Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

Think You Can’t Afford Recovery and Remediation? Think Again. You Have Everything to Lose

By Chris Millington
Recovery in neon green

Martin Sanchez via Unsplash

July 15, 2025

Most businesses say they want to prioritize remediation and recovery capabilities, yet when it gets down to it, many ultimately opt not to make these investments. Thirty-five percent require days or even weeks to recover lost SaaS data, and more than a third worry that their company doesn’t have a good enough backup and recovery solution, according to the 2025 State of SaaS Backup and Recovery Report, which surveyed more than 3,700 IT professionals across sectors.

This mindset is problematic because it fails to consider what the company has to lose if it lacks the ability to recover business operations quickly in the event of a cyberattack or other outage.

Just imagine the loss in reputation, accrued regulatory fines, stock value decline and lost business you would face if you ceased operations for several days, weeks or even months. 

According to The Hidden Costs of Downtime report by Oxford Economics, downtime from cyber incidents such as ransomware costs Global 2000 companies an estimated $400 billion annually, or roughly 9% of annual profits — a staggering financial impact of operational disruption.

Businesses that can’t recover rapidly and control their losses could be lost forever.

Here’s how to avoid that by strengthening your defenses and recovering from attacks faster.

Educate Your Teams About How to Avoid Cyber Risk

Talking to your employees about the downstream business impacts of cyber incidents like phishing attacks and offering tips on how best to avoid them can strengthen your resilience.

Tell employees to watch out for unexpected emails or messages, check senders’ emails, avoid clicking on suspicious links, never share passwords via email and report suspicious emails to IT.

Implement Zero-Trust Principles 

The first step in protecting your business and keeping operations up and running is to prevent cyberattacks in the first place. But businesses understand that’s not always possible, given how common and sophisticated such events, which are a when-not-if proposition, have become. 

However, you can significantly enhance your security by implementing zero-trust principles within storage systems to ensure that no one has implicit access to any part of the data. Part of a zero-trust strategy includes encrypting data end-to-end, protecting data through its lifecycle.

Embrace Modern Processes for Compliance, Efficiency and Resilience

Many businesses still rely on the IT processes they have had in place for 20 years. But modern processes now enable businesses to become extremely efficient at keeping their operations up and running. That’s even more critical now that new regulations such as DORA have emerged.

Now is the time to look at your existing processes and technologies and understand what’s working well and what needs to change. Ask yourself: Who manages that process? Is there a single decision-maker? How secure is that process to the business? What does security access control look like, and who should have that access? If there’s an attack, do you have the ability to test against the data set that’s been attacked to know where your recovery point will be?

In light of new directives, you also need to test your processes. This is critical because businesses haven’t traditionally tested their recovery capabilities and verified that their data is good after an attack, because companies typically didn’t have the time. Now, regulations require you to prove you can meet requirements by doing these fire drills at regular intervals. 

To incorporate these new practices into operations and do them quickly will require IT design change. Adopt modern IT infrastructure and processes to meet the cybersecurity and disaster recovery demands of new and existing regulations. Ensure your IT environment enables you to operate at the risk level that’s acceptable to your business. Implement an IT environment and processes that will give you the confidence that cyber incidents will have the least possible impact on your organization, while making it easy for you to access and benefit from your data and providing you with maximum performance capabilities.

Employ Digital Twin Technology for Real-Time Remediation and Resilience

When investing in IT technology that helps your business become more resilient and provides added value, explore how capabilities such as digital twins can enable you to offset that cost.

A digital twin can allow you to use an automated process to help you recover and empower you to be more preventative. You could create the twin of the minimum viable requirements for your company based on the IT infrastructure that’s running your operation. 

If you isolate that digital twin outside of the production environment, you can contend with everything that’s associated with an attack via your digital twin strategy. This will enable you to do real-time remediation and testing to ensure you’re meeting minimum viable requirements in line with regulations. Plus, if a regulator requires your business to do forensic analysis on production, you can do that while continuing your operations. 

Join Forces With a Proven Partner With Sector-Specific Expertise and Skin in the Game    

Many cybersecurity and disaster recovery suppliers give customers a piece of technology and leave it to the enterprise to do the rest. What businesses really need is a strategic partner that they can trust to provide the right advice and deliver high-performance, scalable, sustainable solutions to lower their risk and costs while positioning them to be more competitive.

Seek a trusted supplier that knows your industry, takes the time and effort to learn about your business, has the technology and expertise to deliver what you need, and guarantees predictable recovery in minutes instead of days. Work with that provider to create a business continuity plan that protects your data against cyber risk, minimizes downtime, meets workload demands every time, streamlines operations and empowers you to achieve more with less.

When the operations of your business are at risk, you can’t leave anything to chance. Make sure your cybersecurity and disaster recovery strategies include education across your enterprise, zero trust, modern IT and processes, real-time remediation and resilience for optimal business continuity, and work with a proven partner that deeply understands IT, your sector and you.

KEYWORDS: best practices recovery resilience

Share This Story

Chris millington headshot

Chris Millington is the Global Solutions Lead, Data and Cyber Resilience at Hitachi Vantara.  Chris Millington is a seasoned veteran with 35 years of experience in the IT industry. Throughout his career, he has held various roles, including channel theatre lead, specialist SE, technical expert and global solutions lead. Chris has been instrumental in bridging the gap between field organizations, product management and engineering teams. His efforts have significantly contributed to mentoring the technical community, partner community and customer engagements. In his current role at Hitachi Vantara, Chris provides global coverage for products and solutions within the Hitachi Data Resilience and Compliance portfolio. His deep insights into current trends, regulations and compliance associated with modern infrastructure and processes make him a valuable asset to the organization. Image courtesy of Millington

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Silhouette of hand holding phone

Pushing Mobile Access to New Levels of Operational Efficiency

AI chat screen on cellphone

68% of Organizations Experienced Data Leakage From Employee AI Usage

Multicolored code on black screen

Security Leaders Share Thoughts on DaVita Data Breach

Coding on screen

CISA Releases a Malware and Forensic Analysis Platform

Full train

Scattered Spider’s Newest Targets: Transportation and Airlines

Events

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

September 9, 2025

Actionable Strategies to Mitigate Active Assailant Risk

According to Gardaworld Security, the FBI reported an 89% increase in violent public attacks by active assailants in the U.S. between 2019 and 2023 compared to the previous five years.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!