2022-11-21 00:00:00

Securitybackup|cyber|planning|ransomware|recovery|SME|social engineering

How does a small business recover from a cyber security incident?

The mantra of cyber security experts is that you shouldn't make plans thinking if you are hacked, but plan for recovery when you are hacked. Sure, according to studies and statistics it is practically inevitable that especially small organizations easily become victims of cybercrime. Consultancy company Accenture has estimated that one third of cyber attacks are aimed at small organizations. Only 14% of them have the means to survive a breach. Fortunately, an effective defense technique is not that difficult or expensive to adopt.

MIT (Massachusetts Institute of Technology) and OVHcloud (a cloud service and hosting provider) explored the risks of cyber attacks from the perspective of a small and midsize organization in a report called A new age of disaster recovery planning for SMEs. Let's take a look at the key lessons small organizations and home users can take away from the report.

  • Most small and midsize enterprises become cyber crime victims because of human error. Other studies specifically mention social engineering and phishing as the most effective methods that criminals use to break into computer systems.
  • At the end of 2021, midsize companies were 500% more likely to be attacked than two years earlier.
  • Once cybercriminals have managed to get access to a computer system, they may work days or even weeks silently collecting information, studying the system, and preparing for the actual attack.

According to the MIT and OVHcloud disaster recovery report, the principal solution is to take good care of backups. For a one person small business, it is easy, for a 100 person organization more complex, but it is doable and doesn't necessarily cost much. We did a recovery planning session for our small business a while ago, and managing backups was the most important action point for us.

The overall disaster recovery plan for any type of organization is meaningless if there is no data to restore. Once the backup plan is ready and tested, the overall recovery planning can be put together.

The MIT and OVHcloud report recommends 3-2-1 backup strategy. It means having:

  • Three copies of all data.
  • Two copies on different types of storage device as the original.
  • One of these copies is stored off site, maybe in a cloud storage or in another safe place.

Additionally, the report, as well as some cloud storage providers, recommend having two off-site copies if you want extra insurance (it is known as 3-3-2 or 3-2-2). The objective is - in an unfortunate case of successful cyber attack - to make it practically impossible for ransomware criminals to destroy all backups.

Of course, it is a good idea to try and stop criminals at the gate and not let them in at all. Recent studies indicate that the most common method that hackers use for getting access to a computer system is social engineering. In addition to technology solutions, the human factor should be a priority in all cyber security planning.

News

2025-01-15 08:59:00

Not to mention travel – when real life experiences in a destination don’t match the expectations and everything that can go wrong, goes wrong. Well, that’s the beauty of #travel. #Europehttps://klaava.com/nitpickers-travel-journal-travel-lessons-learned-in-2024/


News

2025-01-11 13:25:00

A conclusion from the Traffic Scorecard 2024 results is it takes about double the time to drive along the streets of London (the most congested city in #Europe) than the streets of Munich, which is ranked the 21st most congested European city. #traffic #travelhttps://klaava.com/the-cities-in-europe-where-people-are-stuck-in-traffic-most-often/


A shop dedicated to tasty juice

2025-01-09 14:04:10

arihak

A shop dedicated to tasty juice


in the busy old town center.

2025-01-08 16:16:08

in the busy old town center.


News

2025-01-07 14:56:00

A reminder for keeping your data safe when traveling. Why? It is likely that you have to access your most critical data in risky situations on the road.https://cybernews.com/privacy/how-to-protect-your-sensitive-information-while-traveling/


News

2025-01-02 16:33:00

What about the scenery, you who are hurrying to the other side?#streetphotography#streetphoto


News

2025-01-01 16:06:00

According to a survey, third of travelers are victims of online booking scams. Since it is so convenient to make travel reservations online, that’s what we do. The problem is that we haven’t adopted new methods to avoid online scams. #travel #scamhttps://klaava.com/a-traveler-is-more-likely-to-get-scammed-when-booking-a-trip-than-being-robbed-in-a-destination/


Perhaps road builders had too much time?

2024-12-29 15:19:44

Perhaps road builders had too much time?


News

2024-12-27 18:25:00

#Photography is full of so-called “rules” that can feel overwhelming. However, some of these “rules” are downright myths.https://www.diyphotography.net/debunking-seven-common-myths-photographers-still-believe-in/


What should I read next?

2024-12-25 15:18:22

arihak

What should I read next?


News

2024-12-23 11:34:00

Since #EU #DMA has specified #Apple as a #gatekeeper in #mobile devices, EU considers Apple should implement several iOS connectivity features, predominantly used for and by connected devices. For instance, notifications, automatic Wi-Fi connection, AirPlay, AirDrop, or Bluetooth audio switching.https://digital-markets-act.ec.europa.eu/commission-seeks-feedback-measures-apple-should-take-ensure-interoperability-under-digital-markets-2024-12-19_en


News

2024-12-21 14:51:00

Smartphone users in the US are not impressed with the latest artificial intelligence features on their devices with 73 percent of Apple users and 87 percent of Samsung users unsatisfied, according to a new study. #phone #AIhttps://petapixel.com/2024/12/19/majority-of-smartphone-users-are-unimpressed-with-ai-features-study-finds/


There should be enough ice already to open the hotel

2024-12-20 16:40:17

There should be enough ice already to open the hotel


Hiking on a mountain experience: the end of an ancient tunnel

2024-12-09 14:12:31

arihak

Hiking on a mountain experience: the end of an ancient tunnel


on a hot summer day

2024-12-02 18:47:01

on a hot summer day


Cloudy day in a valley

2024-11-25 16:31:59

arihak

Cloudy day in a valley


In the shade of a lone palm tree

2024-11-25 15:46:29

In the shade of a lone palm tree


an abandoned town?

2024-11-07 18:35:22

an abandoned town?


A quiet moment between heavy rain

2024-10-24 17:34:45

A quiet moment between heavy rain


Everyone loves a pretty mountain scenery

2024-10-24 16:54:02

arihak

Everyone loves a pretty mountain scenery