01/15/2025 | News release | Distributed by Public on 01/15/2025 08:58
What's the difference between disaster recovery and cyber recovery? While they might seem similar at first, a deeper dive reveals significant differences.
We partnered with ESG to explore these distinctions, surveying 500 IT and security leaders worldwide. Our findings, detailed in the report "Preparedness Gap: Why Cyber-recovery Demands a Different Approach From Disaster Recovery," highlight the greater complexity and reach of cyber recovery (CR).
This free report is packed with data that could change your approach to CR.
Only 26% of respondents are confident in their ability to protect all mission-critical applications and data. And only 20% are confident they're protecting all apps and data needed to remain operational.
CR is significantly more complicated than traditional disaster recovery (DR). Among our respondents, 70% say CR is either more complex, takes longer, or both. While both aim to restore operations, CR involves additional steps for successful recovery.
Nearly all respondents (91%) say the complexity with CR begins with spending significant time and effort on forensic analysis to determine the full scope of the incident. And 85% say recovery without establishing a cleanroom environment creates significant risk of reinfection. A similar number of respondents (83%) fear that rushing to recover from a cyber incident could destroy valuable evidence.
It's not just the extra steps needed that makes CR more complicated. Effective CR requires specialized processes and technologies as well. Sixty-four percent of respondents say the technologies for CR are more complex than traditional DR. And people skills are a problem. Fifty-nine percent of respondents report finding and retaining staff with the right skills is harder for CR, than DR.
Ransomware payments are typically motivated by RTO needs, so attackers know that taking out the backup infrastructure will exacerbate the situation for the victim. Among our respondents, 92% say they've suffered from attacks that explicitly target backups, and 71% say those kinds of attacks account for half or more of all attacks. The good news is nearly all (96%) report that they're taking extra measures to protect at least some or all of their backup copies.
It's not all black and white when it comes to DR vs CR. Despite the differences, many organizations integrate CR planning into their broader DR programs. Over 52% of organizations include CR as part of their DR strategy, and even when managed separately, there is a high degree of alignment in processes and protocols.
STRIVE Episode 12: Traditional Disaster Recovery Plans vs. Modern Cyber Recovery Plans
In Episode 12 of the STRIVE Podcast, host Darren Thomson outlines the differences between traditional disaster recovery plans and modern cyber recovery plans.
Let's be honest, ransomware attacks are downright nasty. Aside from the obvious data loss and downtime:
On the financial side, nearly a quarter of respondents (23%) report having paid a ransom last year, with the average largest payment reportedly being nearly $3 million. Given those high stakes, it's vital to learn all you can to prepare your organization to tackle the complexities of CR.
Take a look at the full report here. If you're looking to bolster your CR capabilities, I invite you to check out Beyond Disaster Recovery: Why You Need a Different Strategy When Ransomware Strikes.