{"id":505,"date":"2021-07-06T10:05:06","date_gmt":"2021-07-06T10:05:06","guid":{"rendered":"https:\/\/sattrix.com\/blog\/?p=505"},"modified":"2024-09-26T13:23:19","modified_gmt":"2024-09-26T13:23:19","slug":"what-is-cyber-resilience","status":"publish","type":"post","link":"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/","title":{"rendered":"What is Cyber Resilience?"},"content":{"rendered":"<p><span style=\"color: #000000;\">As more and more organizations are digitalizing, one can&#8217;t ignore the need to protect their sensitive information. As per Mimecast\u2019s The State of Email Security Report 2020, 31% of UK businesses experienced data loss due to a lack of cyber resilience preparedness.\u202f\u00a0<\/span><\/p>\n<p><span style=\"color: black;\">These eye-popping stats raise a critical question: <em><a href=\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/\">What is meant by cyber resilience<\/a><\/em>?<\/span><\/p>\n<p><span style=\"color: #000000;\">Organizations must understand this concept to protect their data and wish for operational continuity against the ever-evolving cyber threats.<\/span><\/p>\n<p><span style=\"color: #000000;\">So without further adieu, lets get started!<\/span><\/p>\n<h2 style=\"color: #000000;\"><b>What is Cyber Resilience Meaning: Essential Insights Explained<\/b><\/h2>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Cyber resilience refers to the ability to prepare for cyber-attacks, respond to and recover from these attacks. It has become a new security norm over the past few years as traditional cybersecurity measures are no longer enough to protect companies from persistent and brutal attacks.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Cyber\u00a0resilience\u202fhelps a company\u00a0defend against and limit the severity of attacks, protect against cyber risks,\u00a0and ensure quick recovery to Business\u00a0as\u00a0Usual (BAU).\u00a0<\/span><\/p>\n<h2><span data-sheets-root=\"1\">Aim of Cyber Resilience<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">It aims to help the organization to respond and recover from a cyber incident, which can include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data breach<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Natural disasters<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Continuity of mission-critical business operations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protecting critical assets<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Securing customer data<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The above measure will help in preventing any financial loss and maintaining robust cyber defenses.<\/span><\/p>\n<h2><span data-sheets-root=\"1\">Why is Cyber Resilience Important?<\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Building cyber resilience is imperative for surviving threats today and in the future. A strong cyber resilience strategy to provide a unified approach combining cybersecurity with data protection. In April 2020 a multinational IT services company confirmed that its network was hit by Maze ransomware that encrypted its servers. In September 2020, a crippling malware attack brought down the computer systems of one of the largest hospital chains in the United States.\u00a0\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><a href=\"https:\/\/www.ibm.com\/downloads\/cas\/YBDGKDXO\" target=\"_blank\" rel=\"noopener nofollow\"><span style=\"color: #ff7700;\">According to a recent survey by IDC,<\/span><\/a> the average cost of downtime exceeds $200,000 per hour. The first step will be to build a detailed relaunch map according to the countries you are operating in and the target audience. Its primary objective will be to determine recovery opportunities. While businesses are having a tough time facing challenges associated with digital transformation such as Cloud migration, shadow IT, shortage of skills, and organizational silos.\u00a0\u00a0\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">\u201c<em>They are less likely to report negative outcomes or impacts from breaches, and more likely to make a faster recovery<\/em>\u201d, according to the\u00a0<a style=\"color: #000000;\" href=\"https:\/\/portswigger.net\/daily-swig\/uk-organizations-becoming-more-resilient-to-data-breaches-and-cyber-attacks\" target=\"_blank\" rel=\"noopener nofollow\">DCMS<\/a>.\u00a0The study found that around a third (32%) of businesses have insured against cyber risks while 85%\u00a0of all businesses\u00a0failed to review the cybersecurity risks.\u00a0<\/span><\/p>\n<h2><span style=\"color: #000000;\">Benefits of Cyber Resilience<\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">It\u2019s critical for companies to build their cyber resilience capabilities.