Virtualization Technology News and Information
Article
RSS
The Multilayered Approach to Cyber Resilience

By Jamie Zajac, Senior Director of Product Management, Carbonite

If there is one thing we know about data protection and security, it's that organizations can never be too prepared to face the increasing cyber threats. Within the idea of "Owning Your Privacy," this year's Data Privacy Day event highlighted the need to learn more about how to help protect valuable data online. Businesses of all sizes will be looking to make data protection a priority.

As we examine privacy, regulations and data protection, another question arises: Are we doing just enough to achieve the minimal level of data protection, or are we really addressing the increasing number of security challenges our data faces every day? In a time when organizations, especially SMBs, continue to be a growing target for threats - Ponemon Institute's report states 63% of SMBs having experienced a data breach in 2019 - a new approach to data is paramount.

This is where a cyber resilience strategy comes into play. It fulfils the need to move beyond relying on a reactive approach to disaster recovery. Instead it helps organizations focus on a proactive strategy that enhances the overall security plan of a company.

Cyber Resilience: Building the right defense

A cyber resilience strategy combines cybersecurity and data protection technologies in which multiple layers of controls are placed throughout a system. It provides what is known as in-depth defense, or multilayered approach.

The first layer of defense is Internet security. A solid foundation starts with the basics. The first step for businesses is to review their current antivirus platform creating a defense against cyberattacks. It will help close the door to common risks and prevent potential threats. Next, add advanced endpoint security to all devices and cloud applications where employees are accessing sensitive data. Advanced security features like global location tracking, remote locking and remote wipe enables businesses to protect sensitive data, should those company endpoints end up in the wrong hands.

After setting up the foundation, organizations need a powerful threat intelligence tool to defend against adaptive malware. To complement and round up a full data protection strategy, businesses also need a strong data backup and disaster recovery plan that eliminates or reduces downtime-and meets business continuity goals in the event of failed hardware, a natural disaster-or a successful data breach that manages to move past the first layer.

Finally, the last building block of a resilient IT structure is comprehensive protection, both onsite and in the cloud. No matter the circumstances, we have to be mindful of how quickly a secondary environment can be spun up so employees can continue to operate normally. These specific plans will vary depending on how much downtime an organization can tolerate and what data is the most important to maintain business operations.

Keep in mind that focusing only on technology isn't enough. Often, your plan is only as strong as its weakest link-end users. As such, an essential component to building your data protection strategy is to ensure all users understand their role in data protection.

This means security awareness training should be top of mind, and many businesses often test everyone in an organization on a regular basis to help ensure suspicious links and other phishing attempts can be identified.

An essential component to building your data protection strategy is to ensure all users understand their role in data protection.

Putting a plan into action

Organizations understand the need for security and business continuity, but the question that remains is how fully have those procedures been addressed? Preparing for advanced threats and the ability to recover quickly in the event of an attack means keeping your operations up and running, ultimately to stay in business. Because of this essential need, cyber resilience is more than another buzzword - it must be the guiding principle for all operations.

While cyber threats continue to grow, a well-rounded approach to security and data protection is what every organization, no matter its size, requires. A cyber resilience approach gives those businesses the ability to face cybercrime, natural disasters and other threats head on, and protect businesses and their users from critical data loss.

##

About the Author

Jamie Zajac 

Jamie Zajac has over 10 years of experience designing, implementing, and maintaining high availability solutions for small and large enterprises. In her role at Carbonite, she leads a team making endpoint security and data protection simple for MSPs, SMBs and enterprise customers. Jamie holds a B.S. in Meteorology and Computer Science from Embry-Riddle Aeronautical University and an MBA from University of Massachusetts at Lowell.

Published Thursday, February 13, 2020 7:36 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
top25
Calendar
<February 2020>
SuMoTuWeThFrSa
2627282930311
2345678
9101112131415
16171819202122
23242526272829
1234567