The Seven Stages Of Cyber Resilience:

Data is the beating heart of every modern-day enterprise, from large corporations to small and medium-sized businesses. For many, data is by far the most valuable asset they own. If they lose access to their data due to a cyberattack or natural disaster, it can bring their operations to a screeching halt. For this reason, data resilience is now a critical necessity.

Resilient organisations have processes that enable them to quickly bounce back from any situation in which their data is compromised. But not every organisation is resilient. Most SMBs are not. A recent global survey by Arcserve revealed that only 23% of small and midsize organisations have mature data resilience strategies with associated goals they can use to track progress.

It is not ideal, but it is understandable. SMBs are often focused entirely on their day-to-day operations. They dedicate almost all their time to running their business, managing marketing and sales, serving customers, and staying on the right side of tax collectors. This focus limits their ability to handle additional tasks like cybersecurity.

Keeping the business running in real-time is their top priority.

SMBs know about cyber threats, but all too often, they think it’s just larger businesses in the crosshairs of attackers. But the truth is that threat actors are not selective based on industry or company size. They target every potential victim, regardless of how small or large it may be. SMBs are not immune to the threat of cyberattacks—and the sooner they realise it, the better off they’ll be.

The Seven Stages Of Cyber Resilience

The “seven stages of grief” refers to the psychological process individuals typically go through when experiencing profound loss or bereavement, including shock, denial, anger, bargaining, and depression.

Applying the “seven stages of grief” to SMBs dealing with data protection issues looks something like this:

1. Shock and Denial:    This is when the SMB first becomes aware of the potential risks to their data. They might be shocked to learn about the extent of the potential damage and the various threats. There might also be some denial, as they may initially find it hard to believe such threats could impact their business.

2. Pain and Guilt:    As SMBs begin to understand the gravity of the situation, they may feel pain over potential losses or damage to their business. They may also feel guilt, particularly if they have not taken data protection seriously in the past, which might have exposed their business to unnecessary risk.

3. Anger and Bargaining:    The SMB might feel anger towards the circumstances that have led to the data threats, such as cybercriminals or their past negligence. They may also start bargaining or looking for quick fixes to protect their data, which could lead to ineffective strategies.

4. Depression:    The realisation of the effort and resources required to protect their data effectively may lead to feelings of depression. The SMB may feel overwhelmed by the complexities of data protection and the potential impact of data loss on their business.

 5. Upward Turn:    As SMBs start to take concrete steps to improve their data resilience, things start to look up. They may begin to see that, although the process is complex, it is manageable and within their capabilities. The first step, for instance, is determining the critical operating systems. There are those that, if compromised, will cause a minor disruption. Then some will halt the entire business, perhaps ending it entirely. The SMB can start by determining where their critical data is stored and which systems are needed for their business to function effectively.

6. Reconstruction and Working Through:    During this stage, the SMB is actively working on its data protection strategies. They are implementing new measures, improving their systems, training their staff, and generally doing the work needed to improve data resilience. For instance, the SMB can beef up its backup and recovery processes by storing data copies in separate locations to mitigate data loss from events like a cyberattack. They can also implement immutable data storage, which safeguards information by taking snapshots every 90 seconds. So even if ransomware does sneak through and data is overwritten, the information will still be easily recoverable to a recent point in time.

7. Acceptance and Hope:    Finally, the SMB accepts the importance of data resilience and the effort required to achieve it. When the proper controls and alerts are in place, the SMB is in a much better position to prevent unauthorised access and remedy unexpected incidents. They also have hope for the future, knowing they are better prepared to handle data threats and recover from potential data loss. 

The Value Of A Service Provider

Due to a lack of resources, many SMBs focus almost entirely on their day-to-day operations. For many, that’s a necessity. It is why it makes sense for SMBs to collaborate with a specialised service provider with expertise in data backup, cybersecurity, and data resilience. 

Partnering with a service provider that knows best practices and works with best-in-class vendors will complement your SMB’s IT knowledge and ensure a solid and effective data resilience plan. This proactive approach is crucial, as you may not even know all regulations you must follow.

Engaging a service provider ensures that you’ll be informed and compliant.

Cost and affordability are, of course, significant concerns for SMBs. While larger organizations can dedicate personnel or entire departments to cybersecurity and data backup roles, that’s often out of the question for SMBs. But by working with a service provider, your SMB can cost-effectively access the practices and expertise you need.

This partnership lets you focus on your core operations and growth while entrusting resilience and recovery strategies to a knowledgeable professional.

Considering the stakes involved, allocating a budget to data resiliency is crucial, even if it’s a modest amount. Service providers and specialised vendors now offer solutions that enable SMBs to start small and scale as their business grows. It’s not necessarily a massive upfront investment. Tools and practices allow you to establish a solid and updated resilience plan with a smaller footprint, ensuring you’re well-prepared for potential incidents at a price you can afford.

Richard Massey is Vice President of Sales, EMEA, at Arcserve 

You Might Also Read:

Always-On Protection Using Immutable Storage:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« How To Back Up GitLab To Prevent Data Loss 
Thousands Of WordPress Sites Exposed  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

SureVine

SureVine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

Sanderson Recruitment

Sanderson Recruitment

Sanderson is a recruitment company providing expert recruitment services in areas including Cyber & Information Security.

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

Improsec

Improsec

Improsec is a fully independent Cyber Security advisory company - we provide knowledge, experience and both strategic and deep technical expertise to our clients.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

SecureLayer7

SecureLayer7

SecureLayer7 is an international provider of integrated business information security solutions with an innovative approach to IT security.

Talion

Talion

Talion aim to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

Vanta

Vanta

Vanta helps companies scale security practices and automate compliance for the industry’s most sought after standards - SOC 2, ISO 27001, HIPAA, GDPR, and other security and privacy frameworks.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.