How Can We Improve Our Cyber Resilience Rather Than Just Cybersecurity?

Keith Hickson • January 20, 2026

Question 3 of 10 in our Cyber Resilience series - Your Biggest Cyber Security Concerns Answered...

Why Everyone's Asking This Right Now

Here’s how a lot of conversations with business owners start these days:

“We’ve got all the kit’ firewalls, antivirus, MFA, staff training, but I still can’t shake the feeling we’d struggle if something serious happened.”

And that’s the shift we’re seeing across UK businesses. The penny’s dropping that even with good cybersecurity, things can still go wrong.


The real question isn’t “how do we stop everything bad from happening?” it’s “how do we make sure we can survive it?


That’s the heart of cyber resilience. It’s about being ready to take a hit and keep going.

Why This Question’s Suddenly Urgent:

  • Major UK incidents this year show survival matters more than prevention.
  • M&S lost £300m and was offline for 46 days.
  • Jaguar Land Rover halted global production for a month – costing up to £1.9bn.
  • KNP Logistics, a 158-year-old company, collapsed completely after ransomware – 700 jobs gone.

Regulators are shifting focus from “did you prevent it?” to “could you recover from it?”


The new UK Cyber Security and Resilience Bill puts resilience centre stage.

If your board’s asking “what’s our resilience strategy?”, they’re on the right track.

The Real Question Behind the Question

Here’s what most business leaders really mean when they ask about resilience:


“If the worst happened tomorrow - a cyberattack, a supplier breach, a ransomware hit - could we actually keep trading?”


It’s an honest, practical question. Because deep down, everyone knows a breach is inevitable. The real difference is in how you respond.


Cyber resilience means accepting you’ll be hit and being ready to recover fast.

From Security to Resilience

  1. The Traditional Model

Build A Fortress:

  • Keep attackers out
  • If they get in, you’ve failed
  • Focus: Prevention only


It’s worth saying that traditional cybersecurity isn’t completely blind to recovery, most organisations have backups and some disaster recovery capability.


But here’s the difference: those measures are often designed to restore data, not restore the business. Resilience takes it further; making sure critical operations, people, and communications can carry on while you recover. It connects the technical response to the operational reality.

2. The Resilience Model

  • Maintain strong defences, but accept breaches can still happen
  • Limit the damage when they do
  • Recover quickly and keep operations running
  • Learn and adapt to come back stronger
  • Focus: Protection, survival, and adaptation


Think of it like this: cybersecurity is your seatbelt and airbags; resilience is your ability to walk away, fix the car, and get back on the road.

Ned Flanders, from The Simpsons, honks the horn and screams while driving a red car.

Lessons from Real UK Incidents

KNP Logistics, 2025: A single weak password let ransomware cripple a 158-year-old transport firm. Insurance couldn’t save them. They folded. 700 jobs lost.


Marks & Spencer, 2025: Hackers compromised a supplier, taking M&S offline for 46 days. Cost: £300m. Value wiped: £750m. Still recovering months later