Modernize your Cyber Recovery Strategy with these Five Simple Steps

By Soko Directory Team / Published February 9, 2023 | 11:06 am



Technology Trends

Author: Wycliffe Selebwa, Country Leader, Dell Technologies, Kenya

Across industries and among organizations of every size, cyberattacks are on the rise.

For instance, Kenya’s Communication Authority revealed that in the year 2021, cybercrimes in the country rose by over 50 percent in the fourth quarter from 35.1 million in 2020 to 56.2 million threats in 2021.

As a result of the increased digital transformation witnessed in various sectors in the country, the financial sector, and the mobile banking sector have been ranked as the top targets by cybercriminals. A report by the Credit Reporting agency revealed that banks in Kenya are witnessing losses of over $121 million every year to fraudsters through identity theft.

The Dell Technologies Global Data Protection Index 2022 reported that in the past year, cyberattacks accounted for 48% of all disasters (up from 37% in 2021), leading to all other causes of data disruption. The survey also revealed 85% of organizations using multiple data protection vendors see a benefit in reducing their number of vendors.

Furthermore, it revealed that organizations using a single data protection vendor incurred 34% less cost recovering from cyberattacks or other cyber incidents than those who used multiple vendors.

To create a more cyber-resilient approach to data protection, businesses can modernize and automate their recovery and business continuity strategies and leverage the latest intelligent tools to detect and defend against cyber threats.

Dell EMC PowerProtect Cyber Recovery for Sheltered Harbor –

Robust cyber resilience for financial institutions’ most critical data

Dell Technologies is the first technology solution provider to join the Sheltered Harbor Alliance Partner Program. The solution is based upon the Dell PowerProtect Cyber Recovery solution, a market leader with an almost five-year history of protecting organizations’ most critical data.

Here are five components of a proven and modern cyber recovery strategy:

  1. Automated Data Vaults

Cyber resilience cannot be achieved without a major component – the Cyber Recovery Vault. It offers multiple layers of protection to provide resilience against cyberattacks even from an insider threat. It moves critical data away from the attack surface, physically isolating it within a protected part of the data center, and requires separate security credentials and multifactor authentication for access.

Additional safeguards include an automated operational air gap to provide network isolation and eliminate management interfaces that could be compromised. If a cyberattack occurs, you can quickly identify a clean copy of your data, recover your critical systems and get your business back up and running.

Data vaults have been used to great effect among public and private sector organizations. These companies often use them to securely store updated copies of their most critical data and applications. If a ransomware or data destruction attack impacts data and applications in the main production environments, the threat actors still cannot access the contents of the data vault. Post-attack, as part of the incident response and recovery process, clean copies of data and applications stored in the data vault are used to restore the production environment.

  1. Data Isolation and Governance

Similarly, ensuring an isolated data center environment that is disconnected from corporate and backup networks and restricted from users other than those with proper clearance is another method for ensuring a water-tight cyber recovery strategy. By isolating critical data, identifying suspicious activity, and accelerating data recovery, enterprises can more easily achieve cyber resilience with this approach.

  1. Intelligent Analytics and Tools

Additionally, machine learning and full-content indexing with powerful analytics within the safety of the vault are effective tools for detecting threats. This also includes automated integrity checks to determine whether data has been impacted by malware and tools to support remediation if needed. 

  1. Recovery and Remediation

If an incident has indeed taken place remediation consists of workflows and tools that perform recovery by using dynamic restore processes and existing data recovery procedures to bring business-critical systems back online quickly and with confidence. This must also include a comprehensive methodology for protecting data, as well as performing damage assessments and forensics to provide an organization with the confident and most reliable path to recovery of business-critical systems. 

  1. Solution Planning and Design

Finally, expert guidance and services can help organizations determine which business-critical systems need protection and can create dependency maps for associated applications and services, as well as the infrastructure needed to recover them. For example, Zero Trust is a cybersecurity model that shifts how organizations approach security from relying solely on perimeter defenses to a proactive strategy that only allows known good activity across ecosystems and data pipelines. It allows organizations to better align their cybersecurity strategy across the data center, clouds, and at the edge. Such services also generate recovery requirements and design alternatives, while identifying the technologies to analyze, host and protect data, along with a business case and implementation timeline.

Cyber resilience requires a multi-layered approach to cybersecurity. In addition to advanced threat protection and security training for employees, a strong cyber recovery strategy can promote cyber resilience by protecting backup systems from corruption and enabling fast recovery of business-critical systems, applications, and operations after an attack. In short, Cyber Resiliency is a strategy that incorporates people, processes, and technology into a holistic framework that protects an entire business, organization, or entity. This strategy allows businesses to prepare for and recover rapidly from disruptions caused by cyberattacks.




