Personal data and data analytics on online transactions provide companies with insights that can benefit their business, but requires those organizations to manipulate and store personal and sensitive information. This information typically belongs to their customers, partners and even employees and needs to be protected. Developing a cybersecurity incident response plan and deploying a system that can automate it for convenience is key for organizations dealing with this critical information in order to protect their own business secrets as well as their customers’ private information.
SkyFlok provides your business with the ability to sync and backup your and your customer’s data by uploading it to multiple Cloud storage services and locations of your choice. SkyFlok provides a combination of standard encryption and a new patented technology to spread data across the Cloud providers so that no single provider has enough information to recover a file (nor parts of the file). SkyFlok also preserves all previous file versions, which means that you can always go back to a previous version of your files seamlessly, whether or not there was a corruption of the latest version in your computer. This provides you with a plan in case of file corruption, internal attempts to tamper with the data, external attacks, or access/analysis of your data from traditional Cloud providers.
A study that was conducted by Ponemon Institute and sponsored by IBM Resilient and found that 77 percent of respondents admit they do not have a formal cyber security incident response plan. About half of the 2,800 respondents reported that they didn’t even have an informal response plan.
What does this mean? It means that if they are hacked, or held hostage by ransomware, they are likely to just run around in circles versus solving the problem.
Most enterprises operate on silos, and even core IT systems have boundaries that are set by politics and budgets. So, the lack of a master plan is often the result of that siloed approach.
Central IT should have the ability to create a security plan, including planned responses to breaches. However, lacking funding or sheer will, they often don’t. This includes the use of public cloud as well as traditional on-premises systems.
The public cloud is quite safe for what the providers do and manage. But those public cloud providers expect you to use the right mechanisms to secure your cloud-based workloads and data—which are still vulnerable to attack via your on-premises systems and through good old-fashioned hacking methods, from phishing to keylogging.
You need to make sure your assets in and access to the cloud are locked up properly.
I’m not a big fan of overplanning, but you should have at least a rudimentary plan in place to deal with attacks, both attempted and succesful ones. Trying to react to breaches on the fly only means more mistakes will be made in the panic—mistakes that could actually kill the business.
In the case of cloud computing, this means ensuring that there is redundancy of both processing and data. So, if anything is damaged (or ransomed), you can get up and running quickly as a first matter of response.
It also means having predefined procedures to recover from breaches, including communications and countermeasures defined in terms of the attack vectors and their appropriate responses.
The good news is that there are automated systems that can help you determine the right security responses to breaches, ransom, and other damage, and they can even be kicked off automatically.
Don’t wait for the last minute. Each response should be planned ahead of time and be well-defined. Trust me: The alternative sucks.
Click here to view the original web page at www.infoworld.com