{"id":31641,"date":"2022-02-24T17:42:42","date_gmt":"2022-02-25T00:42:42","guid":{"rendered":"https://www.webroot.com/blog/?p=31641"},"modified":"2022-02-24T18:06:46","modified_gmt":"2022-02-25T01:06:46","slug":"protect-from-cyberattacks-with-these-6-steps-for-cyber-resilience","status":"publish","type":"post","link":"https://www.webroot.com/blog/2022\/02\/24\/protect-from-cyberattacks-with-these-6-steps-for-cyber-resilience\/","title":{"rendered":"Protect From Cyberattacks With These 6 Steps For Cyber Resilience"},"content":{"rendered":"\n<p><strong>Making the case<\/strong><\/p>\n\n\n\n<p>The pros behind Carbonite + Webroot joined forces with industry leading researchers at IDC to develop an easy-to-understand framework for fighting back against cybercrime. The results? A 6-step plan for adopting a cyber resilience strategy meant to keep businesses safe.<\/p>\n\n\n\n<p>IDC looked into the data and past the alarming headlines with million-dollar ransom payments and crippling supply chain attacks.<\/p>\n\n\n\n<p>The facts they found are eye-opening and underline why cyber resilience is the best strategy:<\/p>\n\n\n\n<ul><li>less than 2% of full-time staff at SMBs are dedicated to tech<\/li><li>30% of companies that paid a ransom forked over between $100,000 and $1 million<\/li><li>56% of ransomware victims suffered at least a few days or a week of downtime<\/li><\/ul>\n\n\n\n<p>Of course, the best strategies can\u2019t help anyone who doesn\u2019t adopt them. So IDC also compiled tips for communicating with businesses. Whether you\u2019re an MSP, an IT pro or just a friend, you can use these tips to help convince the underprepared that they need a cyber resilience strategy.<\/p>\n\n\n\n<p><strong>The 4 reasons why cyber resilience makes sense<\/strong><\/p>\n\n\n\n<p>IDC researchers make an iron-clad case for cyber resilience by looking at the current state of cybercrime. The found 4 main reasons why businesses need a cyber resilience framework:<\/p>\n\n\n\n<ol type=\"1\"><li><strong>Crippling cyberattacks are on the rise.<\/strong> Evolving methods and sophisticated tactics make cybercrime a booming business for criminals.<\/li><li><strong>A distributed IT footprint brings greater risk. <\/strong>The onset of hybrid work opens new pathways ready to be exploited. And let\u2019s face it, the average home WiFi doesn\u2019t have the right kind of security.<\/li><li><strong>IT departments are stretched thin. <\/strong>Less than 2% of SMBs\u2019 total employee base is dedicated to full-time IT staff.*<\/li><li><strong>Consequences of an attack remain dire. <\/strong>Attacks continue to reverberate past the day of a breach, with 55% of ransomware victims suffering a few days to a week of costly downtime.**<\/li><\/ol>\n\n\n\n<p><strong>The right tools can fight back<\/strong><\/p>\n\n\n\n<p>But it\u2019s not all bad news. Adopting the right strategy and the right tools sets you on the road to protecting your business. The headlines are scary and the stats are alarming, but they\u2019re not prophecy. Businesses don\u2019t have to live in fear of falling victim to cyberattacks.<\/p>\n\n\n\n<p><strong>From framework to action<\/strong><\/p>\n\n\n\n<p>IDC goes in depth for the steps businesses can take to adopt cyber resilience. Here\u2019s a quick preview of the framework:<\/p>\n\n\n\n<ol type=\"1\"><li><strong>Identify.<\/strong> You can\u2019t protect what you haven\u2019t first identified.<\/li><li><strong>Protect.<\/strong> Employees and their devices are cybercriminals\u2019 first targets. Protect them and start a systematic file and backup system.<\/li><li><strong>Detect.<\/strong> Threat intelligence and experience-based detection can thwart even the most sophisticated attackers.<\/li><li><strong>Respond.<\/strong> It\u2019s imperative to stop attackers\u2019 advances before real harm occurs.<\/li><li><strong>Recover.<\/strong> Clean up infected devices, close backdoors and have a plan to recover damaged or out-of-commission assets.<\/li><li><strong>Educate.<\/strong> Empower your employees to form a citizen army of cybersecurity checkpoints.<\/li><\/ol>\n\n\n\n<p><strong>Combining powers to form the best defense<\/strong><\/p>\n\n\n\n<p>IDC also suggests the best ways that businesses can take action to protect themselves. By combining the powers of outside help with in-house know how, businesses benefit from the best of two worlds.<\/p>\n\n\n\n<p>Ready to start protecting yourself and your business? <a href=\"https:\/\/www.webroot.com\/cyber-resilience\">Explore how Carbonite + Webroot provide a full range of cyber resilience solutions.<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.webroot.com\/idc-ebook\">Download the IDC report.<\/a><\/p>\n\n\n\n<p>* IDC\u2019s Worldwide Small and Medium Business Survey, 2020<\/p>\n\n\n\n<p>** IDC, Future Enterprise Resiliency &amp; Spending Survey Wave 6, July 2021, IDC\u2019s 2021 Ransomware Study: Where You Are Matters!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Making the case The pros behind Carbonite + Webroot joined forces with industry leading researchers at IDC to develop an easy-to-understand framework for fighting back against cybercrime. The results? A 6-step plan for adopting a cyber resilience strategy meant to keep businesses safe. IDC looked into the data and past the alarming headlines with million-dollar [&hellip;]<\/p>\n","protected":false},"author":199,"featured_media":31643,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[25305],"yst_prominent_words":[3943,4119,23995,4971,25287,8525,24605,3717,4331,3937,25299,21959,18965],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/31641"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/199"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=31641"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/31641\/revisions"}],"predecessor-version":[{"id":31647,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/31641\/revisions\/31647"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/31643"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=31641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=31641"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=31641"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=31641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}