About Soko Directory Team

Soko Directory is a Financial and Markets digital portal that tracks brands, listed firms on the NSE, SMEs and trend setters in the markets eco-system.Find us on Facebook: facebook.com/SokoDirectory and on Twitter: twitter.com/SokoDirectory

View other posts by Soko Directory Team


More Articles From This Author








Trending Stories










Other Related Articles










SOKO DIRECTORY & FINANCIAL GUIDE



ARCHIVES

2023
  • January 2023 (182)
  • February 2023 (203)
  • March 2023 (322)
  • April 2023 (298)
  • May 2023 (268)
  • June 2023 (214)
  • July 2023 (212)
  • August 2023 (258)
  • September 2023 (192)
  • 2022
  • January 2022 (293)
  • February 2022 (329)
  • March 2022 (358)
  • April 2022 (292)
  • May 2022 (271)
  • June 2022 (232)
  • July 2022 (278)
  • August 2022 (253)
  • September 2022 (246)
  • October 2022 (196)
  • November 2022 (233)
  • December 2022 (167)
  • 2021
  • January 2021 (182)
  • February 2021 (227)
  • March 2021 (325)
  • April 2021 (259)
  • May 2021 (285)
  • June 2021 (272)
  • July 2021 (277)
  • August 2021 (232)
  • September 2021 (271)
  • October 2021 (305)
  • November 2021 (364)
  • December 2021 (249)
  • 2020
  • January 2020 (272)
  • February 2020 (310)
  • March 2020 (390)
  • April 2020 (321)
  • May 2020 (335)
  • June 2020 (327)
  • July 2020 (333)
  • August 2020 (276)
  • September 2020 (214)
  • October 2020 (233)
  • November 2020 (242)
  • December 2020 (187)
  • 2019
  • January 2019 (251)
  • February 2019 (215)
  • March 2019 (283)
  • April 2019 (254)
  • May 2019 (269)
  • June 2019 (249)
  • July 2019 (335)
  • August 2019 (293)
  • September 2019 (306)
  • October 2019 (313)
  • November 2019 (362)
  • December 2019 (318)
  • 2018
  • January 2018 (291)
  • February 2018 (213)
  • March 2018 (275)
  • April 2018 (223)
  • May 2018 (235)
  • June 2018 (176)
  • July 2018 (256)
  • August 2018 (247)
  • September 2018 (255)
  • October 2018 (282)
  • November 2018 (282)
  • December 2018 (184)
  • 2017
  • January 2017 (183)
  • February 2017 (194)
  • March 2017 (207)
  • April 2017 (104)
  • May 2017 (169)
  • June 2017 (205)
  • July 2017 (189)
  • August 2017 (195)
  • September 2017 (186)
  • October 2017 (235)
  • November 2017 (253)
  • December 2017 (266)
  • 2016
  • January 2016 (164)
  • February 2016 (165)
  • March 2016 (189)
  • April 2016 (143)
  • May 2016 (245)
  • June 2016 (182)
  • July 2016 (271)
  • August 2016 (247)
  • September 2016 (233)
  • October 2016 (191)
  • November 2016 (243)
  • December 2016 (153)
  • 2015
  • January 2015 (1)
  • February 2015 (4)
  • March 2015 (164)
  • April 2015 (107)
  • May 2015 (116)
  • June 2015 (119)
  • July 2015 (145)
  • August 2015 (157)
  • September 2015 (186)
  • October 2015 (169)
  • November 2015 (173)
  • December 2015 (205)
  • 2014
  • March 2014 (2)
  • 2013
  • March 2013 (10)
  • June 2013 (1)
  • 2012
  • March 2012 (7)
  • April 2012 (15)
  • May 2012 (1)
  • July 2012 (1)
  • August 2012 (4)
  • October 2012 (2)
  • November 2012 (2)
  • December 2012 (1)
  • 2011
    2010
    2009
    2008
    2007
    2006
    2005
    2004
    2003
    2002
    2001
    2000
    1999
    1998
    1997
    1996
    1995
    1994
    1993
    1992
    1991
    1990
    1989
    1988
    1987
    1986
    1985
    1984
    1983
    1982
    1981
    1980
    1979
    1978
    1977
    1976
    1975
    1974
    1973
    1972
    1971
    1970
    1969
    1968
    1967
    1966
    1965
    1964
    1963
    1962
    1961
    1960
    1959
    1958
    1957
    1956
    1955
    1954
    1953
    1952
    1951
    1950