Cyber resilience, or how to protect yourself against modern computer attacks
As data continues to circulate, cyber attacks have continued to increase in number and sophistication in recent years, giving rise to a new concept: cyber resilience.
Phishing attempts, malware, ransomware, data theft... as they multiply, businesses are coming up against the fact that they cannot guarantee 100% security for their information systems. The reason for this is that the cybersecurity (or cyber protection) infrastructures deployed until now are no longer sufficient. They now need to consider a more global and systemic approach, in order to respond effectively to the new forms of threat that are flourishing on the web.
They need to become cyber resilient.
What exactly is the definition of cyber resilience, and how does it differ from cyber security? What types of action does it involve?
We tell you all about it.
Cyber resilience: definition
What is cyber resilience?
Cyber resilience is defined as a more holistic approach to cyber security. It is based on two main principles:
- dealing with threats by adopting a preventive rather than just a curative approach;
- knowing how to quickly restore productivity in the event of a successful cyber-attack.
In short, companies need to be prepared for any eventuality, accepting that they are constantly exposed to cyber-attackers, who can strike at any time.
But there is no question of being fatalistic! A resilient cyber enterprise must deploy resources, both human and technological, to ensure that it can bounce back in the event of a problem. And all this as part of a continuous improvement process: the cyber-resilient organisation adapts and learns from its mistakes!
Cyber-Resilience and its many dimensions, from initial protection to recovery management, must merge with the company's DNA and be accepted and understood by all employees [...]. In fact, it must become part of the corporate culture.
In what context did it emerge?
As we have seen, cyber risks are on the increase.
91% of French organisations have suffered at least one major cyber attack in the last 12 months, and a majority (65%) have reported multiple incidents.
These figures are not surprising given the development of the digital transformation of businesses and cloud computing. And while risk has become almost systemic in recent years, there is every reason to believe that tomorrow's cyberspace will be no more secure:
- the widespread use of teleworking, which gives rise to a number of protection loopholes (connection to a home network, browsing dangerous websites , BYOD and shadow IT practices, etc.) ;
- the ever-increasing circulation of digital data, the new 'black gold' of the 21st century, which raises a number of economic, legal and political issues.
But the consequences of a cyber attack can be disastrous for organisations. According to MailinBlack, the average cost of a cyber attack is €97,000. Added to this are the legal problems associated with data protection and the negative impact on the company's brand image.
A resilient e-business is one that is financially healthier and more valuable to its customers, partners and investors.
Can cyber protection and cyber resilience be compared?
Cyber protection, or cyber security, is based on a binary principle: either the environment is secure or it is not. As a result, the related processes mainly involve deploying technologies to reduce and resolve risks.
Unlike cyber resilience, therefore, they do not imply the same preparation for risk (especially at human level), or the same ability to bounce back and adapt constantly.
How can I become cyber resilient? Our 6 tips
There is no ready-made formula for becoming totally cyber resilient, as it is a concept that is still developing and needs to be put to the test. What's more, the best practices to adopt depend on the structure of each company and its degree of maturity in terms of digitisation and security management.
However, various avenues are regularly mentioned.
Tip 1: Be aware of the vulnerability of cyberspace
To become cyber-resilient, businesses need to accept that they are constantly exposed to the growing dangers of cyberspace. It can no longer be satisfied with simply using protective technologies.
What's more, by becoming aware of this state of affairs, management is more inclined to allocate the resources, both human and financial, needed to deploy a truly effective IT security infrastructure.
💡 Communication, exchanges with peers and the search for information are all part of the resilient cyber approach. In this way, the company strengthens its understanding of the subject, and therefore the confidence it generates, particularly with investors.
Tip 2: Raise employee awareness
Raising awareness inevitably involves awareness-raising campaigns, aimed at senior management as well as employees. The main security flaw is often inappropriate human behaviour. Through simple ignorance, an employee's actions can have damaging consequences for the company's IT protection.
Communication and training are therefore essential to ensure that all employees (and not just IT teams) play an active part in the organisation's security.
💡 Hackers are particularly fond of phishing, which is easy to deploy. To help employees stop "taking the bait", Mailinblack has developed the Phishing Coach tool. This simulates attacks, assesses employees' level of vulnerability and offers training content to help them adopt the right reflexes.
Tip 3: Adopt basic security measures
There are a number of basic measures to be observed, starting with securing access by means of good password management and a solid identity and access management policy.
On the technical side, attacks, failures and other attempts at unauthorised access must be systematically controlled. This means constant monitoring of IT networks and systems, and therefore the implementation of an information security management process. To this end, some IT teams have adopted the ISO 27001 standard, which is based on :
- Ongoing internal checks and audits,
- the implementation of corrective, preventive and improvement actions.
Tip 4: Focus on data preservation
Cyber resilience includes a data-centric approach, because data is such a major issue for businesses. Imagine the consequences if a hacker gained access to your customer files with the aim of selling this information for phishing campaigns!
What's more, with the entry into force of the RGPD, companies have an obligation to protect users' personal data... if they don't want to be fined (sometimes very heavily) by the CNIL.
As a result, IT teams need to make data security a top priority, for example by using appropriate software.
Tip 4: Automate security processes
Since human error remains the primary risk factor, automating security operations is a good way of curbing threats. What's more, it allows you to :
- alleviate the problems associated with companies' lack of resources;
- deploy a scalable, permanent procedure more easily.
Various processes can be automated:
- cyber monitoring, to keep abreast of developments in cyber attack techniques,
- detection of cyber threats
- incident response
- security operations (executing rules, for example), etc.
Out of 3,655 organisations worldwide, 16% said that automation had helped them to prevent a cyber attack, 23% to detect a cyber attack, 15% to respond to a cyber attack and 25% to contain a cyber attack.% to detect a cyber attack, 15% to respond to a cyber attack and 25% to contain a cyber attack.
💡 This automation is made possible by SOAR (Security Orchestration, Automation and Response). Behind this acronym lies an overlay of compatible software layers, the aim of which is to :
- collect all security-related data;
- react in the event of a security breach, without the need for human intervention.
Tip 5: Set up or strengthen your DRP
Finally, we have seen that cyber resilience means bouncing back as quickly as possible in the event of a problem. As a result, if your business suffers an interruption as a result of a cyber attack, you need to have a Disaster Recovery Plan (or DRP) in place. It is thanks to this set of crisis management procedures (triggering backup systems, restoring data, quickly restarting applications, etc.) that it will be able to return to its initial productivity.
💡 DRP often relies on software support to automate processes as much as possible. A solution like UCover by Nuabee, for example, supports businesses, whatever their IT skills, in managing their disaster recovery plan. What's more, it offers three progressive classes of protection, which can be upgraded as organisations and their needs change.
Cyber resilience has therefore changed the IT security paradigm. It is now the best protection for thriving in a cyber space that is widening the field of possibilities... while putting organisations under constant pressure in terms of risk. Just like today's world, it's a playground where everything is constantly changing and accelerating. You have to know how to adapt.
Is your company well prepared for the new threats? Share your experience in comments ;-)