Cyber-compromised data recovery: The more likely disaster recovery use case
John Beattie and
Michael Shandrowski
Additional contact information
John Beattie: Principal Consultant, Sungard Availability Services, USA
Michael Shandrowski: Principal Consultant, Sungard Availability Services, USA
Journal of Business Continuity & Emergency Planning, 2020, vol. 15, issue 2, 114-126
Abstract:
To extort a ransom payment, ransomware actors must make the threat sufficiently compelling that payment seems like the only option. This is achieved by encrypting or disabling a company’s data replicas and backups as well as its production data — data that are essential to the organisation’s success. To prevent this happening, it is essential to extend one’s thinking beyond the organisation’s cyber security incident response plan and disaster recovery programme and give active consideration to a cyber incident recovery risk management (CIR-RM) programme. This paper explores what this requires, including the right thinking, the right approach, the right team and the right plan.
Keywords: cyber crime; cyber attack; ransomware; malware; data recovery; disaster recovery; immutable backups; cyber incident recovery; cyber incident response (search for similar items in EconPapers)
JEL-codes: M1 M10 M12 (search for similar items in EconPapers)
Date: 2020
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/6657/download/ (application/pdf)
https://hstalks.com/article/6657/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:jbcep0:y:2020:v:15:i:2:p:114-126
Access Statistics for this article
More articles in Journal of Business Continuity & Emergency Planning from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().