{"id":520274,"date":"2024-06-14T14:45:07","date_gmt":"2024-06-14T18:45:07","guid":{"rendered":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report"},"modified":"2024-06-27T10:00:18","modified_gmt":"2024-06-27T14:00:18","slug":"cyber-recovery-readiness-report","status":"publish","type":"page","link":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report","title":{"rendered":"2024 Cyber Recovery Readiness Report\u00a0"},"content":{"rendered":"
\n\t
\n\t\t\n\t\t\n\t\t\n\t\t

\n\t\t\tCyber Recovery Readiness Report: Discover What a Breach Can Teach\t\t<\/h1>\n\n\t\t

\n\t\t\tLearn hard fought lessons about data security, recovery, and cyber resilience from 1,000 global leaders in the inaugural Cyber Recovery Readiness Report from Commvault and GigaOm.  \t\t<\/p>\n\n\t\t

\n\t\t\t\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\tDownload report\t\t\t\t<\/span>\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t
\n\t\t\t\t\t\t\"\"\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\n\n
\n\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\n\t\t\t\t\tCyber Readiness Gaps \t\t\t\t<\/span>\n\t\t\t\n\t\t\t\t\t\t

\n\t\t\t\tAre you ready for the next breach? Our data says you may not be. <\/mark>\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\n\t\t
\n\t\t\t\n
\n\t\n\t\n\t
\n\n\t\t\t\t\t\t

\n\t\t\t\t\t83%\t\t\t\t<\/h3>\n\t\t\t\n\t\t

\n\t\t\tof organizations surveyed experienced a material security breach. \t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n

\n\t\n\t\n\t
\n\n\t\t\t\t\t\t

\n\t\t\t\t\t42%\t\t\t\t<\/h3>\n\t\t\t\n\t\t

\n\t\t\tof leaders lack clarity on who is responsible for cyber resilience and recovery. \t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n

\n\t\n\t\n\t
\n\n\t\t\t\t\t\t

\n\t\t\t\t\t55%\t\t\t\t<\/h3>\n\t\t\t\n\t\t

\n\t\t\tof respondents are not fully confident they could recover systems and data following a major incident.\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\t\t<\/div>\n\n\t\t\t<\/div>\n<\/div>\n\n\n

\n\t
\n\t\t
\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t

5 Proven Resiliency Markers of Cyber-Ready Organizations<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\n\t\n\t\t
\n\t\t
\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t
\n\t
\n
\n
\n \"\" <\/div>\n <\/div>\n \n

Security tools to enable early warning about risk, including insider risk <\/mark><\/mark><\/h3>\n \n

Early warning security tools such as Intrusion Detection Systems and Endpoint Detection and Response proactively identify and mitigate cyber threats before they cause significant damage.<\/p>\n \n \n <\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\t\t\t
\n\t
\n\t
\n
\n
\n \"\" <\/div>\n <\/div>\n \n

A known-clean dark site or secondary system in place <\/mark><\/h3>\n \n

An isolated recovery environment can be quickly activated to maintain business continuity and data integrity during a cyber attack, enhancing cyber resiliency and minimizing downtime.<\/p>\n \n \n <\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\t\t\t
\n\t
\n\t
\n
\n
\n \"\" <\/div>\n <\/div>\n \n

An isolated environment to store an immutable copy of the data <\/mark><\/h3>\n \n

Maintaining an air-gapped, immutable copy of data behind a third party’s infrastructure ensures it remains unchanged and secure from cyber threats like ransomware, enhancing data integrity and providing a reliable recovery option.<\/p>\n \n \n <\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\t\t\t
\n\t
\n\t
\n
\n
\n \"\" <\/div>\n <\/div>\n \n

Defined runbooks, roles, and processes for incident response <\/mark><\/h3>\n \n

Tested runbooks offer structured, step-by-step instructions and clearly defined roles to efficiently handle cyber incidents, speeding recovery and maintaining operational continuity.<\/p>\n \n \n <\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\t\t\t
\n\t
\n\t
\n
\n
\n \"\" <\/div>\n <\/div>\n \n

Specific measures to show cyber recovery readiness and risk <\/mark><\/h3>\n \n

Metrics and tests, including regular recovery drills and risk assessments, assess recovery capabilities from cyber incidents, validate recovery strategies, and highlight areas for improvement.<\/p>\n \n \n <\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t