{"id":40650,"date":"2023-01-19T06:34:11","date_gmt":"2023-01-19T11:34:11","guid":{"rendered":"https:\/\/wp266329.wpdns.ca\/la-fonction-%e2%80%afrecuperer%e2%80%af-de-la-cybersecurite\/"},"modified":"2025-04-07T15:08:12","modified_gmt":"2025-04-07T19:08:12","slug":"the-recover-function-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/","title":{"rendered":"The \u201cRecover\u201d function of cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"40650\" class=\"elementor elementor-40650 elementor-39660\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a86b541 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a86b541\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d98047c\" data-id=\"d98047c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-218951f elementor-widget elementor-widget-heading\" data-id=\"218951f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">The \u201cRecover\u201d function of cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-603fe02 elementor-widget elementor-widget-image\" data-id=\"603fe02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1732\" height=\"684\" src=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/Cybers\u00e9curit\u00e9-pour-les-gestionnaires-Banni\u00e8re-blog-2-1.jpg\" class=\"attachment-full size-full wp-image-40653\" alt=\"The \u201cRecover\u201d function of cybersecurity\" srcset=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/Cybers\u00e9curit\u00e9-pour-les-gestionnaires-Banni\u00e8re-blog-2-1.jpg 1732w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/Cybers\u00e9curit\u00e9-pour-les-gestionnaires-Banni\u00e8re-blog-2-1-300x118.jpg 300w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/Cybers\u00e9curit\u00e9-pour-les-gestionnaires-Banni\u00e8re-blog-2-1-1024x404.jpg 1024w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/Cybers\u00e9curit\u00e9-pour-les-gestionnaires-Banni\u00e8re-blog-2-1-768x303.jpg 768w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/Cybers\u00e9curit\u00e9-pour-les-gestionnaires-Banni\u00e8re-blog-2-1-1536x607.jpg 1536w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/Cybers\u00e9curit\u00e9-pour-les-gestionnaires-Banni\u00e8re-blog-2-1-700x276.jpg 700w\" sizes=\"(max-width: 1732px) 100vw, 1732px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5e265dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5e265dc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-895f796\" data-id=\"895f796\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-100632e elementor-widget elementor-widget-text-editor\" data-id=\"100632e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 17px;\"><span style=\"color: #000000;\">This is the last article related to our CyberRisk Control CISO-360 intervention and diagnosis plan. <\/span><span style=\"color: #000000;\">What to do when the worst happens? Despite all the cybersecurity controls and protections in place, your organization may become a victim of a cyberattack on its information systems. Here&#8217;s what managers need to know to mitigate this crisis. <\/span><span style=\"color: #000000;\">This final article in the Cybersecurity for Managers series covers the &#8220;Recover&#8221; feature, which enables a quick resumption of activities. Eficio&#8217;s <strong><a href=\"https:\/\/eficio.ca\/en\/digital-products\/ciso360-cyberrisk-control\/\">CISO-360 Cyber Risk Control diagnostic<\/a><\/strong> provides a series of controls that indicate an organization&#8217;s ability to recover from a cyberattack.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c285441 elementor-widget elementor-widget-testimonial\" data-id=\"c285441\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta elementor-has-image elementor-testimonial-image-position-aside\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png\" class=\"attachment-full size-full wp-image-39547\" alt=\"\" srcset=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png 500w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-300x300.png 300w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-150x150.png 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Pierre Farley<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Eficio Partner and CIO<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a15af4 elementor-widget elementor-widget-text-editor\" data-id=\"5a15af4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 17px;\">The primary objective of the &#8220;Recover&#8221; function is to return to normal business operations as soon as possible. This feature helps recover data, restore it, and restore business capabilities to function as intended. The presence of a recovery plan will determine an organization&#8217;s capacity and how quickly it can return to normal. The &#8220;Recover&#8221; function is directly linked to the &#8220;Identify&#8221; function, which helps to identify an order of priority for restoring services. This prioritization is based on the level of impact on the organization.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e53202 elementor-widget elementor-widget-text-editor\" data-id=\"7e53202\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 17px;\">The following items are essential in the &#8220;Recover&#8221; function:<\/span><\/p><p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\"><strong>\u2022 Recovery Planning &#8211;<\/strong> Involves prioritizing the return to critical services to enable the IT team to focus on the most important activities. Managers should be stakeholders in prioritizing the order in which services will be retrieved. In a cyberattack, all players must work together. A plan should include recovery procedures and responders to eliminate any improvisation that can be disastrous, especially in a context where tension is at its peak.<\/span><\/p><p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\"><strong>\u2022 Improvements &#8211;<\/strong> Updating the plan is a recurring task and must follow the evolution of the systems. A reassessment of critical systems and expectations is required regularly. It is essential to record lessons learned during and after a cybersecurity event, which can help update the plan.<\/span><\/p><p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\"><strong>\u2022 Communication and strategy &#8211;<\/strong> The communication plan is essential for an effective return to service and managing internal and external perceptions. This plan coordinates all stakeholders. It is crucial to consider in advance how to manage a ransom demand.