Why A Balanced Approach Of Response And Preparation Is Needed For Data Security

A recent global survey conducted by IT services firm, Netenrich, found that 83 percent of IT professionals say their organization would experience significant operational damage in the first 24 hours of a systems collapse.

According to the survey, about one third of respondents recognize that mitigating damage from a cyber outage requires a more proactive security strategy. They see a need and have a desire to improve system security with risk assessment, incident analysis, and threat modeling. However, they report spending most of their day on reactive tasks like keeping systems up to date, evaluating critical systems incidents, and identifying and correcting systems breach alerts that are actually false alarms.

Also, 67 percent of respondents say they currently focus on upgrading security tools, even though half say integrating those tools and finding expertise to manage them is a primary struggle.

To prevent substantial organizational damage, experts from Netenrich recommend that IT professionals focus more on assessing the business risk associated with a systems breach rather than on the technological mechanisms used to prevent a breach. "Survey Reports 83% of Companies Suffer Crippling Business Damage During the First 24 Hours of an IT Outage" www.yahoo.com (Oct. 28, 2021).


According to the source, more time is spent in response than in prevention. Organizations that find they are not able to divert resources for prevention should consider third-party assistance to develop a prevention and reaction plan in case of a breach.

Either way, organizations should seek a balanced approach of putting out the fires, but also finding a way to keep the fires from sparking or spreading.

To that point, creating and properly storing back-ups of critical systems and data is an invaluable tool to limiting business damage. Make sure your back-up data is stored on a server that is isolated from the network and safe from attack. Cloud-based back-ups are also an option, and typically result in a quicker and easier recovery process.

In addition, many employers can benefit from backing up data to an external drive or other hardware storage device as a way to prevent corruption or loss. The device can be stored offsite as added protection against fire or weather-related risks.

Once a full backup is complete, be sure to conduct incremental backups on a regular basis to limit the amount of data lost from one backup to the next.

Finally, your opinion is important to us. Please complete the opinion survey:


New Fax Number for Best Practice Help Line

The fax line for Best Practice Help Line consultation requests is now 918-712-5965.

Bots Make All Employers, Even Small Employers, Vulnerable To Cyber Attacks

A new global study of internet websites reveals an increasing amount of bot traffic, much of which is malicious. We examine why that creates a risk for all employers.

War In Ukraine And The Rise Of Destructive Malware

Organizations must implement best practices to protect their network from malicious code designed to destroy data. We look at prevention strategy sources.

White Hat Hacker And Other Security Tips To Protect Your And Your Employees' Data

Although no system is impenetrable, you can mitigate your losses with help from a former cybercriminal. Learn why.