\u00a0UK organizations have become more resilient to data breaches and cyber-attacks. The recent study put together by the Department of Digital, Culture, Media,\u00a0and Sport <span style=\"color: #ff7700;\"><a style=\"color: #ff7700;\" href=\"https:\/\/portswigger.net\/daily-swig\/uk-organizations-becoming-more-resilient-to-data-breaches-and-cyber-attacks\" target=\"_blank\" rel=\"noopener nofollow\">(DCMS)<\/a><\/span> shows that organizations have become more resilient to breaches and attacks over time.<span style=\"color: #ff7700;\">\u00a0<a style=\"color: #ff7700;\" href=\"https:\/\/www.fsb.org.uk\/resources-page\/small-firms-suffer-close-to-10-000-cyber-attacks-daily.html\" target=\"_blank\" rel=\"noopener nofollow\">A Federation of Small Businesses (FSB)<\/a><\/span>\u00a0report\u00a0showed that small firms in the UK suffer close to 10,000 cyber-attacks a day.\u00a0Preparation is key to survival. This means that it\u2019s better to start working on a strategy to reduce the impact.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Here are some of the benefits of cyber resilience:\u00a0<\/strong><\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span style=\"color: #000000;\">It helps you reduce financial losses.\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span style=\"color: #000000;\">A cyber-resilient posture helps you meet legal and regulatory requirements Such as NIS Regulations and the GDPR.\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span style=\"color: #000000;\">It helps you improve your culture and internal processes\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span style=\"color: #000000;\">It protects your brand and business reputation\u00a0<\/span><\/li>\n<\/ul>\n<h2><span style=\"color: #000000;\">Components of Cyber Resilience<\/span><\/h2>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">Business Continuity<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Protects critical infrastructure and reduces damage to ensure continuity of business processes &amp; services during critical events.<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">Disaster Recovery<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Puts focus on improving data security by restoring critical systems, which ensures operations continuity by helping information technology resources recover faster.<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">Risk Management<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Identifies and mitigates a cyber risk caused even through human errors, thus strengthening Cyber resiliency.<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">Cybersecurity<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Taking proactive measures to deal with security breaches to create a Cyber Resilient organization.<\/span><\/p>\n<h2><span style=\"color: #000000;\">How Does Cyber Resilience Work?<\/span><\/h2>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">1. Identify<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Carry assessments to identify organization assets, threats, and vulnerabilities so that the team can prioritize their efforts.<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">2. Protect<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Implement security measures like firewalls and encryption to reduce the chances of incidents.<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">3. Detect<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">24\/7 monitoring of systems to quickly detect security incidents like anomalies or potential breaches.<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">4. Respond<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Create, and execute an appropriate incident response plan to mitigate the impact of incidents.<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">5. Recover<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Creating recovery strategies to help operations resume swiftly after an incident.<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">6. Govern<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Governing and regular reviews to measure the effectiveness of the implemented strategies and making improvements accordingly.<\/span><\/p>\n<h2><span data-sheets-root=\"1\">What Does Cyber Resilience Testing Mean?<\/span><\/h2>\n<p>Evaluating how well an organization can withstand a cyber incident &amp; maintain critical services by simulating attacks and disruptions to check their response and manage efficiency.<\/p>\n<h2><span data-sheets-root=\"1\">How To Improve Cyber Resilience?<\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Sattrix\u00a0can help companies evaluate their environment and develop a defense and prevention plan. We can help you design a backup and recovery plan and we have a Penetration Testing program well in place to identify and mitigate all types of security risks and data breaches.