CyRM by David X Martin
Author:David X Martin [Martin, David X.]
Language: eng
Format: epub
ISBN: 9781000374759
Publisher: CRC Press
Published: 2021-02-13T12:41:53+00:00
The attackers demanded a mere $52,000 ransom payment, but when all was said and done, the full impact of the attack was projected to cost more than $17 million. Nearly $3 million alone was spent on contracts for emergency IT consultants and crisis management firms.
The Atlanta ransomware attack is a lesson in inadequate business continuity planning. The event revealed that the cityâs IT was woefully unprepared for the attack. Just two months earlier, an audit had found 1,500 to 2,000 vulnerabilities in the cityâs IT systems, which were compounded by âobsolete software and an IT culture driven by ad hoc or undocumented processes.â
That was an example of how bad CyRMâ leads to bad business. Now letâs look at a positive example of the interconnectedness. Research shows that 40 percent to 60 percent of small businesses never reopen their doors after a disaster. In August 2017, Hurricane Harvey slammed into Southeast Texas, ravaging homes and businesses across the region. Over the course of four days, some areas received more than forty inches of rain. By the time the storm cleared, it had caused more than $125 billion in damage.
Gaille Media, a small internet marketing agency, refused to be another small company shut down by disaster. Despite being located on the second floor of an office building, Gailleâs offices were flooded when Lake Houston overflowed. The flooding was so severe that nobody could enter the building for three months. The company never returned to the building, but its operations were hardly affected. Thatâs because Gaille kept most of its data stored in the cloud, which allowed staff to work remotely through the storm and after. Even with the office destroyed, they never lost access to their critical documents and records. In fact, when it came time to decide where to relocate, the owner ultimately decided to keep the company decentralized, allowing workers to continue working remotely. Had the company kept all its data stored at the office, the business may never have recovered. The COVID-19 pandemic has demonstrated that the virtual world is already upon us and that the ultimate winners will be the companies that enable it.
When it comes to corporate crises, the only thing people remember is the outcome. A good outcome is the result of a well-developed, disciplined process that demonstrates collective wisdom and commitment to corrective results.
The specific needs of an effective CyberWellnessâ and security program include: careful planning, smart delegation, and a system for monitoring complianceâall of which the board of directors should oversee. Long term, the board needs to understand and consider the strategic business implications of cybersecurity, foster the right corporate culture regarding security, and encourage the integration of CyRMâ practices into all governance and approval processes. Bottom line: a smart board of directors understands that cybersecurity is a management issueâânot just as a technical one.
Having an effective business cybersecurity strategy is so important that the SEC will soon mandate it. Now working its way through the Senate, the Cybersecurity Disclosure Act is a simple bill that will have a far-reaching effect.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7713)
Robo-Advisor with Python by Aki Ranin(7613)
Offensive Shellcode from Scratch by Rishalin Pillay(6097)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(5011)
Ego Is the Enemy by Ryan Holiday(4956)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
Python for ArcGIS Pro by Silas Toms Bill Parker(4174)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3878)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3615)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3285)
Speed Up Your Python with Rust by Maxwell Flitton(3231)
Liar's Poker by Michael Lewis(3221)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3195)
Extreme DAX by Michiel Rozema & Henk Vlootman(3169)
Agile Security Operations by Hinne Hettema(3122)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3108)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3083)
Cryptography Algorithms by Massimo Bertaccini(3001)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2982)
