A multi-vendor security technology approach is no longer enough – organisations require a robust framework of well defined and rehearsed processes to maximise response speed and effectiveness when technical defences are breached
The National Cyber Security Centre’s (NCSC) report; The Cyber Threat to UK Business 2017-2018, has highlighted the continually growing cyber-crime threat facing UK businesses. The last two years have demonstrated more than ever that the cyber security risk is real, and growing. The period will be remembered for the devastating WannaCry ransomware attack, massive data breaches, notably at Equifax, and exposure of the extent of the 2013 Yahoo and 2016 Uber breaches.
The outlook for 2019 and beyond indicates there will be no let up, as cyber criminals and state sponsored adversaries develop new, increasingly advanced and mechanised attack methods at a faster pace than defenders can develop effective countermeasures. Cyber criminals now execute these attacks following a sophisticated and structured approach, designed to maximise impact.
Whether large organisation or small, the threat is set to grow.
Organisations increasingly deploy an array of security products from multiple vendors to defend themselves against these attacks. The complexity of these multi-vendor security estates, combined with the well-structured and methodical approach of adversaries has heightened the need for an equally structured response plan which supports rapid implementation – the Critical Hour Framework.
Immediate execution of a structured plan in response to a cyber-attack can vastly reduce the response time and minimise the operational impact of an attack on an organisation.
Ultimately, a coherent and well executed response plan will reduce the cost and impact of an attack.