Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags | Developed By eCorpIT

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Business > RISE IN CYBERATTACKS HIGHLIGHTS THE IMPORTANCE OF A SOLID BUSINESS CONTINUITY PLAN
    Business

    RISE IN CYBERATTACKS HIGHLIGHTS THE IMPORTANCE OF A SOLID BUSINESS CONTINUITY PLAN

    Published by Gbaf News

    Posted on April 27, 2017

    7 min read

    Last updated: January 21, 2026

    Illustration depicting the rising cybersecurity threats faced by banks and financial institutions, emphasizing the need for improved security measures in the industry.
    Cybersecurity threats targeting banks and financial institutions - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Robert Rutherford, CEO of the business and technical consultancy QuoStar

    It’s no secret that the number of cyberattacks on UK businesses is increasing year on year. However, even though this trend can be seen across many different industries, many firms are still unprepared when it comes to cybersecurity.

    With the number of Distributed Denial of Service (DDoS) attacks on the rise, it should be clear to all businesses that it’s time start to implementing the strategies that are needed to keep firms safe from cybercriminals.

    After all, an attack on a company’s IT infrastructure can create total chaos for businesses of all sizes. As such, when these incidents do occur, it’s vital that firms have the resources available to respond quickly and with as little disruption as possible. 

    Prevention is better than a cure 

    For companies looking to protect themselves against a cyberattack, a good starting point would be the ISO 27001 standard, which is a recognised industry benchmark for managing IT security. Implementing this standard is a great way to determine what controls could be used to prevent cyberattacks and continually improve a firm’s information security.

    Businesses should also consider creating an Information Classification Policy (ICP) to ensure that any sensitive information is handled according to the risk it poses to the organization. Under this model, firms can assign a risk level to any sensitive information, so that they can clearly set-out the methods and appropriate resources for handling this data, as well as any encryption, storage or transition requirements.

    Policies like these can go some way towards boosting security, but they are not enough; employees will also need to be educated on how to spot, block and report suspicious activity in order to prevent cyber criminals from accessing an organisation’s network. By responding to a seemingly innocent phishing email, or by falling for a convincing phone call, employees can unintentionally provide hackers with all the information they need to access an organisation’s data.

    With this in mind, employees at the very least should be taught to be on the alert for any activity – even when it appears legitimate – that asks for login details or other private information. Hosting regular seminars and workshops to raise awareness of internal threats is therefore also vital, as employees must be able to recognise red flags and understand when to inform management of any suspicious activity.

    Limiting the damage of a breach

    Even with the best training and IT security measures in the world, cybercrime will continue to impact businesses across the globe. As such, preventing a breach is only half the story: businesses also need to consider how they will keep the business operational in the event of an attack, as the impact of a breach can extend beyond IT.

    There are ways to combat this risk. Having a strong business continuity plan will enable firms to take immediate action if their IT system has been compromised.

    Cybersecurity and business continuity are actually two sides of the same coin; by working in tandem, these strategies can help to mitigate both the cost and impact of data breaches. There are three key elements to consider when implementing this kind of plan: resilience, recovery and response.

    To guarantee resilience in the face of an attack, firms will need to ensure that their critical business functions will be largely unaffected by such an intrusion; this is where a strong ICP can help. Secondly, they will need to have arrangements in place to recover and restore less critical business functions as quickly as possible. Lastly and most importantly, firms will need to establish the capability and readiness of their employees to tackle and cope effectively with an unexpected attack.

    Needless to say, all businesses need to have a robust cybersecurity plan in place to prevent attacks and protect their data and systems, but they must also have a plan they can follow if an attack – and associated outage – does occur. Any failures in this regard can be incredibly costly, not only financially, but also in terms of the damage they can cause to a company’s reputation.

    Robert Rutherford, CEO of the business and technical consultancy QuoStar

    It’s no secret that the number of cyberattacks on UK businesses is increasing year on year. However, even though this trend can be seen across many different industries, many firms are still unprepared when it comes to cybersecurity.

    With the number of Distributed Denial of Service (DDoS) attacks on the rise, it should be clear to all businesses that it’s time start to implementing the strategies that are needed to keep firms safe from cybercriminals.

    After all, an attack on a company’s IT infrastructure can create total chaos for businesses of all sizes. As such, when these incidents do occur, it’s vital that firms have the resources available to respond quickly and with as little disruption as possible. 

    Prevention is better than a cure 

    For companies looking to protect themselves against a cyberattack, a good starting point would be the ISO 27001 standard, which is a recognised industry benchmark for managing IT security. Implementing this standard is a great way to determine what controls could be used to prevent cyberattacks and continually improve a firm’s information security.

