By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: The cyber ‘lifeline’ holding businesses above the chaos
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > The cyber ‘lifeline’ holding businesses above the chaos
Tech News

The cyber ‘lifeline’ holding businesses above the chaos

By Viral Trending Content 7 Min Read
Share
SHARE

Contents
Old tactics, new threatsCatching up

BearingPoint’s Hisham Marie on business continuity and disaster recovery strategies and how they can be adapted to modern cyberthreats.

In today’s cybersecurity landscape, every organisation needs to be vigilant and proactive about protecting their systems from cybercriminals.

Regardless of sector, businesses need to ensure that their defences are up to date and that they have procedures in place to not only thwart a cyberattack, but also ensure that in the event of a breach, the disruption is as minimal as possible.

One method that’s commonly used for the latter is business continuity and disaster recovery (BCDR).

“BCDR is an organisation’s emergency playbook for staying operational during disasters – whether a cyberattack, power outage or natural event,” explains Hisham Marie, a principal cloud architect at BearingPoint.

“At its core, it’s about ensuring the business keeps running, no matter what the crisis is.”

For businesses, Marie explains this involves designing workflows and systems that can “pivot seamlessly” during disruptions, including how teams communicate when primary tools such as email or collaboration platforms are inaccessible.

“Think of it as rehearsing for emergencies: teams regularly simulate worst-case scenarios to ensure everyone knows their role when real disaster strikes,” he adds. “At its core, BCDR rejects complacency – it assumes no system or person is inherently safe.”

He says the ultimate goal of BCDR is to ensure that customers, employees and partners experience minimal disruption, even if recovery takes time. “Turning potential chaos into a well-rehearsed transition that keeps trust and operations intact.”

Old tactics, new threats

But while traditional BCDR can be beneficial, modern threats such as advanced ransomware and AI-driven attacks have exposed “critical flaws” in these strategies. As Marie explains, legacy BCDR approaches often depend on trust in internal systems, such as shared credentials between production and disaster recovery (DR) environments, and “redundant” infrastructure that mirrors or extends primary networks.

“These practices create fatal vulnerabilities, as attackers exploit inherited credentials to pivot from compromised production systems to DR sites, sabotaging backups and recovery tools,” he says. “Meanwhile, AI-driven threats amplify risks by automating reconnaissance, adapting to defences in real time and exploiting delays in manual recovery workflows.

“Traditional BCDR’s reliance on predictable attack patterns and static recovery plans crumbles under these conditions.”

According to Marie, the most glaring weaknesses in traditional BCDR are inherited trust in interconnected systems, unvalidated backups that fail under attack and rigid recovery strategies that assume attackers won’t target safety nets.

“Ultimately, the very principles of trust and redundancy that once underpinned BCDR now serve as its greatest liabilities in an era of autonomous, adaptive threats.”

One such example of traditional BCDR flaws being exploited was the 2017 attack on global shipping company Maersk, where the NotPetya malware bypassed defences by exploiting interconnected identity systems, hijacking active directory credentials to leap from production environments to disaster recovery sites.

“Backups, once a failsafe, were rendered useless because attackers had already compromised the credentials governing both systems,” says Marie. “This interconnected trust – a hallmark of traditional BCDR – proved fatal.”

Catching up

In order to combat these modern threats, Marie says that organisations need to rethink cyber resilience with three “non-negotiable” pillars: air-gapped isolation, identity separation for disaster recovery and adaptive testing.

“Air-gapped environments – physically separated from primary networks and inaccessible to attackers – ensure critical systems remain untouchable, even as ransomware encrypts production data,” he explains. “Equally critical is deploying distinct identity systems for DR sites, eliminating shared credentials that let attackers pivot from compromised production systems to sabotage recovery efforts.

“Resilience is then stress-tested through AI-driven attack simulations, replacing scripted drills with unpredictable scenarios that expose gaps before adversaries strike. Finally, predefined manual workflows – for payroll, logistics or customer support – ensure continuity when digital systems fail.”

Marie concludes that by combining these three pillars, supported by a broader business and communications plan that coordinates with employees, customers, citizens and regulators during recovery efforts, organisations can transform DR from a “passive backup into an impregnable last line of defence”.

Key to modernising BCDR approaches, according to Marie, is proper consideration and planning by security leaders and decision-makers.

“For CTOs and CISOs, BCDR isn’t just a strategy – it’s a lifeline. Modernising BCDR plans starts with ruthless prioritisation: categorising systems based on criticality and business impact,” he says. “Identify mission-critical operations like payroll and customer platforms that demand unyielding protection, while allowing secondary systems to accommodate temporary downtime.

“Incorporate alternative collaboration tools, such as backup email systems, into your strategy to ensure seamless communication during disruptions. Fortify essential systems with air-gapped recovery sites – keeping them completely isolated and secure from cyberattacks.”

He adds that to enhance this isolation, CISOs and CTOs should use different identities for the air-gapped site and avoid “synchronising identities with the main system”. They should also adopt zero trust principles as a cornerstone, validating every user, device and request “continuously”.

“Delaying action risks catastrophic downtime that some businesses may not survive. Yet, proactive investment in BCDR does more than shield operations – it creates a competitive edge,” says Marie.

“By prioritising what matters most and ensuring resilience, leaders transform potential crises into opportunities for trust and continuity, elevating business operations above the chaos.”

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

You Might Also Like

RedClick dublinbikes Hits 40 Million Journeys Milestone, Unveils Custom Art Bike by Holly Pereira

6 Best Carpet Cleaners (2025), Tested and Reviewed

Rishi Sunak joins Anthropic, Microsoft as senior adviser

Figure 03 Humanoid Robot: A New Era of AI-Powered Companions

A Knight of the Seven Kingdoms Release Date, Cast, Plot and Trailer

TAGGED: cool tech, latest technology, latest technology news, new technology, science and technology, tech, Tech News, tech review, technews, technological advances, technology definition, technology reviews, what is technology
Share This Article
Facebook Twitter Copy Link
Previous Article SHOCKING Apple Ring Leaks! 2025 or 2026 Release?!
Next Article Hunting for shares to buy as the market trembles? Remember this!
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Israelis praise Trump at huge rally ahead of expected hostage release by Hamas in Gaza
World News
Truce fizzles as US-China trade tensions return to full boil
Business
Bitcoin Rally Met With Institutional Call Selling In Options Market – Details
Crypto
Fire TV Soundbar Is Selling for Pennies Post Prime Day, Now 5x Less Than Sony or Bose Rivals
Gaming News
Relax, Bitcoin is going to be ok, even if BTC lost 13% in 8 hours: The proof is in the data
Crypto
RedClick dublinbikes Hits 40 Million Journeys Milestone, Unveils Custom Art Bike by Holly Pereira
Tech News
6 Best Carpet Cleaners (2025), Tested and Reviewed
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Israelis praise Trump at huge rally ahead of expected hostage release by Hamas in Gaza

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Israelis praise Trump at huge rally ahead of expected hostage release by Hamas in Gaza
October 11, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?