sb-nz logo
Story image

The key challenges a business faces after an aggressive cyberattack

06 Apr 2016

The new digital era has had a monumental effect on modern businesses, completely transforming the world that we work and live in today. However, the increasingly digital world has also meant that there are many, many more pathways for cyber criminals to take, effectively making it easier for them to cripple your business.

The best thing your business can do is simply prepare for and respond to a business disruption after a cyberattack. Fortunately, global boardroom awareness of the rapid increase in the scale and sophistication of cyberattacks, as well as their financial and reputational impact, is skyrocketing. To ensure effective enterprisewide risk containment, cybersecurity and BCM leaders must align their response and recovery processes.

What are some of the key challenges following a cyberattack?

A successful cyberattack can shut down operations Modern businesses effectively run on digital, which means a cyberattack can mean a business disruption of not just for a few hours, but rather for multiple days and weeks. The collateral damage, such as information leaks, reputational damage and so on, can continue for much longer.

Backup systems, applications and data may also be infected Often, they will need to be cleansed before they can be used for recovery, and therefore, of little usable value during response and recovery operations in the short term, which only extends the amount of time your business is crippled.

Production and recovery IT assets are likely to be infected in a cyberattack Cyberattacks can easily derail your documented and tested RTOs and recovery point objectives.

Computer security incident response teams may be unaware of better solutions It's not uncommon for teams to be unaware of BCM automation solutions that can be leveraged for faster and more comprehensive response and recovery actions after a cyberattack.

Article by Roberta J. Witty, Gartner research analyst

Story image
Video: 10 Minute IT Jams - Who is LogRhythm?
LogRhythm VP of sales for Asia Pacific Simon Howe, who discusses the company's primary offerings and services, what products the company is focused on for the future, and the infrastructure it has in the A/NZ market.More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Juniper Networks expands security offering for remote working
Juniper Networks has launched new solutions to enhance work from home security.More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
Majority of industrial enterprises face increase cyber threats since COVID-19
Leadership's top cyber security priority was implementing new technology solutions since the onset of the pandemic.More
Story image
Report: Power utilities increasingly at risk of devastating cyber-attacks
“Utilities’ existing systems are becoming increasingly connected through sensors and networks, and, due to their dispersed nature, are even more difficult to control.”More