\u00a0<\/span><\/p>\n<p><span style=\"color: #000000;\">We\u00a0help\u00a0companies\u00a0to improve cyber-resilience in the following 5 steps:\u00a0<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">1. Get complete visibility across your company environment<\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Sattrix\u00a0helps\u00a0you get a clear view of your company assets, devices, users, applications,\u00a0and software products. All these assets are super critical to your business. We provide\u00a0the\u00a0ability to drill drown into each detail of your entire system and\u00a0protect your assets from\u00a0attacks.\u00a0\u00a0<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">2. Achieve cyber resilience against all types of broad-level issue<\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">We\u00a0guide\u00a0your company\u00a0to\u00a0procure\u00a0a\u00a0backup and recovery solution.\u00a0Our experts conduct\u00a0disaster drills to protect\u00a0the\u00a0company\u2019s response to any cyber-attack\u00a0and\u00a0educate your staff about breach risk and cyber resilience.<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">3. Hire and retain the best industry talent<\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">We believe in hiring the best talent to serve operational and technical cybersecurity projects to our global clients and partners. Our teams are equipped with the right tools of automation and machine learning (ML).\u00a0\u00a0<\/span><\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">4. Monitor your company assets<\/span><\/h3>\n<p style=\"text-align: justify; color: #000000;\">How do We help big companies get an accurate inventory of their existing assets and monitor them across all types of cyberattacks? At here our experts&#8217; team focuses on cybersecurity fundamentals and employs automation wherever possible for complete visibility, protection, and risk mitigation.<\/p>\n<h3 style=\"font-size: 20px;\"><span data-contrast=\"auto\">5. Become proactive and predictive against cyber-attacks<\/span><\/h3>\n<p style=\"text-align: justify; color: #000000;\">We help companies\u00a0evolve their security posture\u00a0by mapping their attack surface.\u00a0Our security experts\u00a0apply a proactive approach and continuously adjust to a constantly\u00a0changing environment for\u00a0predicting\u00a0and\u00a0mitigating\u00a0breaches and cyber-attacks.<\/p>\n<h2>We Can Help You Build Cyber Resiliency!<\/h2>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Sattrix\u00a0offers\u00a0<span style=\"color: #ff9900;\"><a style=\"color: #ff7700;\" href=\"https:\/\/www.sattrix.com\/\" rel=\"noopener dofollow\"><span style=\"text-decoration: underline;\"><strong>cybersecurity solutions<\/strong><\/span><\/a><\/span>\u00a0based on industry best practices and frameworks.\u00a0To achieve cyber\u00a0resilience,\u00a0we offer various remediations such as\u00a0<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.sattrix.com\/assessment-services\/vulnerability-assessment-services.php\">Vulnerability Assessment<\/a><\/strong><\/span>,\u00a0<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.sattrix.com\/assessment-services\/penetration-testing-services.php\">Penetration Testing program<\/a><\/strong><\/span>, Web App Audit, Code Review, Phishing Exercise, Compliance Implementation, and Audit, <span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.sattrix.com\/managed-services\/soc-as-a-service.php\">Managed SOC<\/a><\/strong><\/span>, <span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.sattrix.com\/managed-services\/device-as-a-service.php\">Managed Devices<\/a><\/strong><\/span>, Threat Hunting, Threat management, and Automated threat response (SOAR)\u00a0well in place to identify and mitigate all types of security risks and data breaches.\u00a0As we\u2019ve helped many\u00a0organizations\u00a0and enterprises globally, we can help you.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As more and more organizations are digitalizing, one can&#8217;t ignore the need to protect their<\/p>\n","protected":false},"author":1,"featured_media":1953,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[22,18],"tags":[56,51,59,52,53,57,54,60,55,58],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cyber Resilience Meaning? A Guide To Empower Defenses<\/title>\n<meta name=\"description\" content=\"Explore what cyber resilience is and how it empowers organizations to withstand and recover from digital threats &amp; Secure your future.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do companies achieve cyber resilience in a post-pandemic world?