January 27, 2017 By Rick M Robinson 3 min read

IT resilience refers to a network or system’s ability to withstand the slings and arrows of life and operations, from human error to migration failure to natural disaster. Any of these unavoidable factors can disrupt or even cripple an enterprise.

As a concept, IT resilience is closely related to security. A deliberate attack is, in a sense, a predictable mishap that can befall a network. Moreover, even non-malicious mishaps can have drastic security consequences, such as when an employee accidentally leaves critical data unprotected. A resilient system is capable of standing up to cybercriminals as well as the natural misadventures of the IT world.

The Challenges of IT Resilience

Unfortunately, an IDG report titled “The 2016 State of Resilience: Keep Your Data Moving Forward” suggested that organizations struggled in these areas in the past year.

United Airlines’ flight management systems crashed, for example, forcing hundreds of flight cancellations and snowballing waves of delays. Additionally, glitches in the Royal Bank of Scotland’s system left hundreds of thousands of transactions unprocessed, triggering further disruption. These are just a few high-profile examples mentioned in the study.

The report also identified five domains of IT operations facing major challenges related to resilience: migration, downtime and disaster recovery, cloud, data sharing and outsourcing. Because outsourcing is less technical in nature, we’ll focus on the first four major challenges listed.

Migration

Organizations should periodically migrate their operations to new systems due to technology changes or the demands of growth. These migrations are often disruptive, however.

More than a quarter of respondents to the IDG survey indicated that migrations took between 25 and 100 hours, while one-sixth reported experiencing migrations that took more than 100 hours. Moreover, 44 percent of these IT professionals reported outright migration failures, most often due to applications that did not run on the new system.

Downtime and Disaster Recovery

Migrations are not the only cause of downtime, which can leave enterprises paralyzed. Operator error can also lead to system or network crashes. Remarkably, according to IDG, only 30 percent of respondents worldwide have analyzed costs related to downtime.

But disasters, from statewide floods to server room fires, can cause significant harmful downtime. In these cases, hardware is often damaged beyond repair and data, unless backed up externally, can be lost forever. Only 15 percent of survey participants expressed confidence in their disaster recovery plans.

Cloud Services

By 2015, two-thirds of businesses were actively tapping into the cloud, with software-as-a-service (SaaS) and infrastructure-as-a-service (IaaS) being the most widely used capabilities.

Outsourced cloud computing poses technical challenges similar to those facing in-house services and resources. Cloud is a distinct resilience domain because it is a partnership: If your cloud provider crashes, your cloud-based operations crash along with it. The technology introduces particularly complex resilience issues because non-IT departments may be using unsanctioned cloud services behind the scenes.

Data Sharing

Finally, the growth of data sharing within organizations leads to resilience problems. IT professionals are under pressure to provide more data to other business units more quickly, which has resulted in increased sharing among databases.

Apart from the security implications of fast-growing database activity, exchanges among databases increase the risk of storing inconsistent information in various locations. Seventy percent of professionals expressed concern about data inconsistency, according to the IDG report.

Coping With Complexity in the Big Data Era

Another recent study by the Ponemon Institute, “The 2016 Cyber Resilient Organization,” echoed the concerns described in the IDG survey and underlined the close relationship between resilience and security. That study also identified complexity as one of the greatest challenges to IT resilience.

Organizations are embracing the big data era, gathering and generating more information in more varied ways than ever before. Meanwhile, cloud and mobility are causing that data to move along more complex paths. Organizations and security professionals must be proactive to ensure IT resilience in this increasingly complicated world.

More from Risk Management

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

When you shouldn’t patch: Managing your risk factors

4 min read - Look at any article with advice about best practices for cybersecurity, and about third or fourth on that list, you’ll find something about applying patches and updates quickly and regularly. Patching for known vulnerabilities is about as standard as it gets for good cybersecurity hygiene, right up there with using multi-factor authentication and thinking before you click on links in emails from unknown senders.So imagine my surprise when attending Qualys QSC24 in San Diego to hear a number of conference…

CISOs drive the intersection between cyber maturity and business continuity

4 min read - The modern corporate landscape is marked by rapid digital change, heightened cybersecurity threats and an evolving regulatory environment. At the nexus of these pressures sits the chief information security officer (CISO), a role that has gained newfound influence and responsibility.The recent Deloitte Global Future of Cyber Survey underscores this shift, revealing that “being more cyber mature does not make organizations immune to threats; it makes them more resilient when they occur, enabling critical business continuity.” High-cyber-maturity organizations increasingly integrate cybersecurity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today