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5b2269 elementor-widget elementor-widget-text-editor\" data-id=\"b5b2269\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 17px;\">Our series of articles on popularization brings together financial controls, as specifically described in our first article in the series, &#8220;CyberRisques based on a financial control model.&#8221; In a financial context, recovery is equivalent to a financial disaster requiring extraordinary means to rectify the situation, such as a recovery plan or protection of financial assets to ensure business continuity. Recovery in a technological context is also important and drastic because if no action is taken, business continuity will also be at risk.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">We often hear news about organizations that have experienced a cyberattack and its impact on their operations, which may last for weeks in some cases. It is conceivable that many of them were unprepared for the recovery function&#8217;s activities. Through the execution of our <strong><a href=\"https:\/\/eficio.ca\/en\/digital-products\/ciso360-cyberrisk-control\/\">CyberRisk Control CISO-360<\/a><\/strong>, we observe that the recovery function is the poor child of a cybersecurity plan. The priority of the teams responsible for cybersecurity is mainly to increase maturity in the &#8220;protect&#8221; and &#8220;detect&#8221; functions. Nevertheless, it is essential to start a recovery plan, even at a minimum, to identify stakeholders and agree on recovery prioritization based on the systems&#8217; criticality for the organization.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">Our cybersecurity experts are all managers with extensive experience in risk management. They can advise you on the steps to follow to establish your plan effectively. As demonstrated in this cybersecurity series for managers, our <a href=\"https:\/\/eficio.ca\/en\/digital-products\/ciso360-cyberrisk-control\/\"><strong>CISO-360 CyberRisk Control<\/strong> <\/a>tool and methodology provide a complete approach with a 360-degree view of your cybersecurity program. You will have a clear picture of your posture and risks and an Eficio expert who will adapt your plan according to your organization&#8217;s size to deal with cyber threats effectively.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9da535 elementor-widget elementor-widget-text-editor\" data-id=\"b9da535\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 17px;\">If you want to react to this article or obtain more information, do not hesitate to <strong><a href=\"\/en\/contact\">contact<\/a><\/strong> Eficio.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">You can access all articles in our series via the following links:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e25a739 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e25a739\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6d983c7\" data-id=\"6d983c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b13b42c elementor-widget elementor-widget-text-editor\" data-id=\"b13b42c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"padding-left: 40px;\"><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/\">\u2022 A Cyber Risk control approach based on a financial control model<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/\">\u2022 The \u201cIdentify\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/\">\u2022 The \u201cProtect\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/\">\u2022 The \u201cDetect\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-response-function-in-cybersecurity\/\">\u2022 The \u201cResponse\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/\">\u2022 The \u201cRecover\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0671b81 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0671b81\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3c4346b\" data-id=\"3c4346b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6ead07 elementor-widget elementor-widget-text-editor\" data-id=\"e6ead07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">Subscribe to the Eficio newsletter and be the first to receive our updates!<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-12b230d\" data-id=\"12b230d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a92bc35 elementor-align-right elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"a92bc35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/nut.sh\/ell\/forms\/201665\/wdp0yC\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Subscribe<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The \u201cRecover\u201d function of cybersecurity This is the last article related to our CyberRisk Control CISO-360 intervention and diagnosis plan. What to do when the worst happens? Despite all the cybersecurity controls and protections in place, your organization may become a victim of a cyberattack&#8230;<\/p>\n","protected":false},"author":4,"featured_media":40706,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":false,"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[215,727],"tags":[274,292,293,313,305,307,315],"class_list":["post-40650","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-cybersecurite","tag-audit-en","tag-cyberrisque-en","tag-cybersecurite-en","tag-data-en","tag-donnees-en","tag-securite-en","tag-security-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The \u201cRecover\u201d function of cybersecurity - Eficio<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The \u201cRecover\u201d function of cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The \u201cRecover\u201d function of cybersecurity This is the last article related to our CyberRisk Control CISO-360 intervention and diagnosis plan. What to do when the worst happens? Despite all the cybersecurity controls and protections in place, your organization may become a victim of a cyberattack...