By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: The cyber ‘lifeline’ holding businesses above the chaos
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > The cyber ‘lifeline’ holding businesses above the chaos
Tech News

The cyber ‘lifeline’ holding businesses above the chaos

By Viral Trending Content 7 Min Read
Share
SHARE

Contents
Old tactics, new threatsCatching up

BearingPoint’s Hisham Marie on business continuity and disaster recovery strategies and how they can be adapted to modern cyberthreats.

In today’s cybersecurity landscape, every organisation needs to be vigilant and proactive about protecting their systems from cybercriminals.

Regardless of sector, businesses need to ensure that their defences are up to date and that they have procedures in place to not only thwart a cyberattack, but also ensure that in the event of a breach, the disruption is as minimal as possible.

One method that’s commonly used for the latter is business continuity and disaster recovery (BCDR).

“BCDR is an organisation’s emergency playbook for staying operational during disasters – whether a cyberattack, power outage or natural event,” explains Hisham Marie, a principal cloud architect at BearingPoint.

“At its core, it’s about ensuring the business keeps running, no matter what the crisis is.”

For businesses, Marie explains this involves designing workflows and systems that can “pivot seamlessly” during disruptions, including how teams communicate when primary tools such as email or collaboration platforms are inaccessible.

“Think of it as rehearsing for emergencies: teams regularly simulate worst-case scenarios to ensure everyone knows their role when real disaster strikes,” he adds. “At its core, BCDR rejects complacency – it assumes no system or person is inherently safe.”

He says the ultimate goal of BCDR is to ensure that customers, employees and partners experience minimal disruption, even if recovery takes time. “Turning potential chaos into a well-rehearsed transition that keeps trust and operations intact.”

Old tactics, new threats

But while traditional BCDR can be beneficial, modern threats such as advanced ransomware and AI-driven attacks have exposed “critical flaws” in these strategies. As Marie explains, legacy BCDR approaches often depend on trust in internal systems, such as shared credentials between production and disaster recovery (DR) environments, and “redundant” infrastructure that mirrors or extends primary networks.

“These practices create fatal vulnerabilities, as attackers exploit inherited credentials to pivot from compromised production systems to DR sites, sabotaging backups and recovery tools,” he says. “Meanwhile, AI-driven threats amplify risks by automating reconnaissance, adapting to defences in real time and exploiting delays in manual recovery workflows.

“Traditional BCDR’s reliance on predictable attack patterns and static recovery plans crumbles under these conditions.”

According to Marie, the most glaring weaknesses in traditional BCDR are inherited trust in interconnected systems, unvalidated backups that fail under attack and rigid recovery strategies that assume attackers won’t target safety nets.

“Ultimately, the very principles of trust and redundancy that once underpinned BCDR now serve as its greatest liabilities in an era of autonomous, adaptive threats.”

One such example of traditional BCDR flaws being exploited was the 2017 attack on global shipping company Maersk, where the NotPetya malware bypassed defences by exploiting interconnected identity systems, hijacking active directory credentials to leap from production environments to disaster recovery sites.

“Backups, once a failsafe, were rendered useless because attackers had already compromised the credentials governing both systems,” says Marie. “This interconnected trust – a hallmark of traditional BCDR – proved fatal.”

Catching up

In order to combat these modern threats, Marie says that organisations need to rethink cyber resilience with three “non-negotiable” pillars: air-gapped isolation, identity separation for disaster recovery and adaptive testing.

“Air-gapped environments – physically separated from primary networks and inaccessible to attackers – ensure critical systems remain untouchable, even as ransomware encrypts production data,” he explains. “Equally critical is deploying distinct identity systems for DR sites, eliminating shared credentials that let attackers pivot from compromised production systems to sabotage recovery efforts.

“Resilience is then stress-tested through AI-driven attack simulations, replacing scripted drills with unpredictable scenarios that expose gaps before adversaries strike. Finally, predefined manual workflows – for payroll, logistics or customer support – ensure continuity when digital systems fail.”

Marie concludes that by combining these three pillars, supported by a broader business and communications plan that coordinates with employees, customers, citizens and regulators during recovery efforts, organisations can transform DR from a “passive backup into an impregnable last line of defence”.

Key to modernising BCDR approaches, according to Marie, is proper consideration and planning by security leaders and decision-makers.

“For CTOs and CISOs, BCDR isn’t just a strategy – it’s a lifeline. Modernising BCDR plans starts with ruthless prioritisation: categorising systems based on criticality and business impact,” he says. “Identify mission-critical operations like payroll and customer platforms that demand unyielding protection, while allowing secondary systems to accommodate temporary downtime.

“Incorporate alternative collaboration tools, such as backup email systems, into your strategy to ensure seamless communication during disruptions. Fortify essential systems with air-gapped recovery sites – keeping them completely isolated and secure from cyberattacks.”

He adds that to enhance this isolation, CISOs and CTOs should use different identities for the air-gapped site and avoid “synchronising identities with the main system”. They should also adopt zero trust principles as a cornerstone, validating every user, device and request “continuously”.

“Delaying action risks catastrophic downtime that some businesses may not survive. Yet, proactive investment in BCDR does more than shield operations – it creates a competitive edge,” says Marie.

“By prioritising what matters most and ensuring resilience, leaders transform potential crises into opportunities for trust and continuity, elevating business operations above the chaos.”

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

You Might Also Like

Techworks Marine Commences Metocean Survey for National Offshore Wind Project on Ireland’s South Coast

FAA Plan to Cut Flights Might Not Be an Utter Nightmare

Meath’s Hanley Energy to be acquired by Jabil in $725m deal

VSDinside Launches MagTran M3 – The World’s First Fully Customizable Transparent Keyboard

Samsung Galaxy A17 5G Review: Sleek but Samey

TAGGED: cool tech, latest technology, latest technology news, new technology, science and technology, tech, Tech News, tech review, technews, technological advances, technology definition, technology reviews, what is technology
Share This Article
Facebook Twitter Copy Link
Previous Article SHOCKING Apple Ring Leaks! 2025 or 2026 Release?!
Next Article Hunting for shares to buy as the market trembles? Remember this!
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Robinhood isn’t rushing into crypto treasuries, exec says
Crypto
Crypto Firm DWF Labs Lose $44M To North Korean-Linked Hackers – Report
Crypto
Techworks Marine Commences Metocean Survey for National Offshore Wind Project on Ireland’s South Coast
Tech News
Breath of relief as EU commits to CO2 reduction climate goal ahead of COP30
World News
FAA Plan to Cut Flights Might Not Be an Utter Nightmare
Tech News
Overcooked reality show: A24's next video game adaptation is coming to Netflix
Gaming News
US to cut flights at 40 airports if shutdown doesn't end, transportation secretary warns
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Robinhood isn’t rushing into crypto treasuries, exec says

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Robinhood isn’t rushing into crypto treasuries, exec says
November 6, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?