{"id":8161,"date":"2020-10-05T07:25:57","date_gmt":"2020-10-05T12:25:57","guid":{"rendered":"https:\/\/cmitsolutions.com\/tribeca\/?p=8161"},"modified":"2023-02-17T17:29:41","modified_gmt":"2023-02-17T23:29:41","slug":"what-is-cyber-resilience","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/blog\/what-is-cyber-resilience\/","title":{"rendered":"What is cyber resilience"},"content":{"rendered":"<p>To put in simple terms, Cyber Resilience means the ability of a company to get back up on its feet after a security attack. An organization also can limit the impact of security incidents. Cyber resilience is an approach to cybersecurity strategies, along with business continuity management. It consists of two primary components. The first one focuses on preventative measures like continuous monitoring and threat reporting. The second one focuses on developing appropriate incident response plans in case of a cyberattack. Unfortunately, most businesses don\u2019t understand the importance of the second step and lag at it.<\/p>\n<h2>What are the risks<\/h2>\n<p>Before you choosing the response or security plan and implementing it, you must first assess the risks to which your company is maybe exposed. By evaluating and analyzing the risks, you can choose a suitable plan that will serve your specific needs. The risks can be strategic, reputational, operational, transactional, and compliance.<\/p>\n<ul>\n<li>Strategic risks refer to the failed attempt at implementing business plans that align with the strategic goals of the company.<\/li>\n<li>Reputational risks are easy to understand. These refer to negative public opinion or negative publicity.<\/li>\n<li>Operational risks are the failed internal processes, people, or systems that amount to a loss.<\/li>\n<li>Transactional risks are issues with customer service, employee service, or product delivery.<\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Compliance\">Compliance<\/a> means the risks circling the violations of laws, rules, or regulations.<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/wp-content\/uploads\/sites\/11\/2023\/02\/Ways-to-improve-cyber-resilience.png\" alt=\"cyber resilience\" width=\"2240\" height=\"1260\" \/><\/p>\n<h2>Ways to improve cyber resilience<\/h2>\n<p>An incident response plan will comprise of the actions that will be taken if a data security incident happens. The objective of a response plan is to identify the attack, limit the damage to minimum possible, and eliminate the root cause. A quick response from the organization can reduce the losses, restore all the processes, systems, and <a href=\"https:\/\/cmitsolutions.com\/tribeca\/what-can-managed-it-services-new-york-do-for-your-business\/\">services<\/a>. A quick response can mitigate exploited vulnerabilities.<\/p>\n<p><iframe src=\"https:\/\/www.youtube.com\/embed\/4VXFCgboL9Y\" width=\"850\" height=\"500\" frameborder=\"0\"><span data-mce-type=\"bookmark\" style=\"width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\n<p><strong>Preparation<\/strong>&#8211; Put together an incident response team and outline their distinct roles and responsibilities. Develop rigid policies to implement in the event of a cyberattack along with a communication plan.<\/p>\n<p><strong>Identification<\/strong>&#8211; Decide what to identify as a threat. Set a criterion that will call the team to action to assess the incident and gather additional evidence, for example, a phishing attack.<\/p>\n<p><strong>Containment<\/strong>&#8211; Containment includes an instant response plus a long-term containment plan to diminish the <a href=\"https:\/\/cmitsolutions.com\/tribeca\/19746\/\">damage<\/a>. It consists of installing security patches on affected systems.<\/p>\n<p><strong>Eradication<\/strong>&#8211; Limit the threat and restore all the systems to their initial state after eradicating other potential risks.<\/p>\n<p><strong>Recovery-<\/strong> Ensure that the attacked systems are not in danger anymore. The systems can be restored to initial working conditions. Monitor the network system to assess the possibility of another incident and prevent it.<\/p>\n<p><strong>Lessons Learned<\/strong>&#8211; After an attack and its recovery, review the measures you took, and analyze the room for improvement. This incident report can be used as a benchmark for future comparison. It is useful for training purposes for the new incident response team.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To put in simple terms, Cyber Resilience means the ability of a&#8230;<\/p>\n","protected":false},"author":37,"featured_media":11899,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[97],"class_list":["post-8161","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cyber"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/wp-json\/wp\/v2\/posts\/8161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/wp-json\/wp\/v2\/comments?post=8161"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/wp-json\/wp\/v2\/posts\/8161\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/wp-json\/wp\/v2\/media\/11899"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/wp-json\/wp\/v2\/media?parent=8161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/wp-json\/wp\/v2\/categories?post=8161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/tribeca-ny-1166\/wp-json\/wp\/v2\/tags?post=8161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}