Real World Risk Management Practical HR Resources
Are you a new user?


Why A Balanced Approach Of Response And Preparation Is Needed For Data Security

A recent global survey conducted by IT services firm, Netenrich, found that 83 percent of IT professionals say their organization would experience significant operational damage in the first 24 hours of a systems collapse.

According to the survey, about one third of respondents recognize that mitigating damage from a cyber outage requires a more proactive security strategy. They see a need and have a desire to improve system security with risk assessment, incident analysis, and threat modeling. However, they report spending most of their day on reactive tasks like keeping systems up to date, evaluating critical systems incidents, and identifying and correcting systems breach alerts that are actually false alarms.

Also, 67 percent of respondents say they currently focus on upgrading security tools, even though half say integrating those tools and finding expertise to manage them is a primary struggle.

To prevent substantial organizational damage, experts from Netenrich recommend that IT professionals focus more on assessing the business risk associated with a systems breach rather than on the technological mechanisms used to prevent a breach. "Survey Reports 83% of Companies Suffer Crippling Business Damage During the First 24 Hours of an IT Outage" (Oct. 28, 2021).


According to the source, more time is spent in response than in prevention. Organizations that find they are not able to divert resources for prevention should consider third-party assistance to develop a prevention and reaction plan in case of a breach.

Either way, organizations should seek a balanced approach of putting out the fires, but also finding a way to keep the fires from sparking or spreading.

To that point, creating and properly storing back-ups of critical systems and data is an invaluable tool to limiting business damage. Make sure your back-up data is stored on a server that is isolated from the network and safe from attack. Cloud-based back-ups are also an option, and typically result in a quicker and easier recovery process.

In addition, many employers can benefit from backing up data to an external drive or other hardware storage device as a way to prevent corruption or loss. The device can be stored offsite as added protection against fire or weather-related risks.

Once a full backup is complete, be sure to conduct incremental backups on a regular basis to limit the amount of data lost from one backup to the next.

Finally, your opinion is important to us. Please complete the opinion survey:

War In Ukraine And The Rise Of Destructive Malware

Organizations must implement best practices to protect their network from malicious code designed to destroy data. We look at prevention strategy sources.

read more

White Hat Hacker And Other Security Tips To Protect Your And Your Employees' Data

Although no system is impenetrable, you can mitigate your losses with help from a former cybercriminal. Learn why.

read more

Risk Assessments Necessary To Address Cyber Vulnerabilities

IT security experts discuss motivations and methods behind cybercrime. Understanding the risk specific to your organization is an important element in building your defenses.

read more

Does The "Metaverse" Present More Or Less Data And Other Risks

Organizations are scrambling to join the metaverse, and cybersecurity analysts suggest that in doing so, they may be opening up for more cyberattacks. Learn about the risk.

read more