Ad Code

Cybersecurity & Cyber Resilience: Together, Not One Without the Other | Technical Coder

Cybersecurity & Cyber Resilience: Together, Not One Without the Other

Cybersecurity & Cyber Resilience: Together, Not One Without the Other

Image from Pixabay.com 

We’re all familiar with the saying: “prevention is better than cure.”

That is true in many ways. The problem with the saying above is that most people only choose to see one part of it. That is the part that claims prevention is better. What we don't see is that prevention is not the only option.

There will be times when getting a cure will be a priority. That does not make it a bad case – unless you didn’t prepare for it.

That just about sums up the argument for having a cyber resilience plan on top of your basic cybersecurity practices.

Cybersecurity vs Cyber Resilience

We would love to say that these two are opposite sides of the same coin, but that will not be doing them justice.

Of course, they are sides of some coin; only not the same coin.

Where cybersecurity is more concerned with the prevention of the attack from happening, cyber resilience is asking the question of what to be done in case it happens.

Thus, cybersecurity can be defined as the steps employed by an entity to mitigate against threat actors looking to breach its networks and systems. For cyber resilience, we have a program targeted at identifying, managing, and recovering from breaches when they do happen.

The interesting part of cyber resilience is how it also incorporates preventing these threats from becoming fruitful in the first place. That is the point where it intersects with cybersecurity, so much that they can be discussed in the same breath.


Steps to a Solid Cybersecurity Plan

The assets under protection by an entity will not always be the same assets that another entity is concerned about. Thus, there are a lot of ways to go about cybersecurity.

That said, though, there are areas where every cybersecurity plan is the same. Those represent the basic protection that should be put in place at all times.


Secure your Network

Secure your Network
Image from Pixabay.com

Anytime we remember the casino that got hacked via the aquarium’s smart thermostat system, we remember that everything has to be locked down. A chain is only truly as strong as its weakest link.

Under network security, a few things that should not be traded for anything else are:

● Never connecting to unsecured Wi-Fi networks. Workers should be especially careful not to access sensitive data over public and free Wi-Fi connections.

● Do not connect any external devices to the internal network. They might be carrying malware waiting to infect another computer on the network or the hub itself.

● Install a VPN for the security of the network. This software encrypts the flow of internet traffic, preventing hackers from intercepting or hijacking them.

● Have a firewall around the network if possible. This keeps unauthorized data streams from entering into your internet space at all.


Secure your Computers

The network is just one part of the entire digital framework. The computers that you have on such a network completes the cycle.

Securing your computers is not exactly rocket science. Do these simple things to get started:

● Set strong and secure passwords for your computers. You can also get password managers to store these unique logins for better protection

● Never connect your computers/ external drives to untrusted computers

● At the same time, never allow connections from untrusted computers or storage devices

● Once you notice a breach on a computer, take it in for checks.

● Download anti-malware for your computers. Even if someone tried to install something on them, that should notify you

● Never leave your work computers unattended. Always keep them safely stored away when not in current use.


Secure your Software

Even if your business does not have software of its own, you will use software from other vendors on your computers. What you would use these pieces of software for, and what software you will use at all, is dependent on your kind of business.

No matter what software it is, you can get them locked down against cyber threats in the following ways:

● Never download software from untrusted sources. Your OS provider will usually have a dedicated app store where you can download/ buy most of the software that you need.

● For software not available online, only purchase from trusted sources and vendors.

● Do away with ‘mods’ and ‘cracks,’ even if they offer you juicy deals like not having to pay for otherwise premium software. Most developers use that to ship malware into unsuspecting victims’ computers.

● Always download and install software updates as soon as you get the notification for them. Developers will usually send out those updates to fix flaws in the system.

● Upgrade your device software as at when due also.


Consult an Expert

After going through all the above, bring in experts to evaluate your level of exposure to risks that you might not see coming.

There are security firms who are trained in pushing your systems to the limit like they were trying to breach you also. They could also integrate into your workforce to see where a human error might be the one to show you out.

Doing so allows you to see more specific areas of your business in need of protection than the basics above.


Implementing Cyber Resilience on Top 

Implementing Cyber Resilience on Top
image from Pixabay.com

As it is with cybersecurity, the cyber resilience needs of different entities are not the same. As varying as they might be, though, they share similar elements at different points.

Extracting those similarities, we have the following.


Identification of Assets

The unique definition of cyber resilience requires the program to identify the resources it would be protecting and managing.

Every entity has a lot of files, data, and other sensitive details that they are sitting on. While they do not plan on sharing all of those publicly anyway, some are not at a high risk of being leaked as others are. This is where the identification of the right assets comes to play.

Here, the most sensitive assets of the entity are isolated so that a better protection plan can be drawn up for them. That leads us to the next point.


Protection of Assets

Now that you know what is at risk of a breach, attention is turned to ensuring nothing of such happens.

A series of measures (even borrowed from the cybersecurity approach up there) can be deployed here to make the said assets safer.


Monitoring of Assets

That effective protection measures have been put in place does not give room for slacking.

Systems still have to be constantly monitored for signs of breaches. In the case of a Sony hack, this is where they failed the most. If they had identified that the hackers were in their systems long enough, the company would not have suffered the kind of data loss it did.

Constant monitoring of the assets for the sign of a breach also makes it possible to contain the problem without panic. At the initial level of a hack, even most hackers do not know what they are looking for yet. That makes it the best stage for keeping the sensitive files locked down before locking these threat actors out.



A solid cyber resilience plan focuses on ensuring normalcy in the least possible time without any slowdown in normal daily activities. This allows businesses to carry on as usual while recovering from a breach rather than having to shut down operations.

The recovery plan is also an insurance package against panic. Once there is a playbook of some sort, everyone knows where they have to be at every stage of the recovery process. Thus, that stage goes as smoothly as it is also effective.

Effective recovery also allows the entity to learn from its mistakes, beefing up against such levels of breaches from happening in the future.


Which Should You Do?

It seems that cybersecurity is now a thing of the past.

No matter how well the big firms plan against an attack, it seems to find a way of happening. Hackers are also getting extremely sophisticated in the various attempts they take to breaching their targets.

However, such a line of thinking will be wrong.

There is no single one-size-fits-all line of defense against cyber-attacks. Thus, it is better to combine the strengths of cyber resilience and cybersecurity programs for the best cyber protection success. With one model accounting for and patching up the error of the other, there is little left to chance there.

Every entity that is serious about the safety of its data and online file security will embrace both approaches in the current cyber landscape we find ourselves in. If there was also a good time to start, it would be right now.

Post a Comment