Resiliency & Recovery

It is not if but when! Understanding how to bounce back and recover.

How cyber resilience works

Cyber resilience and cyber security may sound similar, but there’s a difference.

Think of cyber security as the all-around approach to safeguarding your system and cyber resilience as the ability to anticipate and respond to threats if they do enter your system.

The threats can be hackers or just an inadvertent mistake, but the resilience helps your system bounce back and keep operating or resume operating as soon as possible.

Rather than let a hacker cost a company millions of dollars, leaders can use resilience to minimize or avoid losses and to keep the business system working.


Cyber resilience includes ways to prepare, avert, respond and adapt to adverse impacts on your IT and related systems.

The best approach is to establish alternate methods to keep operating while working to repair a damaged or inoperative system.

The National Institute of Standards and Technology, for example, outlines more than a dozen steps a firm can take to help it cope with an adverse incident.

Among the steps:

  • Watch for signs of a pending adverse incident.
  • Respond quickly.
  • Install multiple obstacles to deter intruders.
  • Hide key assets from hackers, diversify the system and restrict access.
  • Change processes “randomly and unexpectedly” to thwart unwanted intruders.

In my experience, cyber resilience works best if a company is aggressive, energetic and innovative in protecting its system.



Other Posts you might like...

All You Need to Know About Least Privilege
In IT, the principle of least privilege (PoLP) refers to the concept that any process, program or user must be...
Supply Chain Security: How to Avoid Being Downstream from Dysentery
Bleeding into the River On November 26th,1 Ongoing Operations, a major managed IT service provider for multiple credit unions, was...
Data Privacy Versus Data Security: A Closer Look
The importance of data privacy and data security has grown exponentially as organizations today collect and store more information than...
5 Ways to Combine Compliance & Cybersecurity
Compliance and security are equally crucial for the seamless operation of your business. Although security is a prime component of...