Rethinking Disaster Recovery
- Date:December 16, 2020
- Author(s):
- Tracy (Kitten) Goldberg
- Report Details: 15 pages, 9 graphics
- Research Topic(s):
- Cybersecurity
- Fraud & Security
- PAID CONTENT
Overview
Disaster recovery plans must encompass strategies that outline the deployment of critical resources to maintain continual network and database availability. While financial services companies focus most of their disaster-recovery and business-continuity planning around responses to natural disasters, the losses associated with cyberattacks have the potential to cost institutions much more than a natural disaster. Businesses today face significant threats regarding ransomware, distributed-denial-of-service (DDoS) attacks, and employee negligence that places the stability of the enterprise in jeopardy when adequate provisions for recovery are not made.
This report reviews the challenges that financial services companies experience from a technological and organizational point of view, with an emphasis on recommendations to minimize the adverse impacts of restoring normal business continuity after a disaster.
Key questions discussed in this report:
- What unique cybersecurity risks do organizations face when they continue to rely solely on physical data centers for data backup?
- How are organizational structures weakened by siloed departments?
- What can cybersecurity professionals do to reduce their risks by revisiting and revising their business-continuity and disaster-recovery plans?
Methodology
The data in this report was primarily collected from a survey of 506 cybersecurity leaders conducted in May 2020.
Book a Meeting with the Author
Related content
Data Transparency in the Age of Cyber and Privacy Risk
As open banking and new privacy regulations accelerate, financial institutions face rising pressure to enhance privacy and cybersecurity transparency to strengthen consumer trust. ...
Quishing and the Resurgence of BYOD Cyber-Attack Exposure
North Korean attackers’ latest efforts to target foreign policy experts through a technique known as quishing expose long-standing bring-your-own-device vulnerabilities that U.S. o...
SMS Blasters: An Expanding Frontier in Smishing Attacks
Cybercriminals use SMS/text blasters in smishing attacks, sending a wide range of fraudulent messages. By mimicking legitimate cell towers, SMS/text blasters bypass carrier-level p...
Make informed decisions in a digital financial world