transruption.org

The digital toolbox for
the digital winners of today and tomorrow

Business excellence for decision-makers & managers by and with Sanjay Sauldie

transruption
transruption

transruption: The digital toolbox for
the digital winners of today and tomorrow

13 November 2025

Cyber defence strategies: How managers stop cybercrime

4.9
(718)






Cyber defence strategies: How managers stop cybercrime


In an increasingly digitalised world, the threat of cybercrime is growing exponentially. Organisations of all sizes are facing new challenges every day. Managers need to understand that effective cyber defence strategies are no longer an option, but a necessity. The combination of technical solutions, organisational measures and human factors forms the foundation. This article shows how you as a manager can use intelligent cyber defence strategies to protect your company from cyber attacks[1].

Understanding the basics of modern cyber defence strategies

Effective cyber defence strategies are based on three pillars: technology, organisation and people.[1] Many managers focus exclusively on technical solutions. This is a mistake. The best firewall is of little use if employees click on suspicious emails without a second thought. Malware, phishing and ransomware are often the result of human error. This is why cyber defence strategies need to be considered holistically[1].

A financial services provider recognised this problem and acted quickly. The company introduced several layers of security. In addition to technical measures, it invested heavily in penetration tests and regular employee training. Hidden vulnerabilities became visible. The workforce learnt to recognise threats and react correctly[1].

Technical foundations for effective cyber defence strategies

Up-to-date software updates are the be-all and end-all.[1] Outdated systems open doors for attackers. They offer known vulnerabilities that are easily exploited. This problem is particularly evident in the telecommunications industry.[1] Firewalls form the first line of defence. They prevent unauthorised access and block dangerous content.[4] Antivirus software scans all incoming data for malware. Web application firewalls specifically protect web applications from hacker attacks from the internet[1].

Network segmentation limits damage in an emergency. A successful attack on one area does not automatically attack the entire network. Encryption of sensitive data increases the barrier for unauthorised persons. Even if data is stolen, it is worthless without a key.[1][4] Strict access rights ensure that only authorised persons can view sensitive information.

Best practice at the customer (name hidden due to NDA contract): A medium-sized company in the mechanical engineering sector implemented a comprehensive infrastructure. Backups were stored daily in secure, external locations and regularly checked for functionality. In the event of a ransomware attack, the company was able to restore all systems within four hours. As a result, the financial loss was limited to a few hundred euros instead of several hundred thousand.

Backup strategies as a lifeline

Regular backups are essential[4] and a must for all companies that can be restored quickly. Cloud storage solutions offer scalability and flexibility[3] Automated backups minimise human error. Routine testing of recovery procedures confirms their efficiency[3], so you know that everything will work in an emergency.

Combining preventive and reactive measures in cyber defence strategies

The best strategy combines prevention with rapid response[1]. Preventive measures include regularly updating and patching software. Outdated systems offer attackers easily exploited attack surfaces.[1] Regular network monitoring recognises suspicious activity at an early stage. Vulnerability assessments identify gaps before criminals find them[2].

Reactive measures take effect when it is too late for prevention.[2] Incident response involves immediate steps to minimise damage. Containment, elimination and recovery must take place quickly. Disaster recovery restores normal operations. Business continuity planning ensures stability in critical moments[2].

Defence-in-depth as the core strategy of cyber defence strategies

Defence-in-Depth uses multiple layers of defence[2] Attackers must overcome multiple barriers. One layer can fail without compromising the system. The probability of recognising and stopping attacks increases dramatically.[2] An insurance company implemented this strategy. It combined firewalls with intrusion detection systems and multi-factor authentication. An attacker who breaks through one level fails at the next.

Zero trust approach revolutionises cyber defence strategies

Zero Trust assumes that no one is automatically trustworthy.[2] Every access is strictly checked, whether from inside or outside.[5] Neither internal nor external network resources are considered secure.[5] This mentality may sound harsh, but it protects companies much better. In Germany, 28 per cent of companies are already implementing zero trust strategies[7].

An energy supply company consistently implemented Zero Trust. Employees even had to re-authenticate themselves when accessing their own data. That was inconvenient at first. But it prevented cyber criminals from getting through with stolen access data. Any attempt was immediately recognised and blocked.

Risk-based security in modern cyber defence strategies

Risk-based security prioritises the most critical assets[2] and includes identification, assessment and prioritisation. Threats and vulnerabilities are assessed. Security measures are implemented according to the level of risk.[2] Small companies with limited budgets particularly benefit from this. They can focus resources on the most valuable areas.

