Billions of Threats, Milliseconds to Respond: Automating Resiliency

Image of businesswoman in anger breaking metal chain

Time is not on our side. To succeed against threats, organizations need automation and cognitive technologies combined with strategy, process and testing. Effective resiliency requires investment, leadership and a culture where people imprint an always-on attitude onto their professional DNA.

For decades, business continuity was viewed as a way to prevent disasters when hardware and software failed. This process focused primarily on preparing for human error, poor change management and natural disasters like hurricanes, floods and fires. But now, more than any other time in history, cyberattacks are flooding the front lines in the resiliency battle. Cyberattacks aren’t just another threat — they’re the mother of all threats.

Enhancing Resiliency Against Cyberthreats

If you’re looking to strengthen your cyber resiliency, start by checking out this Digital Attack Map, which charts the daily reported distributed denial-of-service attacks around the world. Although it only shows the top 0.1 percent of reported threats, this image demonstrates that network-based attacks are coming from every direction.

Next, turn to IBM data reported in late March. Over 4 billion records were compromised in 2016 from the 8,000 IBM-monitored security clients in 100 countries, plus ancillary data. IBM’s X-Force counted over 8 million spam and phishing attacks on a daily basis — averaging about 3 billion attacks in a year. The study also found that criminals made over $1 billion on ransomware attacks in 2016.

Moreover, 51 percent of the 618 companies interviewed by Ponemon in a Rise of Ransomware study reported experiencing a ransomware attack. But despite the growing problem, 57 percent of organizations believe their company is simply too small to be the victim of an attack.

This perception is flat-out wrong. Technology outages — including ransomware disasters — do not discriminate based on company size, geographical location or personnel demographics. Check out IBM Security’s Caleb Barlow in his TED Talk for further information on this issue. There’s a reason ransomware has become a multibillion-dollar industry resulting in both unseen downtime costs and highly visible ransom money paid to criminals: The ransomware business is highly organized and highly profitable.

Automate for Iron Defenses

While protection starts simply with a backup, businesses need an always-on strategy, automation to quickly activate defenses and cognitive technologies when the immediate answer isn’t so obvious. And, as I’ve reported in previous blogs, just because your everything-as-a-service is in the cloud, a cloud platform doesn’t automatically mean your data is backed up.

In the large-system world, sophisticated automated failover and fallback technology has been around for decades. In the cloud world, the technology is relatively new, but it’s spreading fast. Through software-defined resiliency, automation can be monitored and automatically self-heal broken infrastructure. Real-time replication of data combined with software-based orchestration tools makes this possible.

You can also make use of Watson for cybersecurity to power cognitive security operations centers. With only 7 percent of security professionals using cognitive tools to improve their ability to detect and accelerate their response to cyberthreats, the opportunities artificial intelligence brings to the table are massive.

blog button

This article was originally published on IT Biz Advisor.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s