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Eficio\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Eficio.ca\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-19T11:34:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-07T19:08:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/6-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Marchildon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Marchildon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-recover-function-of-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-recover-function-of-cybersecurity\\\/\"},\"author\":{\"name\":\"Alain Marchildon\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\"},\"headline\":\"The \u201cRecover\u201d function of cybersecurity\",\"datePublished\":\"2023-01-19T11:34:11+00:00\",\"dateModified\":\"2025-04-07T19:08:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-recover-function-of-cybersecurity\\\/\"},\"wordCount\":721,\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-recover-function-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/6-1.jpg\",\"keywords\":[\"audit\",\"cyberrisque\",\"Cybers\u00e9curit\u00e9\",\"data\",\"Donn\u00e9es\",\"S\u00e9curit\u00e9\",\"Security\"],\"articleSection\":[\"Articles\",\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-recover-function-of-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-recover-function-of-cybersecurity\\\/\",\"name\":\"The \u201cRecover\u201d function of cybersecurity - Eficio\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-recover-function-of-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-recover-function-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/6-1.jpg\",\"datePublished\":\"2023-01-19T11:34:11+00:00\",\"dateModified\":\"2025-04-07T19:08:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-recover-function-of-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-recover-function-of-cybersecurity\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-recover-function-of-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The \u201cRecover\u201d function of cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"name\":\"Eficio\",\"description\":\"CIO disponibles selon vos besoins\",\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eficio.ca\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\",\"name\":\"Eficio\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"width\":880,\"height\":361,\"caption\":\"Eficio\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Eficio.ca\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/integra-co\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\",\"name\":\"Alain Marchildon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"caption\":\"Alain Marchildon\"},\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/author\\\/amarchildon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The \u201cRecover\u201d function of cybersecurity - Eficio","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The \u201cRecover\u201d function of cybersecurity","og_description":"The \u201cRecover\u201d function of cybersecurity This is the last article related to our CyberRisk Control CISO-360 intervention and diagnosis plan. What to do when the worst happens? Despite all the cybersecurity controls and protections in place, your organization may become a victim of a cyberattack...","og_url":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/","og_site_name":"Eficio","article_publisher":"https:\/\/www.facebook.com\/Eficio.ca\/","article_published_time":"2023-01-19T11:34:11+00:00","article_modified_time":"2025-04-07T19:08:12+00:00","og_image":[{"width":1000,"height":684,"url":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/6-1.jpg","type":"image\/jpeg"}],"author":"Alain Marchildon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Marchildon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/"},"author":{"name":"Alain Marchildon","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093"},"headline":"The \u201cRecover\u201d function of cybersecurity","datePublished":"2023-01-19T11:34:11+00:00","dateModified":"2025-04-07T19:08:12+00:00","mainEntityOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/"},"wordCount":721,"publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/6-1.jpg","keywords":["audit","cyberrisque","Cybers\u00e9curit\u00e9","data","Donn\u00e9es","S\u00e9curit\u00e9","Security"],"articleSection":["Articles","Cybers\u00e9curit\u00e9"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/","url":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/","name":"The \u201cRecover\u201d function of cybersecurity - Eficio","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/6-1.jpg","datePublished":"2023-01-19T11:34:11+00:00","dateModified":"2025-04-07T19:08:12+00:00","breadcrumb":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eficio.ca\/en\/"},{"@type":"ListItem","position":2,"name":"The \u201cRecover\u201d function of cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/eficio.ca\/en\/#website","url":"https:\/\/eficio.ca\/en\/","name":"Eficio","description":"CIO disponibles selon vos besoins","publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eficio.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eficio.ca\/en\/#organization","name":"Eficio","url":"https:\/\/eficio.ca\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/","url":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","contentUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","width":880,"height":361,"caption":"Eficio"},"image":{"@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Eficio.ca\/","https:\/\/www.linkedin.com\/company\/integra-co\/"]},{"@type":"Person","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093","name":"Alain Marchildon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","url":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","contentUrl":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","caption":"Alain Marchildon"},"url":"https:\/\/eficio.ca\/en\/blog\/author\/amarchildon\/"}]}},"_links":{"self":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/comments?post=40650"}],"version-history":[{"count":17,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40650\/revisions"}],"predecessor-version":[{"id":49396,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40650\/revisions\/49396"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media\/40706"}],"wp:attachment":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media?parent=40650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/categories?post=40650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/tags?post=40650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}