Cyber resilience, or how to protect yourself against modern computer attacks
In parallel with the growing flow of data, cyber attacks have continued to increase in number and sophistication in recent years, giving rise to a new concept: cyber resilience.
Phishing attempts, malware, ransomware, data theft... as they multiply, companies are coming up against their inability to ensure 100% security of their information systems. And with good reason: the cybersecurity (or cyber protection) infrastructures deployed to date are no longer sufficient. They now need to consider a more global and systemic approach, in order to respond effectively to the new forms of threat that are flourishing on the web.
They need to become cyber-resilient.
What exactly is cyber resilience, and how does it differ from cybersecurity? What types of action does it entail?
We tell you all about it.
Cyber resilience: definition
What is cyber resilience?
Cyber resilience is defined as a more holistic approach to cybersecurity. It is based on two main principles:
- dealing with threats, by adopting a preventive rather than just a curative approach;
- rapidly restoring productivity in the event of a successful cyber-attack.
In short, companies need to be prepared for any eventuality, recognizing that they are constantly exposed to cyber-attackers, who can strike at any time.
But there's no question of being fatalistic! A resilient cyber enterprise must deploy both human and technological resources to ensure that it can bounce back in the event of a problem. And all this as part of a continuous improvement process: the resilient cyber organization adapts and learns from its mistakes!
Cyber-Resilience and its multiple dimensions, from initial protection to recovery management, must merge with the company's DNA and be accepted and understood by all employees [...]. In fact, it must become part of the corporate culture.
In what context did it emerge?
As we have seen, cyber risks are on the increase.
91% of French organizations have suffered at least one major cyber attack in the last 12 months, and a majority (65%) have reported multiple incidents.
These figures are not surprising, given the development of digital transformation and cloud computing. And if risk has become almost systemic in recent years, there is every reason to believe that tomorrow's cyberspace will not be any more secure:
- widespread telecommuting, which generates a number of protection loopholes (connection to a home network, browsing dangerous websites , BYOD and shadow IT practices, etc.) ;
- the ever-increasing circulation of digital data, the new "black gold" of the 21st century, which crystallizes a number of economic, legal and political issues.
Yet the consequences of a cyber attack can be disastrous for organizations. According to MailinBlack, the average cost of a cyber attack is €97,000. Added to this are the legal problems associated with data protection, as well as a negative impact on the company's brand image.
A resilient e-business is one that is financially healthier, and more valuable to its customers, partners and investors.
Can cyber protection and cyber resilience be compared?
Cyber protection, or cyber security, is based on a binary principle: either the environment is safe, or it is not. As a result, the related processes mainly involve deploying technologies to reduce and resolve risks.
Unlike cyber resilience, therefore, they do not imply the same level of risk preparedness (especially at human level), nor the same ability to bounce back and adapt constantly.
How to become cyber resilient? Our 6 tips
There's no ready-made formula for becoming totally cyber resilient, as it's an emerging concept that still needs to be put to the test. What's more, the best practices to adopt depend on the structure of each company and its degree of maturity in terms of digitalization and security management.
However, a number of avenues are regularly mentioned.
Tip 1: Recognize the vulnerability of cyberspace
To become cyber-resilient, companies need to accept that they are constantly exposed to the growing dangers of cyberspace. It can no longer be satisfied with simple protective technologies.
What's more, by becoming aware of this state of affairs, management is more inclined to allocate the resources, both human and financial, needed to deploy a truly effective IT security infrastructure.
💡 Communication, exchange with peers and the search for information are all part of the resilient cyber approach. In this way, the company reinforces its understanding of the subject, and therefore the confidence it generates, particularly with investors.
Tip 2: Raise employee awareness
Raising awareness inevitably involves awareness-raising initiatives, not only among management, but also among employees. Indeed, the main security flaw is often inappropriate human behavior. Through simple ignorance, an employee's actions can have damaging consequences for the company's IT protection.
Communication and training are therefore essential if all employees (and not just IT teams) are to play an active part in the organization's security.
💡 Hackers are particularly fond of phishing, which is easy to deploy. To help employees stop "taking the bait", Mailinblack has developed the Phishing Coach tool. This simulates attacks, assesses employees' level of vulnerability and provides training content to help them adopt the right reflexes.
Tip 3: Adopt basic security measures
There are a number of basic measures to be observed, starting with securing access by means of good password management and a solid identity and access management policy.
On the technical side, attacks, failures and other attempts at unauthorized access must be systematically controlled. This means constant monitoring of IT networks and systems, and the implementation of an information security management process. To this end, some IT teams have adopted the ISO 27001 standard, based on :
- ongoing internal checks and audits,
- implementation of corrective, preventive and improvement actions.
Tip 4: Focus on data preservation
Cyber resilience includes a data-centric approach, since data is such a major issue for businesses. Imagine the consequences if a hacker gained access to your customer files with the aim of reselling this information for phishing campaigns!
What's more, with the RGPD coming into force, companies are obliged to protect users' personal data... if they don't want to receive a (sometimes very hefty) fine from the CNIL.
Consequently, IT teams must place data security at the heart of their priorities, for example by using suitable software.
Tip 4: Automate security processes
Since human error remains the primary risk factor, automating security operations is a good way of curbing threats. It also helps to :
- alleviate the problems associated with lack of corporate resources;
- more easily deploy a scalable, permanent procedure.
Various processes can be automated:
- cyber monitoring, to keep abreast of developments in cyber-attack techniques,
- cyber threat detection,
- incident response,
- security operations (e.g. rule execution), etc.
Out of 3,655 organizations worldwide, 16% said that automation had helped them to prevent a cyber attack, 23% to detect a cyber attack, 15% to respond to a cyber attack and 25% to contain a cyber attack.
💡 This automation is made possible in particular by SOAR (Security Orchestration, Automation and Response). Behind this acronym lies an overlay of compatible software layers, the aim of which is to:
- collect all security-related data;
- react in the event of a security breach, without the need for human intervention.
Tip 5: Implement or reinforce your DRP
Finally, as we have seen, cyber resilience means bouncing back as quickly as possible in the event of a problem. Consequently, if a company suffers a business interruption as a result of a cyber attack, it must have a disaster recovery plan (or DRP) in place. It is thanks to this set of crisis management procedures (triggering back-up systems, restoring data, rapidly restarting applications, etc.) that it will be able to regain its initial productivity.
💡 DRP often relies on software support to automate processes as far as possible. A solution like UCover by Nuabee, for example, supports companies, whatever their IT skills, in managing their disaster recovery plan. What's more, it offers three progressive classes of protection, which can be upgraded as organizations and their needs change.
Cyber resilience has thus changed the IT security paradigm. It is now the best protection for thriving in a cyber space that is widening the field of possibilities... while putting organizations under constant pressure in terms of risk. Like today's world, it's a playground where everything is constantly accelerating and evolving. You have to know how to adapt.
Is your company well prepared for new threats? Share your experience in comments ;-)