January 27, 2017 By Rick M Robinson 3 min read

IT resilience refers to a network or system’s ability to withstand the slings and arrows of life and operations, from human error to migration failure to natural disaster. Any of these unavoidable factors can disrupt or even cripple an enterprise.

As a concept, IT resilience is closely related to security. A deliberate attack is, in a sense, a predictable mishap that can befall a network. Moreover, even non-malicious mishaps can have drastic security consequences, such as when an employee accidentally leaves critical data unprotected. A resilient system is capable of standing up to cybercriminals as well as the natural misadventures of the IT world.

The Challenges of IT Resilience

Unfortunately, an IDG report titled “The 2016 State of Resilience: Keep Your Data Moving Forward” suggested that organizations struggled in these areas in the past year.

United Airlines’ flight management systems crashed, for example, forcing hundreds of flight cancellations and snowballing waves of delays. Additionally, glitches in the Royal Bank of Scotland’s system left hundreds of thousands of transactions unprocessed, triggering further disruption. These are just a few high-profile examples mentioned in the study.

The report also identified five domains of IT operations facing major challenges related to resilience: migration, downtime and disaster recovery, cloud, data sharing and outsourcing. Because outsourcing is less technical in nature, we’ll focus on the first four major challenges listed.

Migration

Organizations should periodically migrate their operations to new systems due to technology changes or the demands of growth. These migrations are often disruptive, however.

More than a quarter of respondents to the IDG survey indicated that migrations took between 25 and 100 hours, while one-sixth reported experiencing migrations that took more than 100 hours. Moreover, 44 percent of these IT professionals reported outright migration failures, most often due to applications that did not run on the new system.

Downtime and Disaster Recovery

Migrations are not the only cause of downtime, which can leave enterprises paralyzed. Operator error can also lead to system or network crashes. Remarkably, according to IDG, only 30 percent of respondents worldwide have analyzed costs related to downtime.

But disasters, from statewide floods to server room fires, can cause significant harmful downtime. In these cases, hardware is often damaged beyond repair and data, unless backed up externally, can be lost forever. Only 15 percent of survey participants expressed confidence in their disaster recovery plans.

Cloud Services

By 2015, two-thirds of businesses were actively tapping into the cloud, with software-as-a-service (SaaS) and infrastructure-as-a-service (IaaS) being the most widely used capabilities.

Outsourced cloud computing poses technical challenges similar to those facing in-house services and resources. Cloud is a distinct resilience domain because it is a partnership: If your cloud provider crashes, your cloud-based operations crash along with it. The technology introduces particularly complex resilience issues because non-IT departments may be using unsanctioned cloud services behind the scenes.

Data Sharing

Finally, the growth of data sharing within organizations leads to resilience problems. IT professionals are under pressure to provide more data to other business units more quickly, which has resulted in increased sharing among databases.

Apart from the security implications of fast-growing database activity, exchanges among databases increase the risk of storing inconsistent information in various locations. Seventy percent of professionals expressed concern about data inconsistency, according to the IDG report.

Coping With Complexity in the Big Data Era

Another recent study by the Ponemon Institute, “The 2016 Cyber Resilient Organization,” echoed the concerns described in the IDG survey and underlined the close relationship between resilience and security. That study also identified complexity as one of the greatest challenges to IT resilience.

Organizations are embracing the big data era, gathering and generating more information in more varied ways than ever before. Meanwhile, cloud and mobility are causing that data to move along more complex paths. Organizations and security professionals must be proactive to ensure IT resilience in this increasingly complicated world.

More from Risk Management

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Digital solidarity vs. digital sovereignty: Which side are you on?

4 min read - The landscape of international cyber policy continues to evolve rapidly, reflecting the dynamic nature of technology and global geopolitics. Central to this evolution are two competing concepts: digital solidarity and digital sovereignty.The U.S. Department of State, through its newly released International Cyberspace and Digital Policy Strategy, has articulated a clear preference for digital solidarity, positioning it as a counterpoint to the protectionist approach of digital sovereignty.What are the main differences between these two concepts, and why does it matter? Let’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today