{"id":859,"date":"2021-12-22T15:04:30","date_gmt":"2021-12-22T15:04:30","guid":{"rendered":"https:\/\/nationalcrcgroup.co.uk\/?p=595"},"modified":"2021-12-22T15:04:30","modified_gmt":"2021-12-22T15:04:30","slug":"cyber-resilience-how-to-create-a-strong-plan-2","status":"publish","type":"post","link":"https:\/\/fatbuzzhosting.com\/ncrcg\/cyber-resilience-how-to-create-a-strong-plan-2\/","title":{"rendered":"Cyber Resilience: How to Create a Strong Plan"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/fatbuzzhosting.com\/ncrcgwp-content\/uploads\/2021\/12\/Nature_02-1-1024x434.png\" alt=\"\" class=\"wp-image-704\"\/><\/figure>\n\n\n\n<p>Whilst we are living in a technology centric society,&nbsp;it\u2019s&nbsp;unfortunate that we can never be 100% immune from a cyber-attack. We&nbsp;can,&nbsp;however, be prepared to deal&nbsp;with them for when they happen.&nbsp;Having a solid cyber resilience plan can vastly reduce the impact an attack has on your business and your customers.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Over the years,&nbsp;an&nbsp;ever-increasing&nbsp;number of&nbsp;businesses are investing their time into preparing strong and effective plans to deal with&nbsp;cybercrime, as well as implementing strong cyber security systems.&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;&nbsp;<\/p>\n\n\n\n<h2 class=\"has-large-font-size wp-block-heading\"><strong>Cyber Security vs Cyber Resilience&nbsp;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Cyber&nbsp;security acts as the wall that protects your system from hackers, but what is cyber resilience? Cyber resilience is the plan you implement when something gets around that wall.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The most important thing to remember when thinking about your cyber security and cyber resilience plans is that it should not be a case of picking which one you want to focus on \u2013 both are equally as important as each other. Having security does not guarantee a bullet proof system.&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h2 class=\"has-large-font-size wp-block-heading\"><strong>The&nbsp;Importance&nbsp;and&nbsp;Benefits of a Cyber Resilience Plan&nbsp;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Despite having protections in place in terms of cyber security,&nbsp;you need&nbsp;to assume that your business will be the&nbsp;aim&nbsp;of a&nbsp;cyber-attack, which is why cyber resilience strategies have grown in popularity over the&nbsp;last few years.<\/p>\n\n\n\n<p>Creating and implementing an effective action plan will provide numerous advantages to your organisation:&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\"><strong>&#8211;<\/strong> <strong>Integrity&nbsp;&nbsp;<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-left\">Having little to no cyber resilience plan can prove detrimental to your business and&nbsp;its&nbsp;integrity. With no solid blueprint in place, there&nbsp;is&nbsp;no telling the extent to which cyber criminals can affect your business and valued customers.&nbsp;&nbsp;<\/p>\n\n\n\n<p>A solid plan protects organisations from public criticism, loss of revenue, administrative fines, or even worse,&nbsp;business loss.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\"><strong>&#8211; Law&nbsp;<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Ensuring your organisation complies&nbsp;with legal frameworks and requirements that are in place to protect businesses and the public offers a valuable advantage towards your resilience action plan. Two of the most important legal structures to abide by are <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/caf\/nis-introduction\">Network and Information Systems Directive (NIS)<\/a><strong>&nbsp;<\/strong>and <a href=\"https:\/\/www.gov.uk\/government\/publications\/guide-to-the-general-data-protection-regulation\" target=\"_blank\" rel=\"noreferrer noopener\">General Data Protection Regulation (GDPR)<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>NIS requires organisations to take reasonable steps to ensure protection and to inform the relevant national authority of any&nbsp;serious incidents. GDPR is in place to protect citizen data privacy and to restructure and reinforce the way organisations handle data privacy.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\"><strong>&#8211; Enhancing System Protections&nbsp;<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Building a solid resilience plan can also provide essential cyber security protection. Advantages&nbsp;include&nbsp;building a solid IT governance strategy, enhancing&nbsp;safety&nbsp;and security around your sensitive and valuable assets, strengthening your data protection efforts&nbsp;and&nbsp;preventing natural disaster impacts.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\"><strong>&#8211; Trust<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Building a strong resilience plan has numerous advantages for your clients and vendors too. Enforcing your plan will ensure that their sensitive data is stored in the appropriate manner and, in turn, will ensure strong foundations in which trust is built between professional relationships.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Having clients and vendors that trust you to manage their data appropriately will also provide your organisation with a strong reputation.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\"><strong>&#8211; Improving Work Culture&nbsp;<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Creating culture in your organisation that strives for total data protection will vastly reduce the likelihood of sensitive (and potentially confidential) information falling into the wrong hands.