REUT WEITZMAN
TAKING A PROACTIVE APPROACH TO CYBERSECURITY By Reut Weitzman, Manager, Cyber Security Services at Sygnia
In today’s digital world, data security is crucial
Ransomware readiness is a state that must be
regardless of what type of business you are in.
continually maintained. It is not a one-time event. Therefore, a cybersecurity plan should be a
Data is what businesses rely on to make decisions,
living document that is regularly updated as new
stay competitive and grow. But as our dependence
threats emerge and new technologies become
on data has increased, so has the risk of data being
available. Businesses must keep abreast of the
compromised by cyber breaches, especially by the
latest cybersecurity news to be familiar with threat
accelerated transition to remote work. That is why
actors’ tools, techniques and procedures and
it is more important than ever for CISOs to be better
modify their incident response plan to stay ahead
prepared to respond should an incident occur. Here is
of the curve. Identify the measures needed to
a close look at how organizations can take a proactive
enhance resilience across the entire attacker kill
approach to cybersecurity.
chain: from penetration through lateral movement to execution.
Cyberattacks come in different forms of
114
compromising data through networks. With the rise of
Make sure to allocate the resources and budget
remote working in many businesses, there has been
necessary to enhance the organization’s ability to
a surge in ransomware attacks. Ransomware is a
prevent, detect, respond to and recover from all
type of malware that encrypts a victim’s files enabling
phases of the attack, and keep your up-to-date plan
the attacker to demand a ransom payment to
effective. Many organizations fail to execute their
decrypt them. This cyber-extortion attack can have a
cybersecurity plan, usually due to lack of oversight
devastating impact on a business, producing financial
necessary to ensure proper implementation. Set
loss, reputation damage, operational disruption and
up an assurance process to measure the controls
compliance failures. In severe cases of sensitive
effectiveness, track and test the plan to ensure
data or mission-critical systems being impacted,
it meets key performance indicators (KPIs) and
businesses have had to shut down completely due to
key risk indicators (KRIs) that correlate with the
a ransom attack.
business strategy.
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2023