Bob Adams

by Bob Adams

Product Marketing Manager - Security

Posted Mar 14, 2018

Completing your cyber resilience strategy with Durability and Recoverability.

Last time, in part 1 of What is Cyber Resilience and Why Should I Care?, I talked about the cornerstone of an effective cyber resilience strategy with threat protection and adaptability.  Knowing that resilience is more than just security, this week we’ll get into the last two pillars of cyber resilience, durability, and recoverability.


“Expect the best, plan for the worst, and prepare to be surprised” – Denis Waitley

You often hear this phrase and it has many applications. For an organization, you spend countless hours implementing solutions and managing your environment to remain available. Unfortunately, outages can and do happen. The implications of a service disruption can result in massive losses – user productivity halting, transaction delays, and general chaos that can last minutes, hours, to even days. Disruptions can occur due to a ransomware attack, distributed denial of service (DDoS), or environmental causes such as a natural disaster. For O365, downtime is out of your control and there are numerous occasions where O365 has been down for several hours affecting thousands of organizations. However, on-premises organizations plan for patches, upgrades, and migrations; typically scheduling these efforts during off hours. To ensure your organization remains durable, continuity measures must be put in place so all email communication can continue during planned or unplanned downtime. Inbound policy integrity is as critical as uptime and is why choosing a solution with robust architecture to manage the security protections while maintaining email availability is required. Implementing the product that is always available, secure, and able to contain and monitor all communication enables organizations to maintain business as usual while others urgently work to get back online. As you build your organization to remain protected, agile, and available, the final pillar to put in place is the ability to recover should anything go wrong.


It’s not just about backing up your data, but actually being able to put that data to use for the benefit of your organization.

In the highly regulated world of business today, many organizations are required to maintain data for extended periods of time. Ineffective and archaic archive solutions can make administrators feel like their data is being held hostage as they find they are unable to easily access their data or use it for data recovery. How long is your organization required to keep data? How long does it take to search your email data and are you able to easily pull that data back into your email environment? Imagine being able to store as much email data as you want, for as long you want, and have guaranteed access across all end-user devices in a matter of seconds. In addition to storing your data, actually, benefit your organization by using a built-in point-in-time recovery feature to rehydrate mailboxes in the event of data corruption or a ransomware attack. Archiving your data is more than just a place where you put files away, never to see the light of day again, but rather a place where you can readily work with your information and recover it for your users as needed when you need it.

In this blog two-part blog series, I have posed several questions. Whether you’re an IT Administrator or just an interested reader, I challenge you to reflect on these questions and evaluate your cyber resilience profile. Assess the products that you manage and remember: do not hesitate to ask vendors what they mean by the words they use. Cyber resilience is about more than protecting your organization – it’s the combination of various capabilities that allow businesses to prevent, detect, and respond to emerging cyber risks. Implementing the appropriate tools to control and manage various aspects of your organization will ensure you’re always protected, always available, and always able to recover your secure data at any time.

Want more great articles like this?Subscribe to our blog.

Get all the latest news, tips and articles delivered right to your inbox

Bob Adams

by Bob Adams

Product Marketing Manager - Security

Posted Mar 14, 2018

You may also like:

What is Cyber Resilience and Why Should I Care? Part 1

Get started on your road to a cyber resi…

Get started on your road to a cyber resilience strategy with… Read More >

Bob Adams

by Bob Adams

Product Marketing Manager - Security

Posted Feb 03, 2018

Email Security Dos and Don’ts for Employees

What employees should and should not do …

What employees should and should not do to avoid targeted em… Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Feb 22, 2018

How Quickly Will You Recover from A Cyber Attack?

Cyber resilience shifts focus from just …

Cyber resilience shifts focus from just preventing an attack… Read More >

Garrett O'Hara

by Garrett O'Hara

Principal Technical Consultant

Posted Mar 01, 2018