- Governance, Risk & Compliance
- Business Solutions
Recently, 9News was at the centre of the 'largest cyber attack on a media company in Australia's history', which brought television and digital production systems around the country to a grinding halt for more than 24 hours. This event turned out to be the latest headline-making reminder for business leaders about the dangers of becoming complacent about cyber-security.
Needless to say, these attacks threaten the integrity of your company's information and sensitive data, and challenges the ability of organisations to protect the details of their customers and employees affecting day-to-day business operations. One of the latest victims was Colonial Pipeline, the largest fuel pipeline in the United States which was forced to shut down 5,500 miles of pipeline and the US declared a regional state of emergency affecting 17 States and the District of Columbia.
In the last year alone, cyber attacks have become more common, primarily due to COVID and changes to staff working environments with potentially less secure networks. In March 2021 computer giant Acer also suffered a REvil ransomware attack where the hackers demanded the largest known ransom to date - a whopping US$50 million ransom! Almost every week, news headlines break about the latest victim of a massive data breach or cyberattack, but WHY are so many organisations still struggling so much?
Gartner analysts have predicted cyber-physical security incidents will rapidly increase in the coming years due to a lack of security focus and spending aligned to cyber-physical systems instead. Its analysis predicts 75% of CEOs will be personally liable for cyber-physical security (CPS) incidents by 2024 and a financial impact that will reach over US$50 billion by 2023.
The best way to avoid becoming a victim is of course to arm yourself with as much information as possible to avoid vulnerabilities and seek professional security advice, however, should a breach occur, it is imperative that you have a tried and tested plan on how to respond and recover. We've put together some recovery tips for you to enhance your disaster recovery plan.
8 Steps to recover from a cyber attack
Gartner defines Disaster recovery (DR) as the use of alternative network circuits to re-establish communications channels in the event that the primary channels are disconnected or malfunctioning.
Once a cyber attack has occurred, make sure you have a plan in place to begin recovery immediately. In the aftermath, most businesses see a reduction in their operational abilities, reputation, and revenue. Here are 8 key steps to recover from a cyber attack:
Who is involved in the recovery process?
Your employees are the biggest asset during a cyber attack. Establish a comprehensive response team to help create a multi-faceted plan addressing all issues a data breach may create. The Head of IT, cyber-security experts, IT disaster recovery (ITDR), risk management, legal and compliance teams should all be involved in post-attack recovery processes.
The most effective cyber recovery plans are customised to your organisation’s needs directly involving employees.
Tips to enhance your disaster recovery plan.
Here are a few ideas on how you can streamline your disaster recovery program:
Continue testing and enhancing disaster recovery strategies, audits, and plans.
Cyber attacks have had a devastating impact on businesses worldwide and caused a loss of millions if not billions of dollars. ReadiNow’s disaster recovery solution provides an effective way to simplify and automate the steps your business needs to take during a recovery process. The ReadiNow platform allows your business to continuously monitor, analyse, report on and manage processes with automated workflows and team alerts. If you'd like to see an award-winning solution built by industry experts, book a demo now.
For further reference: