Johnny Carpenter, General Manager of EMEA Commented: “The news this week of yet another cyberattack on MGM Resorts, initiating a system shutdown and disrupting its operations, is yet another in a very long list of attacks that we have witnessed in the past couple of years. Having the right preventive and defensive cybersecurity measures in place for such attacks is a given, and it is what most organisations focus on. But it is also about understanding how the organisation will recover from an incident and how they can limit the extent of an attack."
"Today, being impacted by a cyberattack is almost inevitable. Therefore, companies also need to think about how they can proactively recover, how quickly they can recover, and the cost of recovery to the business. For MGM the priority now will be to stabilise infrastructure, while they find the best copy of their data and restore and continue to drive business operations, bringing systems back online as quickly as possible."
Cybersecurity incident
Interruption to operations caused by a cyberattack can cost businesses an enormous amount"
Johnny Carpenter continues, "Here at 11:11 Systems, we know that recovering from a data-compromising cyberattack requires planning, investment, capabilities, procedures, and more. We also understand how important it is for organisations to recognise the difference between traditional disaster recovery, in response to incidents such as wildfires, earthquakes, and extreme weather conditions, and compromised data recovery in the event of a cybersecurity incident."
He concludes, "We’re keen to help educate the market in understanding their own capabilities to get back to business-as-usual post an attack. An interruption to operations caused by a cyberattack can cost businesses an enormous amount, financially and reputationally, so this type of intelligence is vital. In today’s world of heightened attacks, you need a multi-disciplinary layered approach involving ongoing diligence, training and investment, if you are going to be ready to minimise business interruption from a cyber event as well as proactively prevent your company from becoming the next cyberattack headline.”