What is cyber resilience in an age of constant attack?

Phishing, malware, viruses, crypto miners, keyloggers, database breaches, SQL injection, DDoS, good old impersonation and more. As the digital world continues to evolve so do the many ways to attack users and systems for personal gain.

It is difficult to read any news without seeing at least one of those terms popping up, especially for those of us in the tech industry. The twin rise in work from home and cryptocurrency over the COVID-19 pandemic also opened up new and unimaginable attack vectors – and ways to extort money, in the form of crypto – that companies big and small need to be keenly aware of, should they fall victim to the latest types of fraud. Organisations and even governmental bodies similarly need to have these guards in place as the non-profit and government sectors are both juicy targets for bad actors.

Information management solutions expert OpenText is even more aware of these many challenges as it shepherds clients on best ways to manage their content, content that needs to be closely guarded at every turn.

At OpenText Summit Africa 2023 security was another theme that was discussed at length, especially now that there are more ways than ever for a system to be breached.

Kobus Robinson, Cybersecurity Presales Solutions Consultant Lead at OpenText (pictured above) co-hosted a breakout session at the event. Robinson discussed the concept of cyber resilience which covers before, during and after an incident.

“Cyber resilience is about how you can bounce back, quickly. This could be from an external attack, an internal issue like a server failure or even something bigger like a natural disaster. The way OpenText helps you do this is with robust tools,” Robinson says.

Here OpenText’s large family of software suites comes into play with solutions such as Webroot, Fortify, ArcSight, BrightCloud, Voltage, NetIQ, EnCase, Bricata and so much more. Why are there so many solutions? Because cyber resilience is a process with six focus areas.

  1. Anticipate threats before they happen,
  2. Withstand by staying vigilant with models like zero trust,
  3. Detect deviations and issues as they happen in real-time,
  4. Respond to incidents as they happen,
  5. Recover as fast as possible to return to operations and
  6. Adapt so that the same attack won’t work twice, and adapt to new threats on the horizon.

Robinson also adds that AI will have a part to play in next-generation layered analytics, in the service of security. Automation of certain aspects can help secure a company, in real-time, while learning on the fly. He gives an example of monitoring the login times of employees who have high-level user rights. If an admin, for example, has only ever logged in between nine and five working hours, a log-in after hours would cause an alert. On the other side of things, a remote worker in a different country may be doing work that is late at night in the main country the company operates in, so deviations from this would also cause an alarm. Machine learning can track these cases without dedicating extra resources.

With so many security concerns these days on top of locally unique problems such as the threat of grid collapse that we face in South Africa, contact OpenText to create a cyber resilience solution that works for you.


About Author

Related News