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\">&#8211; <strong>Reducing Losses<\/strong>&nbsp;<\/h3>\n\n\n\n<p>As painful as it may be, no company is immune to a cyber-attack, regardless of how strong their cyber security is. Estimates say that SMEs can lose around \u00a3100,000 as a direct result of a data breach, and that figure rises to around \u00a31 million for large corporations.&nbsp;&nbsp;<\/p>\n\n\n\n<p>A successful security breach on your own&nbsp;organisation&nbsp;can also harm other&nbsp;organisations&nbsp;of the same and\/or similar industries, as public trust is likely to fall.&nbsp;It&nbsp;is&nbsp;also&nbsp;possible that organisations&nbsp;that fall within your supply chain&nbsp;are damaged in your attack due to&nbsp;sharing sensitive data and systems.&nbsp;&nbsp;<\/p>\n\n\n\n<p>When you have a cyber resilience plan in place however, this will reduce the overall impact the attack has on your company, including, but not limited to, financial loss.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h2 class=\"has-large-font-size wp-block-heading\"><strong>The Step-By-Step to Creating a Cyber Resilience Plan <\/strong><\/h2>\n\n\n\n<p>Preparing&nbsp;for&nbsp;and expecting an attack, is one of the most crucial steps you can take to protect yourself, your organisation,&nbsp;and your clients. These cyber resilience tips will help you build a stronger cyber resilience plan.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\"><strong>Step 1:&nbsp;How to Prepare for a&nbsp;Cyber&nbsp;Attack<\/strong>&nbsp;<\/h3>\n\n\n\n<p>One of the first steps you need to take when creating a cyber resilience plan is to identify electronic information that is crucial to the operations of your organisation. This includes&nbsp;items such as contact details, emails, calendars and important\/confidential documents. Find out where this information&nbsp;is&nbsp;stored and then take steps to make&nbsp;backup&nbsp;copies daily\/weekly, on an external&nbsp;hard drive for example, and then regularly test that the&nbsp;backup&nbsp;is in working order to ensure the information can be restored from it. It\u2019s worth nominating a second or third person to be in charge of backing up these documents when the first isn\u2019t available.&nbsp;<\/p>\n\n\n\n<p>Have a think about what you can do to minimise reputational deterioration. What key stakeholders would it be imperative to inform about an attack on your organisation? Building strong and trustworthy relationships with these people will make things a lot smoother should an incident occur.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Creating a list of key stakeholders that you would need to contact for different types of incidents will ensure every appropriate person is made aware. Has payment data been compromised or stolen? Customers and banks need to know. The <a href=\"https:\/\/ico.org.uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Information Commissioner&#8217;s Office (ICO)<\/a> also need to be made aware. Corporate accounts attacked? Suppliers should be contacted in this case.&nbsp;<\/p>\n\n\n\n<p>Have you also got the most up to date contact information for not only the people above, but those who you would need to contact to help&nbsp;identify&nbsp;an attack? Your web hosting provider, IT support and cloud services provider, for example.&nbsp;Ensure your contract explicitly details to what extent they&nbsp;can&nbsp;assist you and at what point you should be contacting them.&nbsp;It\u2019s also important to ensure you are regularly checking these contact details every couple of months so that they are up to date.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Providing effective staff training is also an extremely important step to ensuring a strong resilience plan. Try creating a bank of potential incidents and test&nbsp;them&nbsp;on how they would react to each. This is a great to way to create initial plans before testing your&nbsp;staff, and then also&nbsp;have the opportunity to&nbsp;develop and evolve the plans once the training takes place and more people have the ability to offer their expertise and ideas.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Regional Cyber Resilience Centres (CRCs) have been established up and down the United Kingdom to provide invaluable information about how you can prepare for a cyber attack and build a strong cyber resilience plan. Find your nearest Cyber Resilience Centre <a href=\"https:\/\/fatbuzzhosting.com\/ncrcgregional-centres\/\">here<\/a>. <\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\"><strong>Step 2:&nbsp;Identify What Type of Breach You Have Suffered<\/strong>&nbsp;<\/h3>\n\n\n\n<p>When it comes to dealing with a&nbsp;cyber-attack, the first thing you need to do is&nbsp;identify&nbsp;that one has taken place&nbsp;or is still ongoing.&nbsp;<\/p>\n\n\n\n<p>Are your computers running&nbsp;on the slow side? Perhaps people are being mysteriously locked out of their accounts or are unable to access documents? You may see a frightening message demanding a ransom for the release of your files or customers may also be contacting you to inform you that they are receiving strange emails coming from your domain? Are your internet searches being redirected, or seeing requests for unauthorised payments? All of these are signs of a cyber-attack, and you should be taking&nbsp;instant&nbsp;action to find out what has happened.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>10 Crucial Questions You Need to Ask Yourself<\/strong>&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>What problem has been reported and by who?&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li>What services, programs and\/or hardware aren\u2019t working?&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li>Are there any signs that data has been lost?