Go to Top

Go to Top

The key strategy against cyber threats
The key strategy against cyber threats
The key strategy against cyber threats
The key strategy against cyber threats

Security Insights

Security Insights

Security Insights

In the era of pervasive cyber threats, strategies for enhancing resilience

In the era of pervasive cyber threats, strategies for enhancing resilience

In the era of pervasive cyber threats, strategies for enhancing resilience

EnkiWhiteHat

EnkiWhiteHat

Monday, December 9, 2024

Monday, December 9, 2024

Monday, December 9, 2024

Content

Content

Content

Shift in Cybersecurity Paradigm

Cyber attacks have established themselves as a 'new threat' to public and private services, and national infrastructure.

Consequently, the importance of cyber resilience, which ensures the continuity of operations beyond merely blocking attacks, is being highlighted. This refers to quickly recovering and returning to normal after an attack, and its necessity is growing amid the increasingly complex and unpredictable threats of cyber attacks with the advancement of ICT technology.


The Lessons from the SolarWinds and Colonial Pipeline Incidents

Notable examples include the SolarWinds incident and the Colonial Pipeline ransomware attack in the United States. These two incidents caused national and social chaos, clearly exposing the limitations of existing cybersecurity systems. They demonstrated how critical it is to recover quickly and minimize damage beyond just defending against attacks. Based on these experiences, the paradigm of cybersecurity is gradually shifting.


Limits of Traditional Security

Cyber resilience clearly distinguishes itself from traditional cyber security approaches. While cyber security focuses on patching known vulnerabilities and developing defense systems based on past attack experiences, cyber resilience primarily aims to maintain business continuity through rapid recovery and prevention via proactive prediction.

It goes beyond simple defense by focusing on effectively responding when an attack occurs, minimizing damage, and quickly normalizing systems, networks, and services.

In line with this trend, within organizations, the 'assessment of cyber resilience' has become an important criterion for determining comprehensive information security capability. Resilience involves not only preventing attacks but also refers to overall response capability, including how quickly normalcy can be restored afterward. Therefore, cyber resilience has become a critical element of an information security strategy, encompassing not only counteractions to attacks but also the ability to recover.


Challenges faced by small and medium-sized enterprises

However, as the costs of advanced cyber services, tools, technology, and skilled personnel increase, small businesses are the most affected. The barrier of cost hinders even the basic approaches to maintaining cyber resilience. While 75% of large companies have cyber insurance, only 25% of small to medium-sized enterprises do (World Economic Forum, 2024).

Small medium-sized enterprises face various practical challenges in securing cyber resilience. The biggest issue among them is the cost. Advanced cybersecurity services or tools and technologies for enhancing resilience require significant expenses, and while large companies can afford these costs, small businesses find it realistically difficult to bear them.

In reality, implementing training programs for cyber resilience, simulated hacking, penetration testing, and the latest security tools require substantial financial investment, and many small businesses fail to afford these, often just maintaining a minimal security level.

Additionally, the lack of skilled personnel is a major issue. Large companies can hire cybersecurity experts to run their security teams, but small businesses often lack the ability to do so, leading to security personnel having to juggle multiple roles. This inevitably reduces expertise and focus on security, making them significantly vulnerable to cyber threats.

Lack of security awareness and education is another challenge faced by small businesses. To achieve cyber resilience, all employees must be aware of security threats. However, due to a lack of time and financial investment in security education, employees may fail to respond appropriately to security incidents. For instance, one reason attacks through phishing emails continue to be successful is that employees are not adequately aware of these threats.

Attackers often target companies with low security levels and use them as a springboard to attack larger companies or related networks.

Issues like these make it difficult for small businesses to achieve 'cyber resilience', making them a primary target for cyber attacks. Cyber attacks do not only target large companies. Small businesses, like large companies, must recognize the importance of cyber resilience and consistently invest in security and education within their means.

Enhancing Cyber Resilience from an Attacker's Perspective

There might be various ways to enhance cyber resilience, but I believe viewing security from the attacker's perspective is not only very effective for large companies but also for small and medium enterprises. It's necessary to predict how an attacker might infiltrate and exploit the system, prioritize what is truly needed, and devise a response strategy. By strengthening security from the attacker's viewpoint, a faster and more practical resilience can be established. For example, there's conducting penetration testing to simulate potential attack paths an actual attacker might take. Penetration testing helps identify and address security vulnerabilities in advance, allowing companies to prepare for cyber attacks. Thinking and preparing in advance about how an attacker might act can enhance the ability to respond and recover quickly if an attack occurs. Also, scenario-based attack training is important, where the security team trains as if it's the real thing by assuming real attack scenarios. Such training helps employees improve their responsiveness to threats. APT (Advanced Persistent Threat) email training is a good example of such attacker perspective-based security training. Because attackers try to access the system through methods like phishing emails, it's essential for internal employees to be trained to identify and respond to such emails. By strengthening security from the attacker's perspective in this way, an organization's resilience naturally increases.

The future of cybersecurity lies in not stopping at 99% defense, but having the 1% capability to recover swiftly even after an attack. Rather than hoping no attack occurs, it's about building the strength to withstand an attack, and that seems to be the true value of cyber resilience.

EnkiWhiteHat

EnkiWhiteHat

ENKI Whitehat
ENKI Whitehat

Offensive security experts delivering deeper security through an attacker's perspective.

Offensive security experts delivering deeper security through an attacker's perspective.

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.