ARTICLE
6 Stages of a Crisis

And getting your business through it: Cyber Security Edition

Read the article

Share this story

Read Time: 2 minutes

Without being alarmist, the reality is the current situation’s creating a perfect storm for cybercriminals.

Globally, there’s never been a better time to take advantage of cyber security vulnerabilities while overstretched IT teams are looking the other way.  Contrary to popular belief, Fraudsters don’t just go after the big guy’s, they go after what’s easy.

Here we aim to outline the different stages of a crisis and the minimum steps you need to consider from a cyber security perspective to ensure one crisis doesn’t lead to another.

Business Un Usual

Firstly, the positive conclusion is we’re going to get through it.  The decisions successful businesses make now will have an impact on how great their recovery will be and how long it will take.

Today, we’d say we’re at the planning stage, with businesses working out what the landscape looks like and what they need to do to ensure business continuity.

As we all know, the primary factor resulting from the crisis is ’Social Distancing’ which requires everyone to still able to work should do so at home.  Almost overnight, home working has become the nationwide norm.  IT teams have done a sterling job covering a great deal of ground in a short period of time to keep their businesses functioning.

Stabilising the Security Landscape

Once this intense set up period is completed, businesses must consider how to maintain their businesses through the Management and Resolution stages. Key here is to ensure it’s protected from any additional threats that could disrupt what is already a delicate balance between continuity and failure. Standard cyber security practice is even more crucial to this balance than ever before.

You can’t Protect What you Can’t See

Right now, businesses need visibility of exactly what’s going on in their network.  If they can’t see it, they can’t protect themselves from it. 

Already cyber security teams are reporting an upsurge in rogue activity which occurs when legacy firewalls are neglected or badly configured, over-reliance on anti-virus, or there’s a lack of attention to what staff are plugging into the network.

Yet there’s a balance to strike.  We understand setting up numerous home workers is an unplanned expenditure and funds from other much needed projects will most likely have been diverted.

Be in Control and Keep Recovery on Track

Because of this, we are using our relationship with a leading cyber security vendor to offer a remote visibility assessment on a 3-month trial so they can see what’s going on across these new and diverse remote networks.

Our aim is to help keep business Recovery on track.  It’s right for everyone.  The last thing any business needs right now is damage to brand reputation caused by data loss or system downtime, or fines for non-compliance.

User Rating
Rate the Article

Click the link below to rate this article

Rate this article
Have you also seen...
Test your Email Security Now

This tool tests if your email server is correctly configured to stop common threats.

Learn more
Remote working ‘Must Have' Technologies

90 days no cost, no commitment, no fuss technology deals for remote working quick wins

Learn more
Bright Security - Web Application Security: Top Threats and 6 Defensive Methods

Top Threats and 6 Defensive Methods

Learn more
Teams: the one-stop IT app

The one-stop IT app

Learn more
AppJacking

Mitigating risk from endpoint apps

Learn more
Cloud Technology Skills Shortages

Find help fast!

Learn more
About Libraesva

An email content gateway solution ESVA – Email Security Virtual Appliance – won the Computing Security Award as ‘Antispam of the Year’ solution 2014-2016

It was recognised by the prestigious Virus Bulletin as one of the best and effective systems of protection and analysis of email content, Libra ESVA was selected by Securefort to address email security in the SMB sector.

Learn more
You can’t protect what you can't see!

30 days no cost, no commitment, no fuss technology deals for remote working quick wins:

Learn more

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Other articles in this category
Risk Visibility
+
When Office 365 isn’t Secure Enough

When Office 365 isn't secure enough

Thursday, May 07, 2020
+
Is Your Network Secure?

You can’t protect what you can’t see

Friday, May 01, 2020
+
UK and US governments warn on the risks of VPN’s

Alarm bells should be ringing with cyber security teams following recent guidance issued by both UK and US government security experts.

Monday, May 18, 2020
+
Digital Transformation or Digital Disaster

Before Covid 19, many SMB’s and mid sized enterprises were embarking on a journey to workplace automation and a world of greater performance, flexibility and control

Monday, May 18, 2020
+
The threat from within

With more employees now working from home, the risk of breaches has grown exponentially.

Tuesday, June 02, 2020
+
Hackers aren’t Heroes

Some think that hackers are "cool" and that their spirit of mischief and sneaking is admirable.

Wednesday, July 15, 2020
+
Half Full

50% of IT leaders don’t know if their cyber security is working

Friday, May 01, 2020
+
An awful lot of pain

Any business feels the pain

Friday, May 01, 2020
Interested in what you see? Get in touch, and let's start a conversation Get in touch