Starting a business | promunim of india - promunim of india

    1. First, let's define cyber resilience. 

    Comparison of Cybersecurity and Cyber Resilience 
    The ability of a company to protect itself against cyberattacks is the main focus of cybersecurity. Cyber resilience is a broader concept that includes both security and business resilience, which includes developing an awareness-based culture and the capacity to bounce back from cyberattacks. 

    An effective cyber resilience plan should prioritize:

    Avoidance 
    Risk control, reaction, and recovery 
    Since prevention is sometimes preferable to treatment, all businesses should implement preventative measures. An online art retailer called RiseArt was successful in rerouting malicious traffic from a cyberattack in 2016. They maintained the availability of their services by exercising vigilance and employing proactive strategies. 

    The majority of cyberattacks can be avoided by following the fundamental procedures. Business resilience depends on the ability to recognize and address successful security breaches. 
     

    2. The Significance of Cyber Resilience 

    66% of small businesses have experienced cybercrime in the last two years, even though 93% of them have taken precautions to safeguard their operations from online threats. Those impacted have, on average, been victims four times during that time, costing each business a total of nearly £3,000. [The Small Business Federation] 

    There may also be fines for not taking basic precautions. More than 26,000 Boomerang Video customers' personal information was stolen in 2014. The company was fined £60,000 by the Information Commissioner's Office (ICO) for failing to take basic preventative measures. 

    My size prevents me from being attacked. 
    Contrary to popular belief, 38% of microbusinesses with two to nine employees had a cybersecurity breach or attack within the previous 12 months. [April 2017 Indian Government Cyber Security Breaches Survey] 

    The consequences of cyberattacks 
    All of the appointment data of a Scottish hair salon was lost in a hack that occurred in 2015. Even though you may believe that there is nothing valuable in your company that could be stolen, cyber breaches can harm it in other ways: 

    temporary denial of network or file access 
    Systems or software that are damaged or corrupted 
    Removal or slowdown of a website or online services 
    Permanent file loss can cripple your company. 
    Theft of money Changes, destruction, or theft of personal information   Intellectual property theft The Effect 
    Such breaches may have consequences beyond just financial ones: 
    Unable to operate as a commercial enterprise 
    Loss of a competitive edge 
    Reputational damage and intellectual property loss 

    3. Cybersecurity fundamentals 

    The Cyber Essentials scheme was created by the government and the cybersecurity industry to offer a foundation of fundamental measures that all organizations can build upon. 
    It serves two main purposes: 
    Give a concise explanation of the fundamental safeguards that businesses should put in place to reduce the risk of common online threats.
    enables businesses to show clients, investors, insurers, and others that they have taken these crucial precautions. 
    In collaboration with small and medium-sized businesses (SMEs), the Cyber Essentials program was created to be affordable, easy to use, and light-touch. Although 
    Although it greatly lessens an organization's susceptibility, it is not made to handle more sophisticated, focused attacks. 
    Organizations should evaluate the threat they face and add more security measures to their plan, just like they would with any other business risk. 
    Five essential controls for cyber essentials: 
    Devices called boundary firewalls and internet gateways are made to stop unauthorized access to or from private networks, but their full effectiveness depends on how well they are configured, either in terms of hardware or software. 
    Ensuring that systems are set up as securely as possible for the organization's requirements is known as secure configuration.
    Ensuring that only those who ought to have access to systems do so at the proper level is known as access control. 
    Malware protection: making sure that antivirus software is installed and up to date. 
    Patch management is making sure that all required vendor patches have been installed and that the most recent supported version of the applications is being used. 

    4. Controls of boundaries 

    Computers can communicate through more than 65,000 different "ports," or channels. A port that is left open can let someone else ask your computer to perform a malicious task. 
    Firewalls 
    One crucial safeguard that helps prevent attacks on your systems is a firewall. They behave similarly to traffic lights: 
    Red: Don't talk 
    Amber: restricted and filtered communication 
    Green: Talk 
    How Can I Help?
    Turn on the firewall and make sure all networks and devices are secure. 
    Set up the firewall to only permit essential communication and to block all ports other than those that are known to be in use. 
    Password-protect your firewall. 

    5. Secure configuration 

    In their default settings, computers and network devices might not always be secure.

    Weak points in standard ‘out of the box’ configurations may include:

    An admin account with a pre-set, publicly known default password 
    Pre-installed but unnecessary applications and services 
    User accounts with unique access settings that are pre-installed 
    Secure configuration is focused on limiting opportunities to attackers. 

