Building Resilience in Critical Systems
Resiliency is a much used, and perhaps overused word in cybersecurity circles. It refers to an organizations ability to deal with the inevitability of cyber-attacks. Clearly, when we are thinking from this perspective, the mindset of businesses must be a stance of preparation centered on ‘WHEN will I be attacked, NOT if I will be attacked.’
As I hear presentations and sales pitches from cybersecurity providers, I have become increasingly convinced that fear-mongering is the preferred sales tactic of our day. I recently sat through a lunchtime presentation on cybersecurity geared towards small town, small time business owners. From my perspective the presenter seemed intent on regurgitating every known fact in the universe on data breaches available via the world wide web. To be perfectly honest, it was a spectacularly painful presentation to sit through.
Chances are very good today that any business owner who has watched the news in the last year is aware that cyber threats are increasing and can cause profound damage to unprepared businesses. What many small business owners may not realize is they are targets for cybercriminals. That is, being small while hoping to go unnoticed is not a protective measure for businesses in today’s digital landscape.
Suffice it to say, if you remain in business long enough and your business has electricity, then you need to prepare for the inevitability of a cyber breach.
Thus, technology providers who advise business owners on security related issues need not attempt to scare their clients into compliance. The proper approach to building resiliency within any critical networking system begins with awareness, preparation and the right frame of mind.
Organizations and technology advisors should take a comprehensive approach to maintaining the security of their technological infrastructure. This stance demands a robust cyber footing that centers on the prevention of, the response to, and the recovery from cyber threats.
Because no plan nor defensive system is fool-proof and because threats are constantly shifting, the responsible MSP will plan for all eventualities including recovering from a systemic breach. As first line advisors to small businesses, MSPs must be prepared to advise their clients to the cyber realities we face in 2016, and provide them with a comprehensive solution.
[contentblock id=74 img=gcb.png]