Resilient Digital environment

 Methods used to implement digital resilience

  • risk analysis of digital system's resilience by testing it against penetration testers/white hat hackers
  • planning for disruption scenarios such of data leaks or loss due to cyber criminals, or natural disasters
  • planning disaster recovery and conducting recovery exercises in case of said data leaks
  • documenting lessons learnt, how you can improve on your response for if it happens again, and how you can stop it from happening again
  • installing new software updates and new hardware in replace of older versions as newer systems patch bugs that can lead to security breaches
  • adding redundancy to systems, so if data is lost, it can be recovered as it will have a copy
  • device hardening (removing unneeded apps, ports and permissions) to stop people being able to plug in malicious hardware such as thumb drives with malware on them
  • maintaining effective backup systems, in the case of large scale data loss, it can all be recovered if stored elsewhere
  • staff training to teach staff how to be safe online, and how to handle data breaches
  • appropriate and reviewed standard operating procedures

Benefits of being digitally resilient

  • increased security of stored data and data transfers
  • increased reputation of the business as they are know to respond well to data breaches
  • lower service downtime leading to better customer reputation


Comments

Popular posts from this blog

ESP overview

Stakeholder roadmap

hw 12/5