The digital transformation of our businesses and our lives has accustomed us to trading in secrecy—passwords, fingerprint IDs, facial recognition. But the secret to making your business digitally resilient is to embrace the very opposite of secrecy. Open communication within your organization, with your customers and other stakeholders, your vendors and other business partners—everyone with whom you and your networks connect—is the key.
Begin by ensuring that everyone in your organization, from the top down, understands the difference between digital security and digital resilience. Security is about locking up and hunkering down; resilience is about standing up to do business while fighting back against a cyberattack. Digital resilience consists of the steps you take to deal with the cyberattack that penetrates security. It is about identifying the breach, minimizing the damage, continuing to do business, and recovering from the event as well as learning from it.
Digital security proposes to keep attackers out of your network mainly by defending the network perimeter using anti-malware detection software and firewalls. The problem is that no perimeter defense compatible with connectivity—that is, compatible with doing business—is bulletproof. If you connect intensively enough to do business optimally, you expose your internal network to attacks, some of which will inevitably penetrate your perimeter defenses.
Breaches are becoming inevitable
The first truth to communicate to everyone in your organization is that, sooner or later, one way or another, an attacker will get into your network. This is why everyone in the business must work to achieve digital resilience.
Ensure that everyone in the organization understands that perimeter and detection cybersecurity, while necessary, is not sufficient to protect the digital data assets of the company, its customers, its suppliers and vendors, and other stakeholders. Your message must be that everything is vulnerable,...
This content is available to IABC members only. To continue reading, log in below.