Cyber breaches are inevitable. Security blind spots shouldn't be
ArticleThe detect, investigate, and respond model is critical for your cyber resilience. Find out how to prepare and implement your strategy.

The aftermath of a cyber incident is an intense combination of operational disruption, reputational risk, and financial exposure. Yet, one of the most overlooked elements of incident response (IR) is secure remediation.
Secure remediation is the structured, validated, and secure restoration of systems and services. Rushing to recovery without secure containment or relying on ineffective backup strategies can lead to reinfection, extended downtime, or irreversible data loss.
Secure remediation must begin with containment. Without it, recovery is futile. There’s no point in starting recovery if you haven’t fully contained the threat. You could end up back at square one.
Containment involves isolating affected systems, halting lateral movement, and verifying that no active command-and-control (C2) channels remain. It's not simply about installing agents or security tooling, it requires architectural isolation, forensic analysis, and assurance that attackers no longer have a foothold.
As seen in real-world breaches, improper containment can lead to attackers re-establishing control even after initial recovery steps, due to insecure remediation pathways.
Once containment is assured, the next critical step is to define what to recover and when, grounded in business impact and risk tolerance. This business-first approach ensures prioritisation of critical services, systems, and data over a technical checklist.
Key considerations include:
If you don’t know when the threat actor got into the systems, our experience says to use a two-week rollback as a default before beginning recovery. This approach ensures a balance between minimising data loss and eliminating residual risk.
Backups are the bedrock of recovery, but not all backups are created equal.
Traditional backups, even those stored offsite, can often be deleted, encrypted, or altered by attackers who compromise admin credentials. Immutable backups, by contrast, can't be modified or deleted until pre-defined retention periods are met, regardless of attacker access or insider threat.
Rule of thumb is that if you can change the retention policy to one day and that deletes all backups, it’s not immutable. True immutability prevents this from happening.
Characteristics of immutable backups:
Vendor comparison (based on practitioner tests):
Cyber insurers increasingly require organisations to demonstrate preparedness, but current underwriting standards remain basic.
Insurers just ask the basics in whether you have backups. They rarely ask whether those backups are immutable or resilient to attacks.
As threat actors target backup systems directly as seen in ransomware variants like LockBit, Akira, Conti, and BlackCat, the limitations of this approach are clear. Future insurance assessments will likely evolve to include deeper technical reviews of backup resilience and immutability testing.
Many incident response providers focus heavily on detection and forensics but fall short in delivering a secure, complete recovery process. This market gap leaves clients vulnerable to reinfection or prolonged operational downtime.
Our Cyber Defence Centre, and other leaders in secure IR services, are setting a new standard by integrating:
This joined-up approach to incident response and recovery not only ensures greater resilience but also accelerates return to normal operations, minimising business and reputational harm.
In the evolving landscape of cyber threats, secure remediation must be seen as a core competency of incident response, not an afterthought. Backups alone aren’t enough unless they're immutable, validated, and accessible through a clean, trusted recovery environment.
Organisations that adopt a business-driven, security-assured remediation approach and demand the same from their IR providers will be best-positioned to recover from attacks safely, swiftly, and with confidence.
To find out how we can support your organisation with building cyber resilience, contact Hitesh Mistry.
The detect, investigate, and respond model is critical for your cyber resilience. Find out how to prepare and implement your strategy.