It’s not if you get hacked, but when!

Share

By the beasts

Of course, the chances of you and us being as lucky as the aforementioned university are very slim. The same unfortunately applies to the chances of keeping cybercrime out forever, even with best-of-breed technology. Unfortunately, hackers are too smart and ruthless for that. Sooner or later it will be everyone’s turn, as even educational institutions and a zoo like Artis will not be spared. That is literally and figuratively by the beasts. So instead of focusing one-sidedly on all kinds of technical solutions and having the illusion that it won’t happen to your organization, you should actually think carefully about the potential impact of a hack.

Time and continuity

You will then quickly come to the conclusion that the time and continuity factor is crucial. After all, time is precious and you especially notice this when you cannot continue for a while due to a hack or downtime. This is precisely the reason why the university mentioned did pay a ransom. So security tools and related services, including those of Cortexia, are mainly aimed at saving time. In our view, this is best done with as many tools as possible, even if they are not all top of the bill. After all, you also keep a burglar out longer with four mediocre locks than with one great lock.

Be prepared for a hack

Exactly which tools it will be, you can confidently leave to an expert. Your main task should be to prepare for a future hack. Draw up a plan of action and assign tasks and responsibilities. Everything should be aimed at ensuring that data is restored and applications are back up and running as soon as possible. Describe several scenarios here, including the worst-case scenario. In addition, good backups and backup procedures should not be missing. Stick to the 3-2-1-1-0 rule as much as possible. That is, there should be at least three copies of important data, on at least two different types of media, with at least one off-site copy and one offline. And with 0 errors.

Business Continuity and Disaster Recovery

And if you don’t have a Business Continuity and Disaster Recovery (BCDR) system yet, at least get informed about it. After all, modern BCDR products can run applications from backup instances of virtual servers. This can often also be done from the cloud as Disaster Recovery-as-a-Service (DRaaS).
Do you want to keep cybercriminals out for as long as possible and want to know how we do that for customers? Then contact us at info@cortexia.nl or + 31 8 7875 0528. We will come straight away with specific advice to get your organisation up and running again in no time when things unexpectedly go wrong.

Contact

Would you like more information or do you have a question? Please contact us or schedule an appointment.

Read our other blogs

Give your employees as much freedom as possible

Like almost everyone, we as owners of Cortexia want to be treated with respect and, above all, have all the freedom to be able to work the way we want. The latter was partly the reason for becoming an entrepreneur. Many employees, especially the more educated ones, also thrive on a lot of freedom, but by no means all choose

Read more »

Cortexia is the right partner to put F5 further on the map

Suppose: as a provider of application security and availability, you have wonderful products, but insufficient technical knowledge among your partners to turn that into orders. What do you do then? You look for a partner who does have that knowledge and you find Cortexia. At least, that’s how it was at F5. In exchange, Cortexia gets, among other things, access

Read more »