- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- You’ve recovered from a cyberattack—now what?
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
You’ve recovered from a cyberattack—now what?
Cybersecurity planning doesn’t stop after a business recovers from an attack. Learn what steps SMBs can take to be prepare for when the next threat comes knocking. HPE. Your silent partner.
Whew, that was rough! But you did it. Congratulations for surviving one of the most dreaded, increasingly ubiquitous, and constantly mutating threats to modern business. Now that your data and operating capability are back under your control and business continues, your job has only just begun.
Cybersecurity is a constant vigil of active learning, teaching, and awareness. Although you’ve learned a lot through this ordeal, here are a few tips and resources to help make protecting your company and customers a bit easier.
- Harden your infrastructure – update firmware, software, OS, networking controls—especially important with mobility, IoT, and work from home increasing security challenges.
- Designate and empower a cybersecurity leader to create and oversee your plans.
- List what worked well with the recovery process and note ways to improve. Was your time to recover as expected, or do you need to get better? Document your expectations.
- Educate yourself and your company – not just once or twice, but regularly. Learn, teach and learn some more—always.
- Consider implementing a zero-trust model.
Strike while the iron is hot
This may seem a bit mercenary, but it’s a prudent point to make. While the reality and implications and costs of a security breach are now as painfully clear as they ever will be for your company, this could be your best opportunity to get those security strengthening steps to the top of your planning—and budget.
Those steps could be replacing aging servers and operating systems, updating software (not only the business-critical apps, but also other apps which are potential attack vectors), networking and wireless gear, storage backup/recovery solutions, or even adding that long-wished-for and needed IT headcount to keep up with demands on your time and energy.
HPE can help with cybersecurity training
When it comes to cybersecurity experience, you're in good hands—HPE cybersecurity operations protect a $35 billion business with over 64,000 employees. We offer comprehensive worldwide training and certification prep for a diverse, global customer base (more than 90 countries). You'll get access to:
- HPE cybersecurity experts who keep you apprised of the latest industry developments
- Latest HPE innovations, including cybersecurity trends and other HPE technologies
- HPE Virtual Labs (HPE vLabs) for hands-on practice
- Flexible course formats, including live virtual instructor-led training (VILT) courses; traditional classroom training (ILT); self-paced eLearning; and anytime, anywhere learning with HPE Digital Learner
- Convenient purchase options, including HPE Training Credits
Free cybersecurity resources from HPE
- Blog: 8 tips to help you jumpstart your cybersecurity program
- Infographic: 8 tips to improve cybersecurity risk management
- Blog: Best practice guidance on how to increase workplace security awareness
- Infographic: Benefits of adopting the NIST Cybersecurity Framework
- Video: Leveraging HPE StoreEver LTO Tape to combat ransomware
- Learn about Aruba: Edge-To-Cloud Security for the Intelligent Edge
- Learn about Zerto: Ransomware Protection and Disaster Recovery with Zerto
- Learn about HPE Cloud Volumes Backup and how Audio Acoustics leveraged a secure, cost-effective, cloud-based strategy
Now is not the time to take more than a deep breath as you continue planning to keep your business secure and resilient should your security be breached again. Hopefully our discussion today helped you further along the path to post recovery.
Join us on social. Connect with HPE for small and midsize businesses here:
LinkedIn: HPE IT Solutions for SMB
Facebook: HPE I.T. Solutions for SMB
Blog: Servers & Systems: The Right Compute
Newsletter: SMB Technology Now
Mark Simpkins
Hewlett Packard Enterprise
twitter.com/HPE_Servers
linkedin.com/in/mark-simpkins-526a941/
hpe.com/servers
- Back to Blog
- Newer Article
- Older Article
- PerryS on: Explore key updates and enhancements for HPE OneVi...
- Dale Brown on: Going beyond large language models with smart appl...
- alimohammadi on: How to choose the right HPE ProLiant Gen11 AMD ser...
- ComputeExperts on: Did you know that liquid cooling is currently avai...
- Jams_C_Servers on: If you’re not using Compute Ops Management yet, yo...
- AmitSharmaAPJ on: HPE servers and AMD EPYC™ 9004X CPUs accelerate te...
- AmandaC1 on: HPE Superdome Flex family earns highest availabili...
- ComputeExperts on: New release: What you need to know about HPE OneVi...
- JimLoi on: 5 things to consider before moving mission-critica...
- Jim Loiacono on: Confused with RISE with SAP S/4HANA options? Let m...
-
COMPOSABLE
77 -
CORE AND EDGE COMPUTE
146 -
CORE COMPUTE
155 -
HPC & SUPERCOMPUTING
138 -
Mission Critical
88 -
SMB
169