www.helpnetsecurity.com
Open in
urlscan Pro
52.39.43.255
Public Scan
URL:
https://www.helpnetsecurity.com/2024/07/04/organizations-cyber-recovery-plans/
Submission: On July 05 via api from TR — Scanned from DE
Submission: On July 05 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
<div class="mc4wp-form-fields">
<div class="hns-newsletter">
<div class="hns-newsletter__top">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__title">
<i>
<svg class="hic">
<use xlink:href="#hic-plus"></use>
</svg>
</i>
<span>Cybersecurity news</span>
</div>
</div>
</div>
</div>
<div class="hns-newsletter__bottom">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__body">
<div class="row">
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
<label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
</div>
</div>
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
<label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
</div>
</div>
</div>
</div>
<div class="form-check form-control-lg mb-3">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
<label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
</div>
<div class="input-group mb-3">
<input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
<button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
</div>
<div class="form-check">
<input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
<label class="form-check-label" for="mcs4">
<span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms & conditions</a>
</span>
</label>
</div>
</div>
</div>
</div>
</div>
</div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
value="1720145483"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
<div class="mc4wp-response"></div>
</form>
Text Content
* News * Features * Expert analysis * Videos * Events * Whitepapers * Industry news * Product showcase * Newsletters * * * Please turn on your JavaScript for this page to function normally. Help Net Security July 4, 2024 Share ONLY 13% OF ORGANIZATIONS ARE CYBER MATURE A staggering 83% of organizations have suffered a material security breach recently, with over half occurring in the past year alone, underscoring the critical need for advanced preparedness and agile response strategies, according to Commvault. For security and IT professionals, the risk landscape is constantly evolving, they are particularly concerned about external threats, and organizations must assume breach. Organizations realize it’s not a matter of if or when they will be breached, but a matter of when they find out that they already have been breached. FIVE MARKERS OF CYBER RECOVERY READINESS Commvault and GigaOm were able to pinpoint five key capabilities, also called resiliency markers, that when deployed together, helped companies recover faster from cyberattacks and experience fewer breaches compared to companies that did not follow the same path. These five resiliency markers emerged after data analysis teams combed through survey results across a range of topics including: how often companies were breached, what resilience technologies were (or were not) deployed, and how rapidly businesses were able to recover data and resume normal operations. The resiliency markers are as follows: * Security tools that enable early warning about risk, including insider risk. * A known-clean dark site or secondary system in place. * An isolated environment to store an immutable copy of the data. * Defined runbooks, roles, and processes for incident response. * Specific measures to show cyber recovery readiness and risk. For many organizations, cyber recovery strategy is still a work in progress. Again, 38% of our respondents recognize that their efforts could use improvement. Those aiming to improve should look to their more mature peers, which place a premium on prioritizing more practices vs. just a few, and, as a result, are on more solid footing in the face of a breach. CYBER READY ORGANIZATIONS RECOVER FASTER In assessing the results, only 13% of respondents were categorized as cyber mature. Cyber mature organizations, those that have deployed at least four of the five resiliency markers, recovered 41% faster than respondents with only zero or one marker. Overall, cyber mature organizations report experiencing fewer breaches compared with companies that have less than four markers. 54% of cyber mature organizations were completely confident in their ability to recover from a breach, compared to only 33% of less prepared organizations. 70% of cyber mature organizations tested their recovery plans quarterly, compared to 43% of organizations with only zero or one maturity marker, that tested with this same frequency. Without testing in a real-world scenario, organizations have no way to know how their cyber recovery plans will perform. “One of the key findings from the research is that in order to truly advance cyber preparedness, organisations can’t cut corners. We saw significant disparities in resilience between organisations that deployed one or two of the resiliency markers versus four or five,” said Chris Ray, Cybersecurity Analyst, GigaOm. “It’s critical that organisations think about resiliency in layers. Less than 85% of respondents surveyed do that today. This needs to rapidly change if companies want to be resilient and have the upper hand against bad actors.” More about * Commvault * cybersecurity * GigaOm * report * strategy * survey * threats Share FEATURED NEWS * 4 key steps to building an incident response plan * Maintaining human oversight in AI-enhanced software development * Secator: Open-source pentesting Swiss army knife Guide to mitigating credential stuffing attacks SPONSORED * eBook: Cloud security skills * Download: The Ultimate Guide to the CISSP * eBook: Do you have what it takes to lead in cybersecurity? DON'T MISS * 4 key steps to building an incident response plan * Maintaining human oversight in AI-enhanced software development * Secator: Open-source pentesting Swiss army knife * Leveraging no-code automation for efficient network operations * The impossibility of “getting ahead” in cyber defense Cybersecurity news Daily Newsletter Weekly Newsletter (IN)SECURE - monthly newsletter with top articles Subscribe I have read and agree to the terms & conditions Leave this field empty if you're human: © Copyright 1998-2024 by Help Net Security Read our privacy policy | About us | Advertise Follow us ×