Resilience in a business context is often closely associated with continuity. If something happens or there is an outage, businesses rely on the principles of failover and redundancy to keep systems up and running quickly. But the equation changes when you turn the conversation toward cyber resilience. This encompasses recovery and, more importantly, the ability to defend against and prevent attacks in real time and establish flexible, reactive and proactive operations.

More than three-quarters of organizations cite security and data breaches as the leading cause of server, operating system, application, and network downtime. Your system architecture, while important, is only one part of the cyber resiliency solution. Having a strategy that includes both your architecture and your people is also vital.

Not just cybersecurity

Cyber ​​resilience is a strategic approach that encompasses your system architecture, physical structures, and people. Cybersecurity is only part of the equation. Many people understand cyber security in relation to breaches caused by attacks, misconfigurations, or insider threats. The inability to secure or protect data and privacy after the fact is often the focus. Instead, a resilience-focused approach would include a proactive action plan to mitigate the damage caused by loss of access to the system due to a cyber attack, for example.

With the recent shift to a more decentralized work environment, the need to refocus on people-centric security measures has increased. More often than not, resilience (and cybersecurity) is really about people.

In the world of cybersecurity there are three types of people:

  • Good actors doing good things.
  • Good actors who make mistakes.
  • Bad actors who have malicious intent

We've all heard the story of that good employee who made an honest mistake, like the bank employee who synchronized web browsers and unknowingly opened up access to important bank passwords to bad actors. . In this story, the employee was working from home on a work laptop connected to the home network. At some point, Google sent out a notification about a new feature that syncs web browsers across multiple devices. Sounds good right? The employee continued, but didn't realize that by syncing the browsers, all personal passwords were now stored in the work browser. And more importantly, all work passwords were now stored in the personal browser.

When the criminals broke into the employee's home network and accessed the personal browser, they discovered a trove of banking information. The hackers used this access to break into the financial institution. Fortunately, the architecture helps protect against malicious actors, but what about simple mistakes made by good people? (See above bank employee).

The truth is that engineers create security nets within systems due to human error or possible attacks, not just due to hardware failure. Human error is a major factor in 95% of breaches. Unintentional errors do happen, and understanding how to deal with errors is essential for resilience and cybersecurity.

Strengthen cyber resilience

A successful cyber resilience strategy integrates humans and technology. Here are some examples of how to avoid unwanted errors:

  • Privileged access: Restricting access establishes and maintains control over an employee's access to systems or data that must remain secure. Granting selective access to restricted areas of computer systems that are off-limits to a standard user is one way that privileged access protects organizations.
  • Multi-Factor Authentication (MFA): Multi-factor authentication requires users to provide at least two forms of identification to access resources and data. Using another factor greatly increases the difficulty for hackers to gain unauthorized access. An example of MFA is when you are asked for a unique code sent to your mobile phone to log into your bank account. And it's not limited to consumers. Many companies also require MFA for their employees.
  • Continuous control: Continuous monitoring involves recording employee and system activity and triggering alerts in the event of anomalies or suspicious activity. For example, employees who log in from unusual locations or devices or at unusual times may report compromised credentials. Continuous monitoring helps in prevention and quick action in case of a security breach.
  • Cyber-resilience and business

    Cyber ​​resiliency is vital to all aspects of business and is more than just additional security bells and whistles. It is worthy of a strategy and essential to avoid large operations, services and reputational setbacks. A successful cyber resilience strategy focuses on cybersecurity, architecture, and people.

    Considering all three angles allows for flexible, responsive, and proactive operations to ensure business continuity, even in the face of something as simple as browser sync.

    Embark on the path to cyber resiliency and strategize with Broadcom today.

    Copyright © 2022 IDG Communications, Inc.

    Share This