Firms failing to implement watertight cyber security incident response plans

Without a fully tested plan, organisations may find a breach costs $1million more than those whose plans are tried and tested...

Cyber security

More than three quarters of businesses don't have a consistent cyber security incident response plan and half of businesses that do have one in place haven't tested them, according to research by Ponemon Institute.

Those who have thoroughly tested their plans are able to contain an attack within 30 days, which should offer some motivation to those not properly preparing for an incident. Indeed, on average, businesses that have a robust cybersecurity incident plan save over $1 million on the total cost of a data breach, according to the research, which was commissioned by IBM.

"Failing to plan is a plan to fail when it comes to responding to a cybersecurity incident," Ted Julian, vice president of product management and co-founder of IBM Resilient.

"These plans need to be stress tested regularly and need full support from the board to invest in the necessary people, processes and technologies to sustain such a program. When proper planning is paired with investments in automation, we see companies able to save millions of dollars during a breach."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

In addition, IBM said that not properly preparing for an incident could also lead to a business falling foul of the GDPR guidelines. Nearly half of businesses questioned in the research said they were not fully compliant with the GDPR.

One of the biggest barriers to being fully compliant and having a watertight strategy is that businesses still don't have the staffing they need for cyber security to be as secure as it could be.

IBM has suggested that cyber security incident management automation will become a more popular topic in future. Although businesses are already using automation for identity management and authentication, incident response platforms and security information and event management (SIEM) tools are still gaining popularity.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020