Download PDF version Contact company

Johnny Carpenter, General Manager of EMEA Commented: “The news this week of yet another cyberattack on MGM Resorts, initiating a system shutdown and disrupting its operations, is yet another in a very long list of attacks that we have witnessed in the past couple of years. Having the right preventive and defensive cybersecurity measures in place for such attacks is a given, and it is what most organisations focus on. But it is also about understanding how the organisation will recover from an incident and how they can limit the extent of an attack."

"Today, being impacted by a cyberattack is almost inevitable. Therefore, companies also need to think about how they can proactively recover, how quickly they can recover, and the cost of recovery to the business. For MGM the priority now will be to stabilise infrastructure, while they find the best copy of their data and restore and continue to drive business operations, bringing systems back online as quickly as possible."

Cybersecurity incident

Interruption to operations caused by a cyberattack can cost businesses an enormous amount"

Johnny Carpenter continues, "Here at 11:11 Systems, we know that recovering from a data-compromising cyberattack requires planning, investment, capabilities, procedures, and more. We also understand how important it is for organisations to recognise the difference between traditional disaster recovery, in response to incidents such as wildfires, earthquakes, and extreme weather conditions, and compromised data recovery in the event of a cybersecurity incident." 

He concludes, "We’re keen to help educate the market in understanding their own capabilities to get back to business-as-usual post an attack. An interruption to operations caused by a cyberattack can cost businesses an enormous amount, financially and reputationally, so this type of intelligence is vital. In today’s world of heightened attacks, you need a multi-disciplinary layered approach involving ongoing diligence, training and investment, if you are going to be ready to minimise business interruption from a cyber event as well as proactively prevent your company from becoming the next cyberattack headline.”

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?