{"id":92388,"date":"2020-12-17T09:00:26","date_gmt":"2020-12-17T17:00:26","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=92388"},"modified":"2023-05-15T22:58:49","modified_gmt":"2023-05-16T05:58:49","slug":"becoming-resilient-by-understanding-cybersecurity-risks-part-2","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/17\/becoming-resilient-by-understanding-cybersecurity-risks-part-2\/","title":{"rendered":"Becoming resilient by understanding cybersecurity risks: Part 2"},"content":{"rendered":"
In part one of this blog series<\/a>, we looked at how being resilient to cybersecurity threats is about understanding and managing the organizational impact from the evolution of human conflict that has existed since the dawn of humanity. In part two of this series, we further explore the imperative of thinking and acting holistically as a single organization working together to a common goal. Building true resilience begins with framing the issue accurately to the problem at hand and continuously (re)prioritizing efforts to match pace with evolving threats.<\/p>\n For this blog, we will use the example of a current cybersecurity threat that spans every organization in every industry as an example of how to put this into practice. The emergence of human-operated ransomware has created an organizational risk at a pace we have not seen before in cybersecurity. In these extortion attacks, attackers are studying target organizations carefully to learn what critical business processes they can stop to force organizations to pay, and what weaknesses in the IT infrastructure they can exploit to do it.<\/p>\n This type of threat enables attackers to stop most or all critical business operations and demand ransom to restore them by combining:<\/p>\n Whilst this may be uncomfortable reading, the ability to pre-empt and respond quickly to these cyberattacks is now an organizational imperative that requires a level of close collaboration and integration throughout your organization (which may not have happened to date).<\/p>\n Because these attacks directly monetize stopping your business operations, you must:<\/p>\n Applying this in a complex organization requires you to:<\/p>\n Whilst it’s tempting for experienced leaders and technical professionals to get caught up in how things have been done before, cybersecurity is a fundamentally disruptive force that requires organizations to work collaboratively and adopt and adapt the practices documented in Microsoft\u2019s guidance.<\/p>\n “We cannot solve our problems\u00a0with the same thinking we used when we created\u00a0them.”<\/em>\u2014Albert Einstein<\/p><\/blockquote>\n For all this to be successful, your organization must work together as a single coherent entity, sharing insights and resources from business, technical, and security teams to leverage diverse viewpoints and experiences. This approach will help you plan and execute pragmatically and effectively against evolving threats that impact all parts of your organization.<\/p>\n In our next blog, we will continue to explore how to effectively manage risk from the perspective of business and cybersecurity leaders and the capabilities and information required to stay resilient against cyberattacks.<\/p>\n To learn more about Microsoft Security solutions visit our\u00a0website<\/a>. Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" Whilst this may be uncomfortable reading, the ability to pre-empt and respond quickly to these attacks is now an organizational imperative that requires a level of close collaboration and integration throughout your organization (which may not have happened to date).<\/p>\n","protected":false},"author":98,"featured_media":92395,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3662],"topic":[3683],"products":[],"threat-intelligence":[],"tags":[3753,3822,3827],"coauthors":[1906,2431],"class_list":["post-92388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-security-management","tag-cybersecurity-policy","tag-microsoft-security-insights","tag-reliability-and-resilience"],"yoast_head":"\n<\/p>\n
\n
\n
\n