{"id":187,"date":"2025-09-17T16:50:48","date_gmt":"2025-09-17T06:50:48","guid":{"rendered":"https:\/\/qld.cybersafebusiness.au\/index.php\/2025\/09\/17\/how-to-develop-cyber-risk-mitigation-strategy\/"},"modified":"2025-09-17T16:50:48","modified_gmt":"2025-09-17T06:50:48","slug":"how-to-develop-cyber-risk-mitigation-strategy","status":"publish","type":"post","link":"https:\/\/qld.cybersafebusiness.au\/index.php\/2025\/09\/17\/how-to-develop-cyber-risk-mitigation-strategy\/","title":{"rendered":"How to develop cyber risk mitigation strategy?"},"content":{"rendered":"<p>If you have been following this post series welcome back and thank you for your support.<\/p>\n<p>Hopefully, you have a change to complete the Business Impact Assessment (BIA)<\/p>\n<p>exercise and you have recognized the critical systems, critical network, and<\/p>\n<p>critical data of your business that need to be protected.<\/p>\n<p>Yes, the outcome of the BIA assessment can be daunting, however if you have completed<\/p>\n<p>this exercise then you are doing better than others who has not at all.<\/p>\n<p>Now, since you are aware of the critical assets, you should invite your IT service<\/p>\n<p>provider and discussed the BIA assessment with them. We suggest you ask<\/p>\n<p>questions that avoid \u2018yes or no\u2019 answer. <\/p>\n<p>Here are some of example questions that we would ask the IT provider when we develop mitigation strategy for our clients: <\/p>\n<p><b>\u00b7<\/b>       <b>What are the protection systems in place to mitigate cyber threat?<\/b><\/p>\n<p><b>\u00b7       What measures or mitigation strategies in place to ensure the availability and<\/b><\/p>\n<p><b>accessibility of the critical systems in the event of Denial of Services exercised<\/b><\/p>\n<p><b>or malware such as ransomware?<\/b><\/p>\n<p><b>\u00b7       In the event of Ransomware, what technology(s) or solution that would enable the<\/b><\/p>\n<p><b>organization to recover within the milestone of Recover Point Objective (RPO)?<\/b><\/p>\n<p><b>\u00b7&nbsp; What\u2019s the backup policy in place? What monitoring in place to ensure the backup integrity and<\/b> <b>its ability to be used during disaster recovery?<\/b><\/p>\n<p><b>\u00b7       What is the policy and procedure in place to detect potential cyber threat and<\/b><\/p>\n<p><b>immediately react to the threat?<\/b><\/p>\n<p>We hope this post helps you.<\/p>\n<p>Additionally, you are welcome to reach us if you have further queries for the above.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you have been following this post series welcome back and thank you for your support. Hopefully, you have a change to complete the Business Impact Assessment (BIA) exercise and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":186,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-187","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/posts\/187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/comments?post=187"}],"version-history":[{"count":0,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/posts\/187\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/media\/186"}],"wp:attachment":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/media?parent=187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/categories?post=187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/tags?post=187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}