You’ve Got a Flood Plan, But No Cyber Plan? Here’s Why That’s a Business Killer

The Dangerous Myth of Traditional Disaster Recovery

Walk into most UK businesses and you’ll find a dusty binder marked "Business Continuity Plan." Inside? Procedures for fire, flood, maybe theft. There are evacuation maps, emergency contact numbers, and a vague reference to calling the insurance company. But mention a cyber attack and you get blank stares or a shrug. The most likely threat facing modern businesses is the one most frequently ignored.

Fires and floods are rare. Cyber incidents are not. Yet many business leaders plan for the unlikely and ignore the inevitable.

According to the UK Government's 2024 Cyber Security Breaches Survey, over 50 percent of medium-sized businesses and more than 70 percent of large enterprises experienced some form of cyber attack in the past year. That’s not a risk, that’s a certainty waiting to happen.

Not Just an IT Problem

One of the biggest misconceptions is that cyber attacks are the IT department’s problem. Wrong. They are a business problem. A revenue problem. A reputational problem. A legal and compliance nightmare.

When your systems go down, operations stop. Orders don’t ship. Customers can’t access their data. Staff can’t work. And once it hits the news, your brand takes a hammering.

Cyber incidents need board-level ownership. This is governance, not just infrastructure.

Most Recovery Plans Are Fiction

Let’s dissect what most businesses think counts as a cyber recovery plan:

  • "We have backups."

  • "Our MSP said we’re protected."

  • "We’re ISO certified."

None of these are actual plans. Backups are only helpful if they are tested, offline, and restorable. MSPs only cover you if their SLAs include incident response. And ISO certification might help you sleep at night, but it won’t restore your email.

A real plan includes:

  • Clear ownership of cyber incidents

  • Step-by-step playbooks for common attack types (ransomware, BEC, data breach)

  • Predefined communication templates for internal and external audiences

  • Legal, regulatory, and insurance engagement workflows

  • A forensic evidence preservation protocol

  • Clear documentation of systems, recovery points, and expected recovery times

  • Regular testing and simulation exercises

What Happens Without One

Day 1: An employee clicks a phishing link. Malware is installed. Systems begin to fail.

Day 2: Files are encrypted, customer data is inaccessible, and your staff is locked out. You call IT, and they’re already overwhelmed.

Day 3: You still don’t know how the attack started, and the backups haven’t worked. The board wants answers, and you’re not even sure which regulator to notify.

Week 2: The insurer asks for documentation you don’t have. Your legal team advises caution. Your competitors are calling your clients.

Month 3: The fines are in. The customers are gone. The damage is done.

What Good Looks Like

Let’s build a better picture. A well-prepared organisation has:

  • A tested cyber incident response plan

  • A named incident leads with decision-making authority

  • A RACI matrix showing who does what, when, and why

  • Immutable backups are tested weekly and stored securely offsite

  • Legal reviewed breach notification templates ready to go

  • A comms plan aligned with the reputational risk strategy

  • An insurance playbook with contact timelines and escalation flows

Test. Then Test Again.

You wouldn’t skip fire drills. You wouldn’t assume a fire extinguisher works without checking it.

So why do so many businesses trust their cyber plans without testing them?

Simulations reveal weaknesses, tabletop exercises uncover gaps, and red team drills build confidence. Testing separates the pretend plans from the ones that work.

The best time to discover a flaw is not while you’re under attack. During a calm afternoon, there’s time to learn and adapt.

Cyber Essentials Isn’t Enough

Cyber Essentials is a strong defensive start. It proves you have firewalls, patched systems, access controls, and antivirus. But it is not a recovery framework. It doesn’t tell you what to do when everything goes offline.

Recovery means preparing for failure, not just preventing it.

The innovative approach is to combine Cyber Essentials (prevention) with incident response planning (recovery), which together form a holistic resilience strategy.

Regulators and Insurers Expect Better

The ICO requires you to notify them of serious personal data breaches within 72 hours of detection. Your insurer might require notification within 24 hours. Failure to comply could void your policy or lead to enhanced penalties.

Insurers also expect you to have appropriate controls in place. Don't expect sympathy if you can’t prove you had a plan. Expect questions.

This Is a Leadership Problem

If the board doesn’t ask for incident response testing, it’s not doing its job. If department heads don’t know who to call in an emergency, it’s a governance issue. If staff haven’t been trained on what phishing looks like, you’re inviting disaster.

The difference between surviving and closing shop after a breach often comes down to preparation.

Closing Thoughts

You have a fire plan, flood insurance, and maybe CCTV and alarm systems.

Now it’s time to do the same for cyber.

Document a cyber incident plan, assign roles, write the comms, define your response, test it, fix what breaks, and repeat.

Because when the breach hits, and it will, you won’t rise to the occasion. You’ll fall to the level of your planning.

Make sure that the level is high enough to survive.

Noel Bradford

Noel Bradford – Head of Technology at Equate Group, Professional Bullshit Detector, and Full-Time IT Cynic

As Head of Technology at Equate Group, my job description is technically “keeping the lights on,” but in reality, it’s more like “stopping people from setting their own house on fire.” With over 40 years in tech, I’ve seen every IT horror story imaginable—most of them self-inflicted by people who think cybersecurity is just installing antivirus and praying to Saint Norton.

I specialise in cybersecurity for UK businesses, which usually means explaining the difference between ‘MFA’ and ‘WTF’ to directors who still write their passwords on Post-it notes. On Tuesdays, I also help further education colleges navigate Cyber Essentials certification, a process so unnecessarily painful it makes root canal surgery look fun.

My natural habitat? Server rooms held together with zip ties and misplaced optimism, where every cable run is a “temporary fix” from 2012. My mortal enemies? Unmanaged switches, backups that only exist in someone’s imagination, and users who think clicking “Enable Macros” is just fine because it makes the spreadsheet work.

I’m blunt, sarcastic, and genuinely allergic to bullshit. If you want gentle hand-holding and reassuring corporate waffle, you’re in the wrong place. If you want someone who’ll fix your IT, tell you exactly why it broke, and throw in some unsolicited life advice, I’m your man.

Technology isn’t hard. People make it hard. And they make me drink.

https://noelbradford.com
Previous
Previous

Cyber Insurance Claims Are Being Denied – And It's Your Fault

Next
Next

Still Using RDP Instead of a VPN in 2025? What the F*!k Are You Thinking?