{"id":5647,"date":"2021-07-25T09:00:07","date_gmt":"2021-07-25T07:00:07","guid":{"rendered":"https:\/\/www.esferize.com\/?p=5647"},"modified":"2021-07-25T09:00:07","modified_gmt":"2021-07-25T07:00:07","slug":"cyber-resilience-cyber-defence-strategy","status":"publish","type":"post","link":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/","title":{"rendered":"Cyber resilience as a cyber defence strategy"},"content":{"rendered":"<p>We explain what cyber resilience is and why it is the best cyber defence strategy.<\/p>\n<p>It has become a clich\u00e9 and you will have heard it said many times, but it is true. There are two types of companies, those that have suffered a cyber-attack and those that are going to suffer one. To which we add a third, the <strong>companies that are prepared to resist with cybersecurity plans<\/strong>. Which is your case?<\/p>\n<p>According to data from the third annual study <a href=\"https:\/\/newsroom.accenture.com\/news\/only-17-percent-of-organizations-globally-considered-leaders-in-cyber-resilience-according-to-accenture-study.htm\">The State of Cyber Resilience<\/a>, <strong>37%<\/strong> of security breaches in Spanish organisations are <strong>indirect attacks<\/strong> targeting the <strong>weak links<\/strong> in the chain.<\/p>\n<p>The good news is that the basic<strong> cybersecurity measures<\/strong> implemented by companies <strong>in Spain<\/strong> have <strong>reduced direct attacks by 11%<\/strong> and improved security breaches by 27%.<\/p>\n<p>Furthermore, <strong>82%<\/strong> of<strong> organisations<\/strong> in Spain spend <strong>more than 20% of their security budget<\/strong> on advanced technologies.<\/p>\n<p>This growth in security investment<strong> reflects the increase in activity exposed to cyber-attacks<\/strong>. More and more businesses are relying on the cloud, on connectivity, on apification and on 100% digital environments. These environments need not be less secure than traditional ones, if the right measures are taken.<\/p>\n<h3 class=\"ws10-c-title-standard ws10-c-title-standard--medium ws10-u--mb2x@mobile ws10-u--mb5x@desktop vfTitle2\">Cyber resilience in five steps<\/h3>\n<p><strong>Step 1: Responding to an attack and conducting forensic analysis<\/strong><br \/>\nAfter an attack, in addition to restoring security, it is necessary to assess what went wrong. This is done by forensic teams (CIFR) that will support the IT department.<\/p>\n<p><strong>Step 2: Analyse how vulnerable your business is and then protect it<\/strong><br \/>\nBy scanning devices and IP connections, weaknesses in your systems, misconfigurations or compliance failures are located and false positives are ruled out.<\/p>\n<p><strong>Step 3: Test your current security as if we were hackers<\/strong><br \/>\nSimulating a real attack is the best way to locate vulnerabilities in your network and test cyber defence capabilities.<\/p>\n<p><strong>Step 4: Measuring your company&#8217;s resilience<\/strong><br \/>\nHigh-risk users and their behaviours must be identified and malicious software must be tracked down even if it is dormant, both in the internal infrastructure and in the infrastructure of external providers and accesses.<\/p>\n<p><strong>Step 5: Raise awareness of phishing<\/strong><br \/>\nThis assessment is aimed at employees, who are tested through a simulated phishing campaign. In this way, the degree of cyber resilience and awareness of this type of attack within the organisation is measured.<\/p>\n<p>All these steps and resources may not prevent you from suffering an attack, but they will allow you to be among the group of organisations that have been able to overcome it and turn your company into a cyber-resilient one. This is something that 65% of companies in Spain can already say, in line with 67% worldwide. Therefore, we can say that the best cyber defence strategy is cyber resilience.<\/p>\n<p><a href=\"https:\/\/www.esferize.com\/en\/contact-us\/\">Do you need help with your company&#8217;s cybersecurity?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We explain what cyber resilience is and why it is  [&#8230;]<\/p>\n","protected":false},"author":8,"featured_media":5635,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[242,225,228],"tags":[370,254,312,565,232,564,235],"class_list":["post-5647","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-en","category-cybersecurity","category-security-on-the-internet","tag-companies-cybersecurity","tag-company","tag-cyber-attacks","tag-cyber-defence","tag-cybersecurity","tag-hacker-en","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber resilience as a cyber defence strategy - Esferize<\/title>\n<meta name=\"description\" content=\"We explain what cyber resilience is and why it is the best strategy for cyber defence, in five steps!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber resilience as a cyber defence strategy - Esferize\" \/>\n<meta property=\"og:description\" content=\"We explain what cyber resilience is and why it is the best strategy for cyber defence, in five steps!