{"id":29889,"date":"2020-04-28T10:41:16","date_gmt":"2020-04-28T16:41:16","guid":{"rendered":"https://www.webroot.com/blog/?p=29889"},"modified":"2020-06-24T13:32:02","modified_gmt":"2020-06-24T19:32:02","slug":"5-ways-to-improve-business-cyber-resilience","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/04\/28\/5-ways-to-improve-business-cyber-resilience\/","title":{"rendered":"5 Ways to Improve Business Cyber-Resilience"},"content":{"rendered":"\n<p>A popular military maxim speaks to the need for redundancy and\nit goes like this: \u201cTwo is one and one is none.\u201d Redundancy is also a key\nprinciple when it comes to cyber-resilience. A popular rule in data protection and\ndisaster recovery is called the <a href=\"https:\/\/www.carbonite.com\/blog\/article\/2016\/01\/what-is-3-2-1-backup\/?_t_id=7Eev_065vddB2Ylsxru4tw%3d%3d&amp;_t_uuid=Hp_JTt5WRiWgsW_RR-izcw&amp;_t_q=3-2-1+backup&amp;_t_tags=language:en,siteid:2b7ea699-6127-40c2-a137-36076a55ca93,andquerymatch&amp;_t_hit.id=Carbonite_UberCarb_Web_Models_PageTypes_BlogNews_BlogPostPage\/_193ec87c-7634-4fd9-a9b6-83e8e36fda30_en&amp;_t_hit.pos=2\">3-2-1\nbackup rule<\/a>. IT pros often borrow from military strategies when approaching\ncyber-resilience, including a strategy known as \u201cdefense in depth.\u201d<\/p>\n\n\n\n<p>Defense in depth is a useful framework for protecting IT environments. It acknowledges that hackers will often use evasive tactics or brute force to overrun the outer-most layer of defense. So, multiple layers of defense are necessary \u2013 or defense in depth \u2013 to anticipate and mitigate lost ground. Cyber-resilience is a very high priority for businesses. So, we put together these five tips for improving <a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/glossary\/what-is-cyber-resilience\">cyber-resilience<\/a> based on a defense-in-depth approach.<\/p>\n\n\n\n<h3>Tip #1: Sharpen perimeter defenses<\/h3>\n\n\n\n<p>Cybercriminals are getting better at using evasive tactics\nto circumvent company firewalls and antivirus. Some of these evasive tactics\ninclude file-based, file-less, obfuscated and encrypted script attacks. To\ncounter these tactics, we\u2019re rolling out a new shield technology to detect,\nblock and remediate evasive attacks much faster and more effectively than\nbefore. <a href=\"https:\/\/community.webroot.com\/general-security-information-102\/evasion-shield-faq-342813\">Webroot\u00ae\nEvasion Shield<\/a> stops attacks that elude other endpoint protection\nsolutions. Cloud-based threat intelligence further increases resilience at the\nperimeter. <\/p>\n\n\n\n<h3>Tip #2: Strengthen the first line of defense \u2013 people<\/h3>\n\n\n\n<p>The primary vector for malware distribution is <a href=\"https:\/\/www.webroot.com\/blog\/2020\/04\/16\/whats-behind-the-surge-in-phishing-sites-three-theories\/\">phishing\nattacks<\/a>. While cybercriminals find increasingly deceptive ways to trick\nemployees into downloading malicious code, not enough businesses are countering\nby educating their workforces about identifying suspicious activity. With\nemployees being the weakest link in the cyber-security chain, the solution is regular\n<a href=\"https:\/\/www.webroot.com\/us\/en\/business\/security-awareness\">security\nawareness training<\/a>, with phishing simulations and courses on best practices\nfor identifying and reporting suspicious activity.<\/p>\n\n\n\n<h3>Tip #3: Secure your DNS connection<\/h3>\n\n\n\n<p>The domain name system (DNS) is what allows internet traffic\nto find your website. But DNS protocols were not designed for security. In\nfact, they\u2019re highly vulnerable to cyberattacks, including cache poisoning,\nDDoS, DNS hijacking, botnets, Command-and-Control (C&amp;C) and man-in-the-middle\nattacks. A <a href=\"https:\/\/www.webroot.com\/us\/en\/business\/dns-protection\">cloud-based\nDNS security solution<\/a> enables businesses to enforce web access policies and\nstop threats at the network\u2019s edge before they ever hit the network or\nendpoints.<\/p>\n\n\n\n<h3>Tip #4: Create and deploy a backup strategy&nbsp; <\/h3>\n\n\n\n<p>Redundancy is essential for cyber-resilience. Businesses must\nconsider a scenario where malware circumvents outer defenses. Since detecting\nand remediating malware infections can be time-consuming, it\u2019s important to\nhave copies of files and data for business continuity. <a href=\"https:\/\/www.carbonite.com\/data-protection\/endpoint-protection\">Scheduled\nbackup<\/a> with file versioning is necessary for mitigating malware infections\nand other forms of data loss. The scheduling feature is crucial since leaving\nit up to users exposes backup policy to human error.<\/p>\n\n\n\n<h3>Tip #5: Test recovery strategy regularly<\/h3>\n\n\n\n<p>Backup and recovery go hand-in-hand. And backup is only\neffective if it enables rapid recovery with minimal disruption. It\u2019s important\nto test disaster recovery practices and procedures before you experience a live\ndisaster scenario. Disasters come in different shapes and sizes, so it\u2019s\nimportant to test simple file and folder recovery as well as large-scale system\nrestore. Also, some systems are more critical than others. Tier-one systems (the\nmost critical) need high levels of uptime, approaching 100%. This traditionally\nrequires a secondary data center that is very costly to acquire and maintain.\nThis is no longer the case. <a href=\"https:\/\/www.carbonite.com\/products\/carbonite-recover\">Disaster recovery\nas a service<\/a> reduces the cost of standing up a secondary environment. It\nalso allows for frequent testing of disaster recovery protocols. Businesses\nshould test once a quarter \u2013 or at least once a year \u2013 to ensure systems are cyber-resilient\nwhen necessary.<\/p>\n\n\n\n<p>To get started on the road to cyber resilience, take a <a href=\"https:\/\/www.webroot.com\/us\/en\/business\/trials\">fee trial here<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>A popular military maxim speaks to the need for redundancy and it goes like this: \u201cTwo is one and one is none.\u201d Redundancy is also a key principle when it comes to cyber-resilience. A popular rule in data protection and disaster recovery is called the 3-2-1 backup rule. IT pros often borrow from military strategies [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":29891,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[25305],"yst_prominent_words":[3565,5451,4119,25549,3769,25547,25539,22551,22535,16159,25551,25541,3477,25545,14621,25553,25543,17067,11595,7533],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29889"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=29889"}],"version-history":[{"count":4,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29889\/revisions"}],"predecessor-version":[{"id":30087,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29889\/revisions\/30087"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/29891"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=29889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=29889"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=29889"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=29889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}