Too many organizations fail to plan for data breaches or cyberattacks. But given the increasing frequency of these events, every company should treat them as essential considerations when developing disaster recovery and business continuity plan checklists. Companies with prudent continuity policies are going to recoup faster than those without. Not only does this planning provide an opportunity to address immediate concerns, but it also creates a foundation to build upon as the threat landscape changes.
In today's computing environment, data can be stored around the globe on multiple systems and devices. Digital assets are far-reaching, incorporating physical and virtual devices such as servers, computers, notebooks, mobile devices, and tablets. They also include commonly overlooked resources such as websites and SaaS-based services like Salesforce, Office 365, etc. Understanding the breadth of your digital assets, and the location of your data, are the single biggest factors in surviving a disaster or cyberattack. A thorough inventory of these assets will also help you identify points of risk and exposure. Cloud-based tools can assist with the inventory and management of endpoints and securing data.
Don’t assume service vendors have you covered. Review the service-level agreements (SLA) for each vendor with a focus on three key areas:
Take the time to review and test your recovery and cyberattack plans. Most companies focus on disaster recovery after a hardware failure, or data center outage. Although important, cyber-related events - which are more common - require a systematic approach and are not always IT-related. In the event of a data breach, could you answer the following:
Data classification is part of an overall security strategy. Traditional thinking classified data into two main categories: secure and non-secure, with stronger controls over the former. Data classification only works in those companies with select staff to vigilantly manage and monitor. A better approach is to treat all data as secure, or confidential, and increase overall security measures. Here are a few ways to do this:
Training is key, regardless of the technical controls and processes in place. Even if it's not required under statute, there is no substitution for ongoing security awareness training. Both end-users and IT staff will benefit from greater awareness of cybersecurity and recovery processes. The most successful businesses understand that planning and longevity go hand in hand. Effective crisis management and business continuity are not just important, they are essential to the modern workplace. For assistance developing, or implementing, tailored and proactive plans, contact an iCorps expert.