\" \/>\n<meta property=\"og:description\" content=\"Businesses are facing cybersecurity issues in their IT infrastructure during post-pandemic, Here&#039;s how you can strategize cyber resilience\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Sattrix\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SattrixInfo\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-06T10:05:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-26T13:23:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2021\/07\/How-do-companies-achieve-cyber-resilience-in-a-post-pandemic-world.png\" \/>\n\t<meta property=\"og:image:width\" content=\"482\" \/>\n\t<meta property=\"og:image:height\" content=\"382\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How do companies achieve cyber resilience in a post-pandemic world?\" \/>\n<meta name=\"twitter:description\" content=\"Businesses are facing cybersecurity issues in their IT infrastructure during post-pandemic, Here&#039;s how you can strategize cyber resilience\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2021\/07\/How-do-companies-achieve-cyber-resilience-in-a-post-pandemic-world.png\" \/>\n<meta name=\"twitter:creator\" content=\"@SattrixInfo\" \/>\n<meta name=\"twitter:site\" content=\"@SattrixInfo\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#organization\",\"name\":\"Sattrix\",\"url\":\"https:\/\/www.sattrix.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/SattrixInfo\",\"https:\/\/www.linkedin.com\/company\/sattrix-information-security-private-limited\/\",\"https:\/\/twitter.com\/SattrixInfo\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/sattrix.com\/blog\/wp-content\/uploads\/2021\/05\/Sattrix-Information-Security.png\",\"contentUrl\":\"https:\/\/sattrix.com\/blog\/wp-content\/uploads\/2021\/05\/Sattrix-Information-Security.png\",\"width\":1500,\"height\":414,\"caption\":\"Sattrix\"},\"image\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#website\",\"url\":\"https:\/\/www.sattrix.com\/blog\/\",\"name\":\"Sattrix\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.sattrix.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2021\/07\/How-do-companies-achieve-cyber-resilience-in-a-post-pandemic-world.png\",\"contentUrl\":\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2021\/07\/How-do-companies-achieve-cyber-resilience-in-a-post-pandemic-world.png\",\"width\":482,\"height\":382,\"caption\":\"Cyber Resilience\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/#webpage\",\"url\":\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/\",\"name\":\"What is Cyber Resilience Meaning? A Guide To Empower Defenses\",\"isPartOf\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/#primaryimage\"},\"datePublished\":\"2021-07-06T10:05:06+00:00\",\"dateModified\":\"2024-09-26T13:23:19+00:00\",\"description\":\"Explore what cyber resilience is and how it empowers organizations to withstand and recover from digital threats & Secure your future.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/\",\"url\":\"https:\/\/www.sattrix.com\/blog\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/#webpage\"}}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#\/schema\/person\/6dab33d15055e8cde82c625e94d0bc1c\"},\"headline\":\"What is Cyber Resilience?\",\"datePublished\":\"2021-07-06T10:05:06+00:00\",\"dateModified\":\"2024-09-26T13:23:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/#webpage\"},\"wordCount\":1128,\"publisher\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/what-is-cyber-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2021\/07\/what-is-cyber-resilience-1.jpg\",\"keywords\":[\"#cyberattacks\",\"#cyberresilience\",\"#cyberrisks\",\"#cybersecurity\",\"#cybersecuritysolutions\",\"#databreaches\",\"#post-pandemic\",\"#uk\",\"#ukbusinesses\",\"#vulnerabilityassessment\"],\"articleSection\":[\"Cyber Security\",\"IT Infrastructure Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#\/schema\/person\/6dab33d15055e8cde82c625e94d0bc1c\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3976ddabb5eefc23abf0673e60c595f4?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3976ddabb5eefc23abf0673e60c595f4?s=96&d=retro&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\/\/www.sattrix.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts\/505"}],"collection":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/comments?post=505"}],"version-history":[{"count":32,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts\/505\/revisions"}],"predecessor-version":[{"id":1956,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts\/505\/revisions\/1956"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/media\/1953"}],"wp:attachment":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/media?parent=505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/categories?post=505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/tags?post=505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}