• 03 March 2022
  • Blog Editorial Team
  • 5 minutes to read

While the situation in Ukraine unfolds and sanctions against Russia are implemented, organizations around the world will be looking at what impact this will have on their operations. As IT is a critical component of the day to day functioning of all organizations, CIOs and IT leaders will be tasked with ensuring that it is business as 'almost usual', while taking account of some exceptional circumstances.

The impact on IT systems will vary depending on the size, geographic reach and nature of the organization. A US chain of barber shops is less likely to be impacted than a multi-national bank or retailer with operations across Europe. But the warning of an increase in cyber threats, means all organizations are potentially at risk.

SoftwareONE's CIO Rene Nulsch believes that organizations who are likely to be impacted by this will typically have solid security controls and emergency plans in place and should focus on their standard operating procedures, like running security checks, and backup and recovery tests. But he shared these steps as a checklist for fellow IT decision makers to ensure business continuity.

Step 1: Understand your position and create an impact assessment

If your organization has users or subsidiaries in the affected territories, ensure you understand the scope of the operations in those regions, the number of users involved, data centers in region and the impact all of this might have on your customer service, manufacturing, supply chains and operations.

Step 2: Contact your suppliers and vendors

Contact your global service providers and integrate them into your remediation planning. Big cloud vendors and other software providers will support your crisis planning and will be able to advise on any potential issues regarding their service.

Step 3: Monitor the global sanction lists with your legal team

As sanctions take effect, the flow of goods and services will need to cease. This may have an impact on your IT service delivery and digital supply chains.

Step 4: Check your security measures

With a heightened risk of cyber-attack, organizations should double check that there are no gaps in their security protocols. High risk or valuable data, like ERP systems or those linked to finance or government sites, should be given priority. If any out of service software is running, identify it and ensure relevant patching is done. In addition, remind your employees to follow the basic security hygiene standards:

  • watch out for phishing attacks,
  • do not open unwanted attachments or downloads,
  • keep credentials safe,
  • do not approve unwanted MFA requests
Step 5: Ensure you have a thorough backup and disaster recovery plan in place

Should your systems be attacked or go down, being able to restore and recover data is critical. Even if you have a backup solution in place, it would be prudent to check that those backup and recovery tests are being done regularly. Make sure that your backups are available in multiple geo-regions to prevent incidents driven by national firewalls or other network outages.

This is an unfolding situation. CIOs need to be ready to respond to sudden changes. But ensuring the daily operating procedures that keep systems safe are running, will reduce potential business impact.

Got Questions or Concerns?

If you have any concerns or questions about how to protect your IT systems and ensure business continuity during these exceptional times, please contact your local SoftwareONE representative. Read a message from SoftwareONE's CEO Dieter Schlosser on SoftwareONE's response to the war in Ukraine.

Read more
  • cloud-security, Cybersecurity User Awareness, Cybersecurity
  • Data Security, Security, Cyber Threats, Disaster Recovery, Backup, Cloud Backup
Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment
Comments Write a comment
Your name
Your e-Mail address
Send
Author

Blog Editorial Team

Trend Scouts

IT Trends and industry-relevant novelties

All articles
Related Articles
  • 21 February 2022
  • Bala Sethunathan
  • Cybersecurity, Cybersecurity User Awareness
  • Cyber Security, Data Security

How to Respond to a Breach with an Impactful Incident Response Plan

In the world of cybersecurity, it's best to prepare for the worst. Let's examine some best practices to build an effective incident response plan that reduces risk and enables cyber resilience.

more
Share this story
  • Share on LinkedIn
  • Share on Facebook
  • Share on Xing
  • Share on Twitter
  • 14 February 2022
  • Bala Sethunathan
  • Cybersecurity User Awareness, cloud-security, Cyber Threat Bulletin, Cybersecurity
  • News, Updates

Cyber Security Update January 2022

While 2021 was filled with great uncertainty, there are still guarantees in the cyber security realm: Threat actors will continue to attack.

more
Share this story
  • Share on LinkedIn
  • Share on Facebook
  • Share on Xing
  • Share on Twitter
  • 31 January 2022
  • Bala Sethunathan
  • Managed Security, Cybersecurity User Awareness, Cybersecurity

How to Prevent Social Engineering Attacks

To take proactive steps to prevent social engineering attacks, organizations need to understand how they work. Let's take a look at the different ways to prevent social engineering attacks.

more
Share this story
  • Share on LinkedIn
  • Share on Facebook
  • Share on Xing
  • Share on Twitter
All Blog Articles

Attachments

  • Original Link
  • Original Document
  • Permalink

Disclaimer

SoftwareONE Holding AG published this content on 03 March 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 03 March 2022 17:20:07 UTC.