www.cloudally.com Open in urlscan Pro
162.159.135.42  Public Scan

Submitted URL: https://t.co/lZM5mKca6m
Effective URL: https://www.cloudally.com/blog/cybersecurity-plan/
Submission: On November 26 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.cloudally.com

<form class="elementor-search-form" role="search" action="https://www.cloudally.com" method="get">
  <div class="elementor-search-form__toggle">
    <i aria-hidden="true" class="fas fa-search"></i> <span class="elementor-screen-only">Search</span>
  </div>
  <div class="elementor-search-form__container">
    <input placeholder="Search..." class="elementor-search-form__input" type="search" name="s" title="Search" value="">
    <div class="dialog-lightbox-close-button dialog-close-button">
      <i aria-hidden="true" class="eicon-close"></i> <span class="elementor-screen-only">Close</span>
    </div>
  </div>
</form>

GET https://www.cloudally.com/

<form role="search" method="get" class="search-form" action="https://www.cloudally.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Text Content

Rss
Back to main website
 * Free Trial
 * Login

Search
Close
Secure Cloud Backup
 * Home
 * Microsoft 365
 * SharePoint
 * Google Workspace
 * Salesforce
 * Dropbox
 * Box

Menu
 * Home
 * Microsoft 365
 * SharePoint
 * Google Workspace
 * Salesforce
 * Dropbox
 * Box

Custom Quote
Book a demo


ARE BACKUPS A PART OF A CYBERSECURITY PLAN?



Details of the 5 phases of the NIST cybersecurity framework with an analysis of
how backups are a part of a robust cybersecurity plan


 * October 22, 2021
 * 12:45 am
 * No Comments
 * Teresa Gracias


Share this:


What’s keeping our army generals up at night? Likely, a phishing attack. In our
digitalized world, cyber attacks are consistently the weapon of choice bringing
down companies (the cost of a breach is a debilitating $3.86
million) and F-35 fighter jets (more likely than a missile would). Malware
attacks are surging higher- cybercrime was up 600% due to the COVID-19
pandemic. What’s worrisome though, is that we’re unprepared – 78% lack
confidence in their company’s cybersecurity posture. As we celebrate
Cybersecurity month, let’s walk through the essential aspects of a robust
cybersecurity plan – your lifesaver when an attack strikes. We will especially
analyze how backups are a part of a cybersecurity plan. It is a part of the five
elements of the NIST cybersecurity framework, the leading cybersecurity plan, as
the only reliable way to reverse or mitigate the damage of a cyber attack. 

Are Backups a Part of a Cybersecurity Plan? 

 * The 5 Elements of the NIST Cybersecurity Framework
   1. Identify
   2. Protect
   3. Detect
   4. Respond
   5. Recover
 * Where does Backup Fit in the Cybersecurity Plan?
 * What Value Does Backup Bring to Your Business?


ANALYZING THE GOLD-STANDARD: THE NIST CYBERSECURITY FRAMEWORK 

A cybersecurity plan helps an organization to protect and defend itself from
cyber attacks and mitigate its risks. A hardy cybersecurity plan needs to be
versatile, dynamic, and have a broad set of strategies, policies, and
technologies that have not just one but many components. Let us go over the five
aspects of the industry’s gold standard in cybersecurity planning – The National
Institute of Standards and Technology (NIST) cybersecurity framework


THE FIVE ELEMENTS OF THE NIST CYBERSECURITY FRAMEWORK



#1 IDENTIFY: NIST CYBERSECURITY FRAMEWORK

Understand and identify the cybersecurity business impact and touchpoints across
infrastructure, employees, and data.  

Deliverables: List of physical and software assets, Asset vulnerabilities,
Regulatory requirements, Cybersecurity policies, Risk Management
Strategy, Supply Chain Risk Management strategy 

Tools: Monitoring Tools, BCDR Planning, Governance, Asset Management 

#2 PROTECT: NIST CYBERSECURITY FRAMEWORK

Outline the safeguards and framework to put in place to secure your
infrastructure and data such as to mitigate the risks. 

 Deliverables: Data Protection and Privacy policies, Identity management and
access control best practices, Setup of the office of Data Protection, Employee
Cybersecurity Training, BCDR Planning 

Tools: MFA, Firewalls, Anti-phishing AI, DNS Filtering 

#3 DETECT: NIST CYBERSECURITY FRAMEWORK

Framework for a timely detection of a cybersecurity breach.  

Deliverables: Continuous monitoring framework, impact assessment. 

