{"id":92388,"date":"2020-12-17T09:00:26","date_gmt":"2020-12-17T17:00:26","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=92388"},"modified":"2023-05-15T22:58:49","modified_gmt":"2023-05-16T05:58:49","slug":"becoming-resilient-by-understanding-cybersecurity-risks-part-2","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/17\/becoming-resilient-by-understanding-cybersecurity-risks-part-2\/","title":{"rendered":"Becoming resilient by understanding cybersecurity risks: Part 2"},"content":{"rendered":"

In part one of this blog series<\/a>, we looked at how being resilient to cybersecurity threats is about understanding and managing the organizational impact from the evolution of human conflict that has existed since the dawn of humanity. In part two of this series, we further explore the imperative of thinking and acting holistically as a single organization working together to a common goal. Building true resilience begins with framing the issue accurately to the problem at hand and continuously (re)prioritizing efforts to match pace with evolving threats.<\/p>\n

For this blog, we will use the example of a current cybersecurity threat that spans every organization in every industry as an example of how to put this into practice. The emergence of human-operated ransomware has created an organizational risk at a pace we have not seen before in cybersecurity. In these extortion attacks, attackers are studying target organizations carefully to learn what critical business processes they can stop to force organizations to pay, and what weaknesses in the IT infrastructure they can exploit to do it.<\/p>\n

\"Placeholder\"<\/p>\n

This type of threat enables attackers to stop most or all critical business operations and demand ransom to restore them by combining:<\/p>\n