Blog

Ransomware attacks are evolving, now targeting not just production systems but also backup environments. This shift underscores the need for healthcare organizations and other regulated enterprises to develop backup and recovery strategies that can withstand privileged misuse, destructive malware, and operational disruptions. Immutable backups are increasingly essential, as they ensure at least one reliable recovery point remains available—even if an attacker gains access to administrative systems or attempts to delete backup data.

A formal Business Impact Analysis (BIA) gives leaders a clear, data-driven view of which services, processes, and dependencies matter most during disruption. By tying BIA to frameworks like NIST SP 800‑34 and the NIST Cybersecurity Framework, and by partnering with an independent advisor such as JANUS Associates, organizations can transform continuity plans into resilient, executable strategies and build a defensible cyber risk posture

Today, cybersecurity is more than just having the right technology. As threats and rules change, organizations need to be proactive, not just reactive. A structured cybersecurity maturity assessment framework empowers leaders to evaluate their risk posture, prioritize improvements, and align operations with global standards such as CMMC Cyber Security, NIST, and ISO 27001.

The DEC and DOH now require all water and wastewater utilities in New York state to follow basic cybersecurity standards. The focus is sustained protection rather than a one-time exercise, and these requirements align with federal cybersecurity guidance.

Disaster recovery, business continuity, and incident response plans are no longer ‘nice to have’; they are core disciplines for achieving cyber resilience. Organizations that can detect, contain, and quickly recover from disruptions are better positioned to protect revenue, customer trust, and shareholder value.

Starting October 1, 2026, Connecticut’s new bill, Raised Bill No. 117, will require organizations to hire outside forensic experts and submit a detailed report to the state if they discover a data breach affecting at least 100,000 Connecticut residents. This only applies to Connecticut residents and excludes non-CT residents. For organizations across the U.S. handling Connecticut resident data, a single large breach could trigger Connecticut’s requirements regardless of location.