Protect, Detect, Respond and Recover: Mitigating the Risks of Cyber Security
The news headlines about cybersecurity threats and ransomware attacks seem to be a daily occurrence, both in IT industry news and in the mainstream media. And it’s scary.
Here are a few headlines from just this week:
- After the NSA hack: Cybersecurity in an even more vulnerable world
- ‘Massive’ Locky ransomware campaign targets hospitals
- Hackers Playground: Security lapse cited by 82% of firms
After reading these articles, or any of thousands like them, you can’t help but wonder if you are at risk and if you are really prepared? If you’re an IT professional or security officer, I’m sure these fill your daily news feed, but I’m also fairly sure someone on your executive, compliance or legal team has read them and forwarded them straight to the top of your inbox. Now what?
“Pretend you’ve already been attacked!” That was the advice from Will McNae of Microsoft in a recent webinar in which he and I discussed how organizations can prepare for an attack by improving their security. We explained how to minimize the impact of an attack by building a solid response and recovery plan (that includes backup).
In the CSA CloudBytes webinar, we also discuss specific use cases and solutions that can help organizations to better comply with the NIST Cybersecurity framework’s best practices of Protect, Detect, Respond and Recover.
Want to learn more? Watch the webinar today — it’s available on-demand.
Heading to Ignite next week?
Join Mat Hamlin, Spanning’s director of products, for his presentation,“Office 365 Backup & Recovery: Are you prepared?” on Wednesday, September 28th at 4pm in the Dell EMC booth (#801). Also, be sure to visit Spanning in Booth #2356.