Tools: Monitoring tools, ransomware canaries 

#4 RESPOND: NIST CYBERSECURITY FRAMEWORK

Processes to ensure appropriate and audit-compliant responses to a breach. 

Deliverables: Response plan, Breach response reporting process for law
enforcement and regulatory authorities, communication processes for management,
employees, and customers, Setup of an Incident Response team. 

Tools: BCDR execution, Incident Response mechanisms  

#5 RECOVER: NIST CYBERSECURITY FRAMEWORK

Activities to ensure data resilience, disaster recovery, and business continuity
in the aftermath of a cybersecurity incident. 

Deliverables: Review and improvement of existing plans and policies namely the
BCDR plan. 

Tools: Backup Solutions, Disaster Recovery, Cyber Insurance 


WHERE DOES BACKUP FIT IN THE CYBERSECURITY PLAN? 

> “Businesses need to ensure they have a trusted backup of their key systems and
> have tested and practiced recovery plan from if those systems were
> compromised” 

David Cripps, the CISO (Chief Information Security Officer),

Moneycorp 

Are backups a part of a cybersecurity plan? Well, it’s one of the most important
components of a strong cybersecurity plan that is often missed out – resilient
and fast backup and restore. In the NIST cybersecurity framework discussed
above, backups are a part of the “Recover” phase. Crucially, backups are an
important constituent of a robust Business Continuity and Disaster Recovery plan
(BCDR) which spans multiple phases of the cybersecurity framework. Although the
NIST Cybersecurity framework has many phases to prevent successful cyberattacks,
the attack vectors are constantly changing and the plan must take into account
that some attacks might succeed. That is when restoring from a cloud backup
becomes the best solution to mitigate the damage and ensure business continuity.

This is even more true today with the increasing ransomware storms buoyed on by
security vulnerabilities of the remote workforce and the en masse digitization
due to the pandemic. When adopting cloud platforms like SaaS platforms such as
Microsoft 365, Google Workspace, and Salesforce Backup, note that the Shared
Responsibility Model puts the onus of data protection on you, as the data
controller. Secure backup and recovery is the only way to vaccinate your data
against the cyber pandemic. You need to perform both daily backups of the SaaS
applications and have the ability to restore files, mailboxes, folders, and
sites in a quick and simple manner. One without the other means the effort is
incomplete. It is just as important to regularly conduct end-to-end backup and
recovery testing so that you can be sure that when a restore is needed due to a
cyber-attack, the recovery will work. 


WHAT VALUE DOES BACKUP BRING TO YOUR BUSINESS?

The value and advantages that backup brings to your business and your
organization’s cybersecurity is three-fold:


#1 ADVANTAGE OF BACKUP FOR BUSINESS: BETTER CYBERSECURITY DUE TO DATA
RECOVERABILITY FROM ANY POINT-IN-TIME

Backups are a fundamental part of the “Recover” phase of your cybersecurity
plan. As Gartner puts it, “Organizations that assume SaaS applications don’t
require backup, or that the SaaS vendor’s data protection Is good enough, may
place critical data at risk”. Native options do not offer unlimited
point-in-time or granular recovery. This feature is a must for any organization,
given that the average time to detect a breach is 180 days, well after the
time-bound limits of native recovery. Stay cybersecure with unlimited
point-in-time data recoverability.


#2 ADVANTAGE OF BACKUP FOR BUSINESS: REGULATORY COMPLIANCE WITH ASSURED
RECOVERABILITY

Regulatory laws such as GDPR, HIPAA, CCPA, and others require data controllers
to have demonstrable recoverability. GDPR’s Article 32 mandates that companies
“have the ability to restore the availability and access to personal data in a
timely manner in the event of a physical or technical incident”. Stay
audit-compliant with secure backup.


#3 ADVANTAGE OF BACKUP FOR BUSINESS: INCREASED PRODUCTIVITY DUE TO OPTIMAL
BUSINESS CONTINUITY

Optimal Recovery Point Objective (RPO) and Recovery Time Objective (RTO)
facilitate optimal business continuity. Automated daily SaaS backup ensures that
your backup holds a recent accurate copy of data for an optimal RPO. One-click
quick recovery similarly ensures that you have an optimal RTO. Stay productive
with reduced downtime and seamless business continuity.

Experience for yourself the value-add that secure SaaS backup brings to your
organization’s cybersecurity. Try a free, full-feature trial of CloudAlly Backup
for Microsoft 365, Google Workspace, Salesforce, Box.com, and Dropbox. Are you
an MSP, CSP , or VAR? Try our tailored MSP Backup or white-label OEM backup with
a dedicated Partner Portal. Zero commitment, zero setup, zero fine print – full
ROI.

