An ever-increasing number of cyber-attacks being carried out year on year, and nearly half (43%) of all cyber-attacks are now targeting organisations with 250 employees or fewer means the likelihood of being the victim of a cyber-attack is higher than ever. And while it is important to take steps to prevent cyber-attacks, it is abundantly clear that it can still happen to you regardless.
Businesses that experience cyber-attacks face financial, legal and reputational damage. Having systems in place to fend off cyber-attacks is vital, but these security mechanisms are sometimes rendered ineffective by technical faults and human error. Planning for these business events may be crucial to ensuring the business survives a cyber-attack. This is why implementing a cyber disaster recovery plan has never been more important.
The nature of the threats within security recovery plans are more dynamic than within disaster recovery. Fires, storms, and other physical events are unpredictable, yet their nature is generally well understood. However, cyber attacks are unpredictable and given the rapidly advancing nature of cyber criminality, not generally well understood. This means that cyber recovery strategies must be revised more regularly than their disaster recovery counterparts.
|Cyber Security Disaster Recovery Framework|
|Identify||Asset Management||Business Environment|
|Protect||Access Control||Awareness & Training|
|Data Security||Information Procedures|
|Detect||Anomalies & Events||Continuous Monitoring|
CYBER SECURITY INCIDENT RECOVERY PROGRAMME
|IT & Security|
|Sales / Fundraising|
|Cyber Security Disaster Audit|
|Cyber Security Management|
Our approach begins with a cyber risk assessment to identify the areas where you are most exposed to a cyber-attack. This helps determine the types of incidents that can potentially occur and provides a baseline for establishing cyber disaster scenarios on which to base your cyber disaster recovery plan, We work collaboratively with your organisation to develop practical recovery plans that meet your specific recovery criteria, focussed on breach containment and recovery to normal operations.
|Provide busines continuity after disruption from man-made or natural causes||Protect data assets after a data breach|
|Open communications with stakeholders and focus on rapid data recovery.||A measured approach that includes evidence collection and preservation and root cause anlysis.|
|Rapid and accurate data recovery||Protection controls focusing on preventing future loss|
|Focus on best practices and lessons learnt from disaster recovery experiences||Identifiying new cyber security|
threats and continually modify plans