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Esferize\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-25T07:00:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/06\/metaball_hacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cynthia Soto del R\u00edo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cynthia Soto del R\u00edo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/\"},\"author\":{\"name\":\"Cynthia Soto del R\u00edo\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\"},\"headline\":\"Cyber resilience as a cyber defence strategy\",\"datePublished\":\"2021-07-25T07:00:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/\"},\"wordCount\":453,\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/metaball_hacker.jpg\",\"keywords\":[\"companies cybersecurity\",\"Company\",\"Cyber attacks\",\"cyber defence\",\"cybersecurity\",\"hacker\",\"Security\"],\"articleSection\":[\"Cloud\",\"Cybersecurity\",\"Security on the Internet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/\",\"name\":\"Cyber resilience as a cyber defence strategy - Esferize\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/metaball_hacker.jpg\",\"datePublished\":\"2021-07-25T07:00:07+00:00\",\"description\":\"We explain what cyber resilience is and why it is the best strategy for cyber defence, in five steps!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/metaball_hacker.jpg\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/metaball_hacker.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Ciberresiliencia como estrategia de ciberdefensa\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cyber-resilience-cyber-defence-strategy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber resilience as a cyber defence strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"name\":\"Esferize\",\"description\":\"Connect to the future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\",\"name\":\"Esferize Comunicaciones S.L.\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"width\":453,\"height\":100,\"caption\":\"Esferize Comunicaciones S.L.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/esferize-comunicaciones\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\",\"name\":\"Cynthia Soto del R\u00edo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"caption\":\"Cynthia Soto del R\u00edo\"},\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/author\\\/csoto\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber resilience as a cyber defence strategy - Esferize","description":"We explain what cyber resilience is and why it is the best strategy for cyber defence, in five steps!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Cyber resilience as a cyber defence strategy - Esferize","og_description":"We explain what cyber resilience is and why it is the best strategy for cyber defence, in five steps!","og_url":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/","og_site_name":"Esferize","article_published_time":"2021-07-25T07:00:07+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/06\/metaball_hacker.jpg","type":"image\/jpeg"}],"author":"Cynthia Soto del R\u00edo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cynthia Soto del R\u00edo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/#article","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/"},"author":{"name":"Cynthia Soto del R\u00edo","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b"},"headline":"Cyber resilience as a cyber defence strategy","datePublished":"2021-07-25T07:00:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/"},"wordCount":453,"publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"image":{"@id":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/06\/metaball_hacker.jpg","keywords":["companies cybersecurity","Company","Cyber attacks","cyber defence","cybersecurity","hacker","Security"],"articleSection":["Cloud","Cybersecurity","Security on the Internet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/","url":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/","name":"Cyber resilience as a cyber defence strategy - Esferize","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/06\/metaball_hacker.jpg","datePublished":"2021-07-25T07:00:07+00:00","description":"We explain what cyber resilience is and why it is the best strategy for cyber defence, in five steps!","breadcrumb":{"@id":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/#primaryimage","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/06\/metaball_hacker.jpg","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/06\/metaball_hacker.jpg","width":1920,"height":1280,"caption":"Ciberresiliencia como estrategia de ciberdefensa"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esferize.com\/en\/cyber-resilience-cyber-defence-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.esferize.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber resilience as a cyber defence strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.esferize.com\/en\/#website","url":"https:\/\/www.esferize.com\/en\/","name":"Esferize","description":"Connect to the future","publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esferize.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esferize.com\/en\/#organization","name":"Esferize Comunicaciones S.L.","url":"https:\/\/www.esferize.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","width":453,"height":100,"caption":"Esferize Comunicaciones S.L."},"image":{"@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/esferize-comunicaciones"]},{"@type":"Person","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b","name":"Cynthia Soto del R\u00edo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","caption":"Cynthia Soto del R\u00edo"},"url":"https:\/\/www.esferize.com\/en\/author\/csoto\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/comments?post=5647"}],"version-history":[{"count":0,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5647\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media\/5635"}],"wp:attachment":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media?parent=5647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/categories?post=5647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/tags?post=5647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}