According to IBM’s 2020 report, the average cost of a data breach was $3.86 million. This is a big business for cyber criminals and all that money creates an incentive for hackers to continually innovate. The reality is that the good guys are often a step behind the bad guys, and over a long enough period, everyone will fall prey to an attack. Even the best defenses are not completely bulletproof. That’s why having steps laid out for when a breach does occur is critical to minimize the financial and operational impact.
Our most recent two blog posts took a close look at the first three parts of the Protect Function on the NIST Cyber Security Framework. In this third and final post of the series, we’re going to discuss the last two functions:
When an attack does get through all your other protective measures, the ways in which you’re prepared to Respond and Recover dictate how much damage is done and how quickly your business or organization can get back on its feet. Respond covers the immediate action plan to limit theft or data corruption and Recover includes the step-by-step guide to resuming normal operations.