&nbsp;You may have received ransom requested and\/or have noticed your data has been posted on the internet.&nbsp;&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li>What information (if any) has been disclosed to unauthorised parties, deleted or corrupted?&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li>Have your customers noticed any problems? Can&nbsp;they&nbsp;use your services?&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\"><li>Who designed the affected system and who maintains it?&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\"><li>When did the problem occur or first come to your attention?&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"8\"><li>What is the scope of the problem&nbsp;and what areas of the organisation are affected?&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"9\"><li>Have there been any signs as to whether the problem has occurred internally within your organisation or externally through your supply chain?&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"10\"><li>What is the potential business impact of the incident?&nbsp;&nbsp;<\/li><\/ol>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\"><strong>Step 3:&nbsp;Resolve the Incident<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Do you manage your IT&nbsp;internally? Now is the time to action your&nbsp;incident&nbsp;plan that you created in Step 1, depending on the nature of the incident, you may want to: replace infected hardware, restore services through backups, patching software, clean infected machines and\/or change passwords.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Is your IT managed externally? Get in contact with them immediately as they are there to help you, fix the problem and confirm the impact the attack has had on your organisation.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\"><strong>Step 4: Reporting to Wider Stakeholders<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Once&nbsp;a&nbsp;circumstance has been resolved, you will more than likely be required to formally report to internal and external stakeholders. Legally, there are certain instances that you are required to report to the <a href=\"https:\/\/ico.org.uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Information Commissioner\u2019s Office (ICO)<\/a>, even if your IT is done externally.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Its important to remember that a cyber attack is a crime and should always be reported to law enforcement. This is strongly encouraged as many go unreported, mainly due to personal and professional embarrassment, but&nbsp;by&nbsp;reporting these incidents,&nbsp;it\u2019s&nbsp;possible a similar attack has taken place on someone else. The more attacks that are reported, the more likely the perpetrators will be prosecuted accordingly.&nbsp;&nbsp;<\/p>\n\n\n\n<p>It\u2019s&nbsp;important&nbsp;to keep staff and customers informed and updated of anything that might affect them, most notably if their personal data has been breached.&nbsp;You also may want to consider seeking legal advice if the attack has had a significant impact on your business and\/or customers.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\"><strong>Step 5: Learn From the Attack<\/strong>&nbsp;<\/h3>\n\n\n\n<p>After the attack has been resolved, this is a good opportunity to review the strengths and weaknesses of your response. Make a list of things that went well and things that can be improved on. Implement these into your staff training to ensure&nbsp;everyone is up to date on your new strategies.&nbsp;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">&#8211;<\/p>\n\n\n\n<h2 class=\"has-large-font-size wp-block-heading\"><strong>How Can&nbsp;the NCRCG&nbsp;Help?<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Offering assistance to&nbsp;those with internal IT teams, and those seeking to outsource their IT, the&nbsp;9 regional Cyber Resilience Centres we support&nbsp;are here to help businesses and&nbsp;organisations&nbsp;throughout the country.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Contact us today to find out how we help you&nbsp;strengthen your&nbsp;security systems and&nbsp;plans for cyber resilience.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-25 has-custom-font-size is-style-outline has-medium-font-size is-style-outline--1\"><a class=\"wp-block-button__link has-black-color has-white-background-color has-text-color has-background no-border-radius\" href=\"\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us <\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>How can you build a strong cyber resilience plan?<\/p>\n","protected":false},"author":3,"featured_media":2183,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,29,20,13,14],"tags":[25,23,28,24,22,27,26],"class_list":["post-859","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attack","category-cyber-essentials","category-cyber-resilience","category-cyber-security","category-smes","tag-crc","tag-cyber-resilience","tag-cyber-resilience-centre","tag-cyber-resilience-plan","tag-cyber-security","tag-national-cyber-resilience-centre-group","tag-ncrcg"],"acf":[],"_links":{"self":[{"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/posts\/859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/comments?post=859"}],"version-history":[{"count":0,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/posts\/859\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/media\/2183"}],"wp:attachment":[{"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/media?parent=859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/categories?post=859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/tags?post=859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}