Organisations are facing an uphill battle. The volume of cyberattacks has risen year-on-year, with a 38% increase in 2022 compared to the previous year.
By Deryck Mitchelson, field CISO at Check Point Software
In the UK alone, an organisation is being targeted on average 855 times per week over the last six months. Supply chain attacks continue to challenge organisations. Sero-day vulnerabilities are being uncovered daily, with the most recent prolific incident being the 3CX compromise found in March 2023.
The geopolitical landscape has never been more fractured in response to the Russo-Ukraine war, and ransomware has evolved beyond classic encryption to more sophisticated data extortion. All of this has created the perfect conditions for cybercriminals to thrive and for businesses to stay out of danger.
So what is the solution? In today’s interconnected world, where digital technologies play a vital role in business operations, organisations need a proactive and comprehensive approach to cybersecurity, one that goes beyond traditional preventative measures.
Enter cyber resilience: the ability of organisations to withstand, respond to, and recover from cyber incidents while maintaining essential operations and protecting critical assets. Cyber resilience is not just about dealing with threats, it’s about the board’s overall ability to make informed decisions on how to mitigate risk and ensure that data is protected. With such a tall order, the question is – where do you even begin?
Taking a risk-based view
Many organisations opt for widely recognised guidelines and standards as a starting point to establish a common framework for cybersecurity and risk analysis.
Two prominent tools are the National Institute of Standards and Technology (NIST) framework and the MITRE ATT&CK framework. These provide organisations with structured approaches to identify, protect, detect, respond to, and recover from cyber threats. By adhering to these frameworks, businesses can enhance their overall cybersecurity posture and strengthen their ability to withstand potential attacks.
To implement such frameworks effectively, organisations should first assess their current cybersecurity capabilities and identify any gaps or vulnerabilities. This will help determine which framework is most suitable for their needs. Next, they need to establish a dedicated team responsible for overseeing the implementation and ongoing management of the framework.
This team will map the framework’s controls and guidelines to the organisation’s existing infrastructure and processes, ensuring the framework is aligned with the specific requirements and risks the business faces.
In the European Union (EU), recent developments have also highlighted the growing emphasis on resilience. The EU’s Network and Information Security (NIS) Directive, implemented in 2018, requires organisations to adopt appropriate measures to ensure the security and resilience of their network and information systems.
Furthermore, the EU Cybersecurity Act, enacted in 2019, establishes a framework for the certification of cybersecurity products and services. These developments demonstrate the EU’s commitment to enhancing cybersecurity at both the organisational and regulatory levels.
The unfortunate truth is cybersecurity frameworks alone are no longer enough to protect organisations in a world where threats and data breaches are more than one-off occurrences. After all, cybercriminals do not care about frameworks – they care about breaking through a network’s defenses.
Robust, proactive, and preparatory work is needed to ensure that businesses can mitigate these threats, reduce their overall risk posture, and orchestrate rapid-response remediation when required.
Resilience: adopting a prevention-first approach
While traditional cybersecurity measures primarily focus on threat detection and mitigation, adopting a prevention-first approach is crucial when it comes to shoring up resilience.
Resilience refers to an organisation’s ability to not only detect and mitigate threats but have real-time visibility over their networks and the ability to anticipate threats and execute rapid-response measures that reduce or eliminate downtime.
Rather than solely relying on reactive measures, organisations need to proactively build robust defenses that can withstand potential attacks. This approach emphasises the importance of identifying vulnerabilities, implementing strong security controls, and continuously monitoring and improving security practices.
To effectively address the challenges of the digital age, organisations should embrace the three Cs and ensure their solution is comprehensive, consolidated, and collaborative.
Comprehensive security measures entail a holistic approach, encompassing all aspects of an organisation’s infrastructure, applications, and data. This includes implementing access controls, regular patching, and encryption protocols, among other measures.
Consolidation refers to the integration and centralisation of security tools and technologies. A study conducted by Check Point and Dimensional Research found that 49% of all organisations use between 6 and 40 point security products, while 98% of organisations manage their security products with multiple consoles, creating vulnerability gaps and visibility blind spots. By reducing the number of disparate solutions and unifying security operations, organisations can achieve greater visibility and control over their security landscape at a time when network footprints are rapidly expanding. This enables more efficient threat detection, response, and recovery processes.
Collaboration highlights the importance of taking a cohesive and joined-up approach to threat detection and mitigation. If one endpoint is compromised, all areas of the organisation – including its software supply chain – must mobilise from a security perspective to ensure the threat is contained and cannot spread laterally within the network or impact customer organisations as part of a supply chain attack. Real-time threat intelligence from enforcers, cyber analysts, and the broader cybersecurity community must also be pooled to ensure that the most up-to-date threat information is available to all.
Making cybersecurity more resilient
The concept of cyber resilience goes beyond traditional cybersecurity. It encompasses an organisation’s ability to withstand and recover from cyberattacks. While cybersecurity focuses on preventing and detecting attacks, resilience aims to build a fortified environment that can withstand potential threats. In essence, it involves building that automated barricade rather than relying on an under-resourced army to detect and respond to attacks.
Resilience acknowledges that no security system is perfect, and breaches can occur despite robust preventive measures. Therefore, organisations must focus on building redundancies, developing incident response plans, and establishing backup and recovery mechanisms to ensure business continuity even in the face of a successful attack.
The modern threat landscape requires businesses to go beyond traditional cybersecurity measures and embrace resilience as a critical component of their security strategies. By adopting a prevention-first approach, leveraging comprehensive, consolidated, and collaborative security measures, and understanding the importance of cyber resilience, organisations can better protect their assets and mitigate the potential impacts of cyber threats. As the digital landscape continues to evolve, businesses must stay vigilant, adapt to emerging challenges, and prioritise resilience above all else. After all, it is better to build your barricades before your army.