Firms failing to implement watertight cyber security incident response plans

Without a fully tested plan, organisations may find a breach costs $1million more than those whose plans are tried and tested...

Cyber security

More than three quarters of businesses don't have a consistent cyber security incident response plan and half of businesses that do have one in place haven't tested them, according to research by Ponemon Institute.

Those who have thoroughly tested their plans are able to contain an attack within 30 days, which should offer some motivation to those not properly preparing for an incident. Indeed, on average, businesses that have a robust cybersecurity incident plan save over $1 million on the total cost of a data breach, according to the research, which was commissioned by IBM.

"Failing to plan is a plan to fail when it comes to responding to a cybersecurity incident," Ted Julian, vice president of product management and co-founder of IBM Resilient.

"These plans need to be stress tested regularly and need full support from the board to invest in the necessary people, processes and technologies to sustain such a program. When proper planning is paired with investments in automation, we see companies able to save millions of dollars during a breach."

In addition, IBM said that not properly preparing for an incident could also lead to a business falling foul of the GDPR guidelines. Nearly half of businesses questioned in the research said they were not fully compliant with the GDPR.

One of the biggest barriers to being fully compliant and having a watertight strategy is that businesses still don't have the staffing they need for cyber security to be as secure as it could be.

IBM has suggested that cyber security incident management automation will become a more popular topic in future. Although businesses are already using automation for identity management and authentication, incident response platforms and security information and event management (SIEM) tools are still gaining popularity.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021
Russia launched over a million cyber attacks in three months
hacking

Russia launched over a million cyber attacks in three months

13 Apr 2021
New DNS vulnerabilities put millions of IoT devices at risk
Internet of Things (IoT)

New DNS vulnerabilities put millions of IoT devices at risk

13 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget
Mobile Phones

Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget

13 Apr 2021