IT resilience refers to a network or system’s ability to withstand the slings and arrows of life and operations, from human error to migration failure to natural disaster. Any of these unavoidable factors can disrupt or even cripple an enterprise.

As a concept, IT resilience is closely related to security. A deliberate attack is, in a sense, a predictable mishap that can befall a network. Moreover, even non-malicious mishaps can have drastic security consequences, such as when an employee accidentally leaves critical data unprotected. A resilient system is capable of standing up to cybercriminals as well as the natural misadventures of the IT world.

The Challenges of IT Resilience

Unfortunately, an IDG report titled “The 2016 State of Resilience: Keep Your Data Moving Forward” suggested that organizations struggled in these areas in the past year.

United Airlines’ flight management systems crashed, for example, forcing hundreds of flight cancellations and snowballing waves of delays. Additionally, glitches in the Royal Bank of Scotland’s system left hundreds of thousands of transactions unprocessed, triggering further disruption. These are just a few high-profile examples mentioned in the study.

The report also identified five domains of IT operations facing major challenges related to resilience: migration, downtime and disaster recovery, cloud, data sharing and outsourcing. Because outsourcing is less technical in nature, we’ll focus on the first four major challenges listed.

Migration

Organizations should periodically migrate their operations to new systems due to technology changes or the demands of growth. These migrations are often disruptive, however.

More than a quarter of respondents to the IDG survey indicated that migrations took between 25 and 100 hours, while one-sixth reported experiencing migrations that took more than 100 hours. Moreover, 44 percent of these IT professionals reported outright migration failures, most often due to applications that did not run on the new system.

Downtime and Disaster Recovery

Migrations are not the only cause of downtime, which can leave enterprises paralyzed. Operator error can also lead to system or network crashes. Remarkably, according to IDG, only 30 percent of respondents worldwide have analyzed costs related to downtime.

But disasters, from statewide floods to server room fires, can cause significant harmful downtime. In these cases, hardware is often damaged beyond repair and data, unless backed up externally, can be lost forever. Only 15 percent of survey participants expressed confidence in their disaster recovery plans.

Cloud Services

By 2015, two-thirds of businesses were actively tapping into the cloud, with software-as-a-service (SaaS) and infrastructure-as-a-service (IaaS) being the most widely used capabilities.

Outsourced cloud computing poses technical challenges similar to those facing in-house services and resources. Cloud is a distinct resilience domain because it is a partnership: If your cloud provider crashes, your cloud-based operations crash along with it. The technology introduces particularly complex resilience issues because non-IT departments may be using unsanctioned cloud services behind the scenes.

Data Sharing

Finally, the growth of data sharing within organizations leads to resilience problems. IT professionals are under pressure to provide more data to other business units more quickly, which has resulted in increased sharing among databases.

Apart from the security implications of fast-growing database activity, exchanges among databases increase the risk of storing inconsistent information in various locations. Seventy percent of professionals expressed concern about data inconsistency, according to the IDG report.

Coping With Complexity in the Big Data Era

Another recent study by the Ponemon Institute, “The 2016 Cyber Resilient Organization,” echoed the concerns described in the IDG survey and underlined the close relationship between resilience and security. That study also identified complexity as one of the greatest challenges to IT resilience.

Organizations are embracing the big data era, gathering and generating more information in more varied ways than ever before. Meanwhile, cloud and mobility are causing that data to move along more complex paths. Organizations and security professionals must be proactive to ensure IT resilience in this increasingly complicated world.

More from Risk Management

Most organizations want security vendor consolidation

4 min read - Cybersecurity is complicated, to say the least. Maintaining a strong security posture goes far beyond knowing about attack groups and their devious TTPs. Merely understanding, coordinating and unifying security tools can be challenging.We quickly passed through the “not if, but when” stage of cyberattacks. Now, it’s commonplace for companies to have experienced multiple breaches. Today, cybersecurity has taken a seat in core business strategy discussions as the risks and costs have risen dramatically.For this reason, 75% of organizations seek to…

How IBM secures the U.S. Open

2 min read - More than 15 million tennis fans around the world visited the US Open app and website this year, checking scores, poring over statistics and watching highlights from hundreds of matches over the two weeks of the tournament. To help develop this world-class digital experience, IBM Consulting worked closely with the USTA, developing powerful generative AI models that transform tennis data into insights and original content. Using IBM watsonx, a next-generation AI and data platform, the team built and managed the entire…

How NIST Cybersecurity Framework 2.0 Tackles Risk Management

4 min read - The NIST Cybersecurity Framework 2.0 (CSF) is moving into its final stages before its 2024 implementation. After the public discussion period to inform decisions for the framework closed in May, it’s time to learn more about what to expect from the changes to the guidelines. The updated CSF is being aligned with the Biden Administration’s National Cybersecurity Strategy, according to Cherilyn Pascoe, senior technology policy advisor with NIST, at the 2023 RSA Conference. This sets up the new CSF to…

Why consumer drones represent a special cybersecurity risk

3 min read - Cybersecurity staff at an East Coast financial services company last summer detected unusual activity on its internal Atlassian Confluence page originating inside the company’s network. The MAC address used locally belonged to an employee known to be currently using the same MAC address remotely, according to a security specialist named Greg Linares, who had secondhand information about the attack. So, the team used a Fluke AirCheck Wi-Fi Tester device to identify the device logged in, which led the team to…