be a high priority

Outdated approaches such as basic search and monitoring are no longer sufficient, and rolling out standard anti-malware solutions is a common pitfall. The actual implementation of a security strategy needs to be followed up by a rigorous investigation and analysis of what was implemented. Locking down the expansion of these components will give organisations a sturdy grip on what has been rolled out in the infrastructure, thus mitigating unknown vulnerabilities.

Another pitfall is the assumption that a backup is a panacea to a cyberattack. However, the focus should be on how quickly the data can be safely restored. Large-scale recovery can be a lengthy process and thus have a negative impact on business. What can make a significant difference is having a consolidated backup with immutable snapshots, meaning the backup cannot be altered or deleted. Furthermore, recovery to the previous points-in-time can assist greatly, whereby the latest or best version of the backup can be recovered quickly with minimal downtime.

Organisations need to consider the need for a highly secure and effective authorisation and authentication process to safeguard external access. They also need to determine what is acceptable use for business-supplied devices, and lock those devices down appropriately. A resilient data protection strategy will need to be adopted too. This involves the backing up of data, implementing encryption and regulating device use.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

VPS hosting set to dominate in 2025
Infrastructure
SME market growth and the increasing need for a digital footprint are pushing VPS growth in South Africa, especially since it is now perceived as a viable business tool, scalable by nature, with improved performance.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Highest capacity ePMR HDDs
Infrastructure Products & Solutions
Western Digital has announced that it is now shipping the world’s highest capacity UltraSMR HDD with up to 32TB leveraging the time-tested, reliable energy-assisted PMR (ePMR) recording technology for hyperscalers, CSPs and enterprises.

Read more...
Axis introduces ACS Edge and cloud storage
Axis Communications SA Surveillance Infrastructure Products & Solutions
Axis Communications has launched two new solutions within the AXIS Camera Station ecosystem, AXIS Camera Station Edge (ACS Edge) and AXIS Camera Station Cloud Storage (ACS Cloud Storage).

Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.

Read more...
Navigating a connected, AI-driven future at SATNAC 2024
Infrastructure AI & Data Analytics IoT & Automation
The 2024 Southern Africa Telecommunication Networks and Applications Conference concluded its 26th edition with a call to harness AI to drive positive change across the continent. Moreover, students from Wits, North West and Pretoria universities won the best research paper awards.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Data resilience in the age of AI
Infrastructure AI & Data Analytics
The discourse around AI has reached a fever pitch, but this ‘age of AI’ we have entered is just a chapter in a story that has been going on for years – digital transformation.

Read more...
Is cybersecurity broken?
Information Security Infrastructure
Companies are spending large amounts on cybersecurity, yet cyber threats continue to persist and thrive. Security executives are under tremendous pressure, and companies are questioning the wisdom of their security budgets.

Read more...
Data resilience for companies of all sizes
Technews Publishing Infrastructure Products & Solutions
Nakivo offers backup, recovery and replication solutions for all companies, but is focused on small- to medium-sized businesses where customers need affordable solutions that are simple to use and reliable.

Read more...