    Businesses should also consider creating an Information Classification Policy (ICP) to ensure that any sensitive information is handled according to the risk it poses to the organization. Under this model, firms can assign a risk level to any sensitive information, so that they can clearly set-out the methods and appropriate resources for handling this data, as well as any encryption, storage or transition requirements.

    Policies like these can go some way towards boosting security, but they are not enough; employees will also need to be educated on how to spot, block and report suspicious activity in order to prevent cyber criminals from accessing an organisation’s network. By responding to a seemingly innocent phishing email, or by falling for a convincing phone call, employees can unintentionally provide hackers with all the information they need to access an organisation’s data.

    With this in mind, employees at the very least should be taught to be on the alert for any activity – even when it appears legitimate – that asks for login details or other private information. Hosting regular seminars and workshops to raise awareness of internal threats is therefore also vital, as employees must be able to recognise red flags and understand when to inform management of any suspicious activity.

    Limiting the damage of a breach

    Even with the best training and IT security measures in the world, cybercrime will continue to impact businesses across the globe. As such, preventing a breach is only half the story: businesses also need to consider how they will keep the business operational in the event of an attack, as the impact of a breach can extend beyond IT.

    There are ways to combat this risk. Having a strong business continuity plan will enable firms to take immediate action if their IT system has been compromised.

    Cybersecurity and business continuity are actually two sides of the same coin; by working in tandem, these strategies can help to mitigate both the cost and impact of data breaches. There are three key elements to consider when implementing this kind of plan: resilience, recovery and response.

    To guarantee resilience in the face of an attack, firms will need to ensure that their critical business functions will be largely unaffected by such an intrusion; this is where a strong ICP can help. Secondly, they will need to have arrangements in place to recover and restore less critical business functions as quickly as possible. Lastly and most importantly, firms will need to establish the capability and readiness of their employees to tackle and cope effectively with an unexpected attack.

    Needless to say, all businesses need to have a robust cybersecurity plan in place to prevent attacks and protect their data and systems, but they must also have a plan they can follow if an attack – and associated outage – does occur. Any failures in this regard can be incredibly costly, not only financially, but also in terms of the damage they can cause to a company’s reputation.

    More from Business

    Explore more articles in the Business category

    Image for Empire Lending helps SMEs secure capital faster, without bank delays
    Empire Lending helps SMEs secure capital faster, without bank delays
    Image for Why Leen Kawas is Prioritizing Strategic Leadership at Propel Bio Partners
    Why Leen Kawas is Prioritizing Strategic Leadership at Propel Bio Partners
    Image for How Commercial Lending Software Platforms Are Structured and Utilized
    How Commercial Lending Software Platforms Are Structured and Utilized
    Image for Oil Traders vs. Tech Startups: Surprising Lessons from Two High-Stakes Worlds | Said Addi
    Oil Traders vs. Tech Startups: Surprising Lessons from Two High-Stakes Worlds | Said Addi
    Image for Why More Mortgage Brokers Are Choosing to Join a Network
    Why More Mortgage Brokers Are Choosing to Join a Network
    Image for From Recession Survivor to Industry Pioneer: Ed Lewis's Data Revolution
    From Recession Survivor to Industry Pioneer: Ed Lewis's Data Revolution
    Image for From Optometry to Soul Vision: The Doctor Helping Entrepreneurs Lead With Purpose
    From Optometry to Soul Vision: The Doctor Helping Entrepreneurs Lead With Purpose
    Image for Global Rankings Revealed: Top PMO Certifications Worldwide
    Global Rankings Revealed: Top PMO Certifications Worldwide
    Image for World Premiere of Midnight in the War Room to be Hosted at Black Hat Vegas
    World Premiere of Midnight in the War Room to be Hosted at Black Hat Vegas
    Image for Role of Personal Accident Cover in 2-Wheeler Insurance for Owners and Riders
    Role of Personal Accident Cover in 2-Wheeler Insurance for Owners and Riders
    Image for The Young Rich Lister Who Also Teaches: How Aaron Sansoni Built a Brand Around Execution
    The Young Rich Lister Who Also Teaches: How Aaron Sansoni Built a Brand Around Execution
    Image for Q3 2025 Priority Leadership: Tom Priore and Tim O'Leary Balance Near-Term Challenges with Long-Term Strategic Wins
    Q3 2025 Priority Leadership: Tom Priore and Tim O'Leary Balance Near-Term Challenges with Long-Term Strategic Wins
    View All Business Posts
    Previous Business PostHOLDING ONTO AND RECRUITING TALENT POST-BREXIT
    Next Business PostWHY THE FCA’S IT OUTAGE SHOULD BE A CALL TO ACTION FOR THE INSURANCE INDUSTRY