Can you recover safely after a cyber attack?

A free 12-question cyber recovery readiness check to help you understand whether your organisation could restore critical services when systems, identities, and trusted tooling may no longer be reliable.

Answer based on what is true today, not what is documented, assumed, or planned for later.

This check is designed to test something more realistic than a standard disaster recovery checklist: whether your organisation could still recover safely if trust in systems, identities, tooling, or recovery paths had been disrupted.

Question 1

Have you identified not just critical business systems, but also the identity services, admin tooling, network services, cloud platforms, and third-party dependencies required to recover them?

Think beyond the main application or server. Recovery usually depends on supporting services and trust paths as well.

Question 2

Could your team define a realistic recovery sequence if multiple interconnected systems were unavailable at the same time?

This is about the order of recovery under pressure, not just a list of systems you care about.

Question 3

Does your recovery approach cover cloud control planes and SaaS services such as Microsoft 365, Entra ID, SharePoint, Azure, AWS, or Google Workspace, rather than focusing only on servers and endpoints?

Many organisations discover too late that cloud and SaaS platforms are central to recovery, not separate from it.

Question 4

Are backup repositories, management consoles, orchestration tools, and deletion paths protected from the same privileged access routes that could be used to compromise production systems?

If the same admin routes can reach both production and recovery tooling, recovery may fail when you need it most.

Question 5

Do you have a defined way to determine whether a system, image, configuration, or dataset is actually safe to restore, rather than simply available to restore?

Availability alone is not enough if the thing you are restoring may no longer be trustworthy.

Question 6

Are there defined technical and business validation points for deciding when a recovered service is safe to reconnect to users, integrations, and production data flows?

Reconnection decisions matter just as much as restore decisions if you want to avoid reintroducing risk.

Question 7

If core identity services or privileged accounts were compromised, do you have a controlled and tested method to re-establish trusted administrative access?

Recovery often depends on rebuilding trust in admin access before anything else can move.

Question 8

Can you rebuild key services from known-good baselines, configurations, and secrets, or does recovery depend heavily on the existing environment still being trustworthy?

Strong recovery usually depends on known-good foundations, not just the hope that the current environment is still safe.

Question 9

Could recovery still be coordinated if email, collaboration platforms, ticketing systems, VPN, or remote management tools were unavailable or untrusted?

Many plans assume the usual coordination tools still work. This question tests whether recovery could continue if they do not.

Question 10

Have you assessed how the organisation would continue making critical decisions and operating essential processes while digital services are only partially restored?

Recovery is not just technical. It also depends on how the organisation functions while systems are degraded.

Question 11

When recovery is tested, does it include cyber-specific conditions such as identity compromise, uncertain system trust, damaged management tooling, or multi-system disruption?

Traditional disaster recovery tests often miss the things that make cyber recovery harder.

Question 12

Is your confidence in recovery based on recent technical validation under realistic attack conditions, rather than mainly on documentation, assumptions, or vendor assurances?

Confidence is strongest when it comes from evidence under pressure, not from paperwork alone.

Not sure where to start? We can work that out together.

You do not need the right jargon or a polished brief. A short conversation is usually enough to find the next sensible step.

Start a conversation