    How Can I Help?
    Create an audit of systems your business uses 
    Decide who needs access to what systems, and limit access strictly to the user need 
    Use strong passwords 
    Disable unused accounts and services 
    Backup your data 

    6. Access control 

    Within your organization, every active user account facilitates access to devices and applications. Special privilege accounts have even more access; an exploited account could result in large-scale corruption of data and disruption to business processes. 

    You must understand who has access to your data and ensure the appropriate restrictions are in place for valuable assets and systems. 

    How Can I Help?
    Restrict access to valuable data and systems 
    Regularly check who has access 
    Give thorough checks on ‘privileged’ accounts that have more access than others 

    7. Anti-malware 

    Downloading software from the internet can expose a device to malware, such as computer viruses, worms, and spyware. Sources of malware include email attachments, downloads, and installation of unauthorized software.

    Antimalware scans your files, system, and email, searching for malicious content or behavior. If a system is infected with malware, your organization could experience malfunctioning systems or data loss. 

    How Can I Help?
    Deploy antivirus and malicious code checking solutions to continuously scan inbound and outbound objects 
    Deploy a content filtering capability on all external gateways, which will try to prevent malicious code being delivered to desktop applications 
    Only use software known to be trustworthy 
    Where possible, disable auto-run functionality, which should prevent the automatic import of malicious code 
    Scan every network component on a regular basis 
    Ensure all anti-malware software is kept up to date 

    8. Patching 

    Keeping systems up to date is essential, as hackers target older or vulnerable systems. Patch management is the process of managing system and software updates—including how and when they are kept updated, change control, and testing. 

    The WannaCry attack on the NHS in 2017 was due to vulnerabilities in computers that had not applied a recent patch update from Microsoft. 

    Once exploited, software was installed, which encrypted all user files and demanded payment for them to be unlocked.

    What Can I Do?
    Patch known vulnerabilities with the latest version of the software 
    Ensure the latest supported version of an application is used.

    9. Training staff and dealing with 3rd parties 

    Maintaining awareness of cyber risks within your organization ensures staff become a cyber asset. They will become less susceptible to vulnerabilities and be better able to detect malicious behavior—acting as the first line of defense for your organization. 
    Your staff should: 
    Be aware of good practice regarding passwords 
    Back up data regularly 
    Keep software up to date 
    Lock computer screens when away from desks 
    Realise the risk of conducting business on public Wi-Fi 
    Understand and follow the organisation’s cybersecurity policies 
    Educating staff should be an ongoing process as the cyber landscape shifts 
    Incident Management Team 
    When a cyber breach has been detected, the pressure will be on. It is critical that incident response roles are assigned to staff beforehand to ensure a swift response.
    Your Response Team: 
    Must possess the skills and knowledge required to respond to an incident 
    Have a team leader that determines when an incident has occurred 
    Should follow a clear procedure, using clear communication and coordination 
    Should ensure compliance with existing procedures 
    If weaknesses are found within, then action must be taken. In 2016, vulnerabilities were found in Tesco Bank’s mobile app. Despite being made aware of these issues, the company hadn’t taken immediate action.

    Eventually the vulnerabilities were exploited by hackers who stole £2.5 million in customer money. While the bank reimbursed customers, the revelation that Tesco Bank had not acted on known vulnerabilities was just as damaging for consumer trust. 

    10. Recovery 

    In the event of a successful cyber breach, a recovery plan is essential for your organization to be resilient. 

    Have a Plan 
    Planning is critical to determine crisis-management and incident-management roles 
    Arrangements should be made for alternate communication channels, services and facilities 
    Explore different “what if” scenarios to identify gaps in your organisation before an incident occurs 
    Exercise technical and non-technical aspects of recovery, such as personnel considerations or facility issues 
    Recovery planning is fluid and not a one-time activity. You should continually review and improve upon your procedures. This can be achieved through lessons learned and periodically validating the recovery capabilities themselves. 

    Use metrics to measure the effectiveness of the recovery process and determine if it was a success.

    Build a Recovery Playbook 
    Develop an inventory of all important information assets 
    Identify what has been impacted by the incident and check against inventory 
    Try to store configuration information to assist recovery 
    Ensure where possible there are backups 
    Keep everything maintained and up to date 
    Measure and track the performance of the protective steps taken.