https://newsletter.en.creamermedia.com
Building|Business|Components|Environment|Financial|System|Systems|Technology|Testing|Solutions|Operations
Building|Business|Components|Environment|Financial|System|Systems|Technology|Testing|Solutions|Operations
building|business|components|environment|financial|system|systems|technology|testing|solutions|operations

Cybersecurity and Cyber Resilience are the foundation of an effective data management strategy

8th January 2025

     

Font size: - +

This article has been supplied and will be available for a limited time only on this website.

By: Aslam Tajbhai - Head of Solutions at DMP SA

The terms “Cybersecurity” and “Cyber Resilience” are often used interchangeably, which can be misleading. While they are related, these two concepts serve distinct yet complementary purposes, particularly when viewed from a data management perspective. Both are critical to safeguarding data and ensuring business continuity. But what are the differences between them, and why does an organisation need both to effectively manage Cyber Risk?

Cybersecurity versus Cyber Resilience

At its core, Cybersecurity focuses on preventative measures that attempt to stop unauthorised access, breaches, and attacks. It includes firewalls, antivirus software, strong password policies, and Multi-Factor Authentication (MFA), which are all designed to keep cybercriminals at bay.

On the other hand, Cyber Resilience talks to how well an organisation can recover after an attack. Cyber Resilience is not just about preventing breaches, which is not always possible, but about minimising the damage and restoring operations swiftly. Cyber Resilience involves strategies for data recovery, damage control, and operational continuity following an incident.

In short, Cybersecurity aims to block attacks, while Cyber Resilience ensures that when attacks happen, their impact is minimised, and operations can resume business as usual as quickly as possible. This is why both are critical in an effective and robust data management strategy that not only safeguards business operations, but assists in compliance with various bodies of legislation such as the Protection of Personal Information Act (POPIA). 

Building a strong Cybersecurity strategy

A solid Cybersecurity strategy requires that several core components be incorporated and layered to protect an organisation from a breach as far as possible. Bad actors often gain access to a company’s network through endpoint devices such as laptops, smartphones, or tablets. Ensuring these devices are equipped with endpoint protection, including antivirus and anti-malware software, is essential. Firewalls act as a barrier between a company’s internal network and the external world, helping to block unauthorised access. Virtual Private Networks (VPNs) ensure secure communication between remote devices and the corporate network.

On top of these tools, it is critical that strong password policies are combined with MFA, as most breaches today still occur as a result of compromised credentials. This makes it essential to also have appropriate access control policies in place, following a “least privileged access” strategy, to ensure that only people who need access to the data and systems can do so. However, while these measures help prevent unauthorised access and protect data, no system is completely impervious to attack. That is where Cyber Resilience becomes vital.

Back to business

The role of Cyber Resilience is to mitigate damage when things go wrong. This is a continuous process that starts long before an attack occurs and ensures a business can recover quickly when the worst happens. The National Institute of Standards and Technology (NIST) provides a framework that helps organisations identify, protect, detect, respond to, and recover from, cyber incidents.

Cyber Resilience can be broken down into three key areas:

1. Risk identification – understanding and identifying the risks within an organisation is critical. This includes knowing where sensitive data, such as customer credit card details or personal information, is stored. The earlier risks are identified, the more steps can be taken to protect that data, such as encryption, deletion, or archival.

2. Readiness – Cyber Resilience requires organisations to be ready for an attack. This means having early warning systems in place, such as threat deception technology, and testing cyber recovery plans regularly in isolated environments. A strong recovery plan ensures minimal downtime and protects data integrity.

3. Recovery – the most crucial aspect of resilience is the ability to recover quickly after an attack. Backups are key, but not just any backups – organisations need to have immutable backups stored offsite that cannot be tampered with during an attack, and the ability to recover a clean copy of data to a clean environment. This ensures businesses can resume operations with minimal disruption.

Risk versus reward

Failing to implement effective Cybersecurity in conjunction with a robust Cyber Resilience strategy can have detrimental effects. A successful breach can erode customer trust and damage the organisation’s brand; it can also cause extended periods of downtime, interrupting business operations. These both can lead to significant financial losses, either directly through ransom payments or indirectly through lost business.

Preventing attacks is no longer enough, nor is it always possible. It is essential to be able to recover when, and not if, bad actors infiltrate business networks. By implementing both Cybersecurity and Cyber Resilience strategies, businesses can safeguard their assets and ensure uninterrupted operations. Together, they form the foundation of a comprehensive, long-term data management strategy that protects against both immediate and future threats.

Edited by Creamer Media Reporter

Comments

Showroom

John Ratcliffe
John Ratcliffe

At John Ratcliffe, we are aftermarket specialists for heavy-duty on and off-road vehicles. We engineer and retrofit advanced safety systems, engine...

VISIT SHOWROOM 
Alcohol Breathalysers
Alcohol Breathalysers

Supplier & Distributor of the Widest Range of Accurate & Easy-to-Use Alcohol Breathalysers

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:0.491 0.584s - 201pq - 2rq
Subscribe Now