Share this:


Search for:

THOUGHT LEADER TALKS

Series of Intriguing Q&A with the leading IT influencers


View All


Click the RSS icon below sign up and get our blog posts by RSS: 

Rss

RSS NEWS CLOUDALLY

 * How Can You Increase Revenue With White Label Cloud Backup for MSPs? April
   21, 2021
 * 5 Reasons Why MSPs Need Backup. Now. February 18, 2021
 * Why You Need SaaS Backup and Disaster Recovery? June 25, 2020
 * Types of Backup: SaaS Backup vs On-Premises Backup June 19, 2020
 * Types of Backup and Pointers to Pick the One Right for You May 25, 2020

Categories

CATEGORIES

 * Box
 * Cloud to cloud-backup Solutions
 * Compliance and Audits
 * Customers
 * Cybersecurity
 * Disaster Recovery
 * Dropbox
 * Enterprise Data Protection
 * Google Workspaces
 * Malware
 * Microsoft Dynamics
 * Microsoft Office 365
 * News & Product Updates
 * Partner/MSP
 * Remote Workforce Security
 * SaaS Backup
 * Salesforce
 * SharePoint Backup and Recovery
 * SharePoint/OneDrive
 * Thought Leader Talks

Twitter Latest tweets
Get the latest insights on cloud-to-cloud backup to your inbox.

TAGS

Backup Salesforce on Cloud box box.com Cloud Backup cloud backup for MSPs Cloud
Computing Cloud Cyber Security Cloud Safety Cloud to cloud backup Services
cloud_computing Data Loss in the Cloud Data loss Solution in the cloud data
protection data_in_the_cloud deleted emails Dropbox Dropbox Business Dropbox for
Business DynamoDB G Suite G Suite / gmail recovery G Suite / Google Apps backup
G Suite / google apps Cloud Backup G Suite / google apps for work G Suite /
google apps recovery malware Microsoft Dynamics CRM Solution Microsoft
Sharepoint Backup MSP msp business growth Office 365 backup office 365 Backup
Cloud Solution Office 365 Online Backup and Restore office_365_for_education
onedrive OneDrive Backup online backup online_backup preventing data loss
ransomware Restore Google Drive SaaS Backup Salesforce backup solution security
in the cloud sharepoint
dotted_BLUE_horizontal_divider
Subscribe to our latest blog posts
Get Posts Via Email - With the latest insights on cloud-to-cloud backup.

dotted_horizontal_divider
✖


GET A QUOTE

 * Products
   * Microsoft 365 Backup
   * SharePoint Backup
   * Google Workspace Backup
   * Salesforce Backup
   * Box Backup
   * Dropbox Backup
   * MSP Backup
   * OEM Backup
 * Resources
   * Why Backup SaaS Data
   * Disaster Recovery
   * Brochures
   * Security
   * Knowledge Base
   * FAQ
   * Videos
 * Company
   * About Us
   * Management
   * Newsroom
   * Events
   * Support
   * Careers
 * Compare
   * Ownbackup Salesforce
   * Spanning Salesforce
   * Spanning M365
   * Backupify M365
   * Acronis M365
   * SkyKick M365
   * On-Prem
 * Industry
   * Non Profit
   * Educational
   * Financial
   * Insurance
   * Healthcare
   * Information Technology
   * Telecom
   * MSP Resellers
   * Construction

Products
Pricing
Partners
Customer Support Hub
Blog
Contact









Give us a call


USA


UK


AUS

+ 1 424 304 1959
+ 44 208 089 2351
+ 61 283 171 165
Email Us


GENERAL INQUIRIES


CUSTOMER SUPPORT


SALES


PARTNERS


PARTNERS SUPPORT


INFO@CLOUDALLY.COM


SUPPORT@CLOUDALLY.COM


SALES@CLOUDALLY.COM


PARTNERS@CLOUDALLY.COM


SUPPORT.PARTNERS@CLOUDALLY.COM




© Copyright CloudAlly™ 2020
 * Security
 * GDPR
 * SLA
 * Terms of Use
 * Privacy Policy

Menu
 * Security
 * GDPR
 * SLA
 * Terms of Use
 * Privacy Policy

Facebook Twitter Youtube Rss

Cookies Settings .


PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.


BACK BUTTON PERFORMANCE COOKIES



Vendor Search Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices


By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts.

Cookies Settings Accept All Cookies