The role of the HR department and management culture

Managers often underestimate the role of HR.[7] They play a key role in minimising risk. Training and security guidelines are their responsibility[7] Identity and access management are supported by HR. Access rights are managed. Security culture is promoted[7] A resilient workforce is just as crucial as technical upgrades[7].

Companies are massively increasing their budgets for cyber security.[7] The increasing risks require strategies that involve all areas. HR, finance and other departments need to be involved[7] No cyber defence strategy will work without the support of the management. Managers must set an example and exemplify security.

Training as the foundation of effective cyber defence strategies

Regular cyber security training for employees is essential.[3] Every employee is a potential vulnerability or strength. Awareness creates behavioural change. Employees who recognise threats actively prevent attacks. One hospital introduced monthly training sessions. The rate of successful phishing attacks fell by 85 per cent[3].

Crisis exercises train the correct response in an emergency[7]. Employees learn their roles. Problems are recognised at an early stage. Response plans are tested and improved.[7] One bank organised annual cyber war games. An attack was simulated. Teams reacted in a coordinated manner. In a real emergency, everything worked smoothly.

Strengthening resilience and crisis management

The strategy is shifting from technology to crisis management.[5] Investments in new systems and cloud transformation have significantly improved the level of IT security in many places.[5] Now it is a matter of reacting quickly and limiting the damage.[5] Companies must remain capable of acting in an emergency and continue their business operations.

Best practice at the customer (name hidden due to NDA contract): A financial services provider developed a comprehensive emergency and recovery plan. The company defined all critical business processes. A maximum downtime was defined for each process. All necessary measures were documented. Roles were clearly assigned. When a real attack took place, operations could be resumed after just two hours. The loss of business was minimal.

Incident response and phasing

A structured incident response procedure is essential. Phase 0 defines objectives, expectations and the contractual framework. Phase 1 scans systems and collects initial data. Phase 2 quarantines the attack. Phase 3 analyses and forensically investigates what happened[6] Each phase has clear responsibilities and processes.

Practical steps for managers

Managers have to answer several questions:[8] How can cyber attacks be prevented? What happens if there is an attack? Who is responsible in which areas? What can each individual employee do?[8] These questions should be answered in an IT security strategy.

Assessment of the current IT security landscape

The first step is a technical analysis. It determines the current state of IT security. The aim is to create a holistic picture of security. Critical business processes are identified. Vulnerability analysis and risk assessment are carried out.[8] In which IT systems are there technical vulnerabilities? How critical are they? How high is the company's risk?[8]

Development of a comprehensive cybersecurity strategy

A robust cybersecurity strategy is crucial[3] to protect sensitive data. It ensures business continuity in the event of cyber threats[3] A clearly defined strategy should include comprehensive risk assessment. Appropriate security measures are implemented. A structured incident response plan is created[3] The plan should be customised to the industry and size of the company. Security requirements are particularly high in the banking sector[8].

Investments in technology and resources

Updated technology is necessary.[3] Endpoint protection, network monitoring and data backup solutions are essential.[3] These form a comprehensive cyber security strategy. But technology alone is not enough. Human resources are just as important. A Chief Information Security Officer coordinates everything. Specialised teams are set up[8].

My analysis

Well-developed and continuously adapted cyber defence strategies are essential today[1] to protect companies against the increasing complexity and diversity of cyber threats. Technical means must be combined with awareness and harmonised processes. In this way, organisations can not only ward off acute threats. They also strengthen their future viability and competitiveness in the long term[1].

As a manager, your task is clear. You must anchor cyber defence strategies. Provide budgets. Qualify employees. Exemplify a security culture. This is the only way to create a company that is resilient. A company that recognises attacks, fends them off or can recover from them quickly. A company that is rightly recognised as secure.

Further links from the text above:

[1] Cyber defence strategies: Acting efficiently against digital threats
[2] What is cyber defence? Strategies and measures explained
[3]


Other content worth reading:

Cyber defence strategies: How managers stop cybercrime

written by:

Sanjay Sauldie avatar

Keywords:

#Cyber defence #cyber security 1TP5ManagersBalance #IncidentResponse #Memployee training

Follow me on my channels:

Questions on the topic? Contact us now without obligation

Contact us
=
Please enter the result as a number.

More articles worth reading

Leave a comment