The potential threat posed by cyber-crime is, by now, pretty well understood. Whats less well understood is how to put a strategy in place that is robust and flexible enough to cope with a constantly changing threat landscape and, even more critical, will help the company to recover from a cyber-attack. In the end, cyber-security should be seen as part of the overall strategy to ensure business continuity through resilience.
Jeremy Capell, GM, Advisory Services, ContinuitySA believes there are four key components to an effective cyber-security strategy: Implementation, assessment, monitoring and response. Most companies have long since recognised the need for the first two, and have assigned budget and resources to them. Far fewer even have the second two in their sights.
Implementation covers the creation of security and governance policies along with technical activities such as the configuration of firewalls and so on, he explains. Assessment looks at the standards that need to be complied with, such as ISO 27001, and includes technical activities like performing a vulnerability assessment and doing vulnerability testing, usually annually.
All well and good, but these are essentially activities that take place at a certain point in time. If, for example, a new threat appears just after the annual vulnerability test, then the systems are effectively vulnerable until the next test, he adds. Thats why the third component, monitoring, is so critical. Gathering threat intelligence needs to be continuous. It would include observation of sites on the Dark Web where hackers boast about their exploits and even post hacked information, checking whether traffic from known bad hosts is directed at your sites and constantly monitoring the threat landscape. Its all about getting an early warning about a new Microsoft-targeting virus when it first appears, not once it has hit your system!
The final component is response in the event of a breach. A suitable technical response is one requirement, but plans for an appropriate business response are also necessary. This would include crisis communications plans and protocols, and how to deal with breaches that affect regulatory or other compliance. How you respond to a cyber-security incident will greatly influence its long-term impact on the business.
Part of the response phase could include help and input from your insurance company. Specialist cyber-insurance is necessary, but most insurers offer various forms of help aimed at getting you operational again, in order to minimise claims.
A related consideration is that, in my experience, companies have pockets of excellence. They might do some of the various elements well, but its extremely rare they can do everything. In order to create the holistic approach I have so briefly sketched here, the help of an independent, specialist consultancy makes good sense, Capell concludes.
ContinuitySA is Africas leading provider of business continuity management services to public and private organisations. Delivered by highly skilled experts, its fully managed services include ICT resilience, enterprise risk management, work area recovery and BCM advisoryall designed to enhance business resilience in an age of escalating threat. By helping clients understand their risk profile, and then develop an appropriate risk-mitigation strategy, ContinuitySA provides peace of mind for all stakeholders.
ContinuitySA operates the continents biggest network of recovery centres, with more than 20 000m2 of space in Gauteng (Midrand and Randburg), the Western Cape (Tyger Valley and Somerset West), in Kwa-Zulu Natal (Mount Edgecombe) as well in Botswana, Mozambique and Mauritius.
ContinuitySA is a Gold Partner of the Business Continuity Institute.
ContinuitySA. Our business is keeping you in business.
Additional information about ContinuitySA can be found at www.continuitysa.com. Network with ContinuitySA on Google+, LinkedIn, Twitter and Facebook.
Issued by Rebecca Warsop, Warstreet Marketing on 011 8079842 or cell 0832529347 or email firstname.lastname@example.org