How Quickly Can You Bounce Back from Attack?

According to new research by McKinsey & Company1, cyberattacks are increasing and the bad guys are winning. Surprisingly, the most damage incurred doesn’t come from the security breach — it comes from an inadequate response to the breach.

In their research, McKinsey found 60% of executives believe the sophistication or pace of the attacks will increase more quickly than their ability to defend their organizations. And it’s not about how much money organizations spend on their defenses — McKinsey found “no correlation between spending levels and risk-management maturity.” Some companies do well with a small budget while other companies spend much more but they spend it inefficiently but all organizations have significant room for improvement.

How Quickly Can You Bounce Back from Attack? Cyber Resilience AdviceThe Major Risks

  • Customer privacy/data breaches
  • Industrial espionage, the leaking of proprietary information
  • Business continuity/service disruption

Improving Response Plans

It’s difficult for larger organizations to enforce security policy compliance among employees – especially with BYOD policies becoming the norm – but something has to be done to more securely protect business operation continuity.

One of the major setbacks organizations encounter when there is an attack or security breach is costly unexpected downtime.

Downtime means more than unproductive employees. You must consider lost revenues, customer dissatisfaction, damaged brand perception and negative PR. The hourly cost of downtime ranges from $9,000-$10,000 for retail and construction companies to $15,000-$45,000 for utilities and financial institutions.

A Quick and Effective Solution

Something you can implement today, whether your budget is large, small or almost nonexistent, is a low-cost, huge-return solution for getting operations back up and running when time is of the essence.

Cyber Resilience Advice: How Quickly Can You Bounce Back from an Attack?InstantRecovery for PCs and InstantRecovery Server provide a way to restore failed operating systems, data and applications in the time is takes to reboot. Installed prior to a security breach, InstantRecovery not only provides a snapshot of your system in its current, pristine state as a “restore point” to return your system back to immediately upon reboot in the case of system failure, it provides much more than Windows’ built-in System Restore ever could, including Data Anchoring.

InstantRecovery’s Data Anchoring feature allows you to select important files and folders that – no matter what Snapshot you restore your system to – are restored in their most recently saved state at the time of the system failure. Even if you do daily backups of data, if your system failure occurred before your daily backup, InstantRecovery saves all the recent changes you made to your anchored files and folders before the system failure occurred, restoring your files and folders along with your system in the time it takes to reboot.

Learn more about InstantRecovery and InstantRecovery Server.

1The rising strategic risks of cyberattacks, McKinsey & Company, May 2014

Category: InstantRecoverySystem Recovery

Tags:

Leave a Reply