www.helpnetsecurity.com Open in urlscan Pro
52.39.43.255  Public Scan

URL: https://www.helpnetsecurity.com/2024/07/04/organizations-cyber-recovery-plans/
Submission: On July 05 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1720145483"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Please turn on your JavaScript for this page to function normally.
Help Net Security
July 4, 2024
Share


ONLY 13% OF ORGANIZATIONS ARE CYBER MATURE



A staggering 83% of organizations have suffered a material security breach
recently, with over half occurring in the past year alone, underscoring the
critical need for advanced preparedness and agile response strategies, according
to Commvault.



For security and IT professionals, the risk landscape is constantly evolving,
they are particularly concerned about external threats, and organizations must
assume breach. Organizations realize it’s not a matter of if or when they will
be breached, but a matter of when they find out that they already have been
breached.


FIVE MARKERS OF CYBER RECOVERY READINESS

Commvault and GigaOm were able to pinpoint five key capabilities, also called
resiliency markers, that when deployed together, helped companies recover faster
from cyberattacks and experience fewer breaches compared to companies that did
not follow the same path.

These five resiliency markers emerged after data analysis teams combed through
survey results across a range of topics including: how often companies were
breached, what resilience technologies were (or were not) deployed, and how
rapidly businesses were able to recover data and resume normal operations.

The resiliency markers are as follows:

 * Security tools that enable early warning about risk, including insider risk.
 * A known-clean dark site or secondary system in place.
 * An isolated environment to store an immutable copy of the data.
 * Defined runbooks, roles, and processes for incident response.
 * Specific measures to show cyber recovery readiness and risk.

For many organizations, cyber recovery strategy is still a work in progress.
Again, 38% of our respondents recognize that their efforts could use
improvement. Those aiming to improve should look to their more mature peers,
which place a premium on prioritizing more practices vs. just a few, and, as a
result, are on more solid footing in the face of a breach.


CYBER READY ORGANIZATIONS RECOVER FASTER

In assessing the results, only 13% of respondents were categorized as cyber
mature.

Cyber mature organizations, those that have deployed at least four of the five
resiliency markers, recovered 41% faster than respondents with only zero or one
marker. Overall, cyber mature organizations report experiencing fewer breaches
compared with companies that have less than four markers.

54% of cyber mature organizations were completely confident in their ability to
recover from a breach, compared to only 33% of less prepared organizations.

70% of cyber mature organizations tested their recovery plans quarterly,
compared to 43% of organizations with only zero or one maturity marker, that
tested with this same frequency.

Without testing in a real-world scenario, organizations have no way to know how
their cyber recovery plans will perform.

“One of the key findings from the research is that in order to truly advance
cyber preparedness, organisations can’t cut corners. We saw significant
disparities in resilience between organisations that deployed one or two of the
resiliency markers versus four or five,” said Chris Ray, Cybersecurity Analyst,
GigaOm. “It’s critical that organisations think about resiliency in layers. Less
than 85% of respondents surveyed do that today. This needs to rapidly change if
companies want to be resilient and have the upper hand against bad actors.”





More about
 * Commvault
 * cybersecurity
 * GigaOm
 * report
 * strategy
 * survey
 * threats

Share


FEATURED NEWS

 * 4 key steps to building an incident response plan
 * Maintaining human oversight in AI-enhanced software development
 * Secator: Open-source pentesting Swiss army knife

Guide to mitigating credential stuffing attacks



SPONSORED

 * eBook: Cloud security skills
 * Download: The Ultimate Guide to the CISSP
 * eBook: Do you have what it takes to lead in cybersecurity?




DON'T MISS

 * 4 key steps to building an incident response plan
 * Maintaining human oversight in AI-enhanced software development
 * Secator: Open-source pentesting Swiss army knife
 * Leveraging no-code automation for efficient network operations
 * The impossibility of “getting ahead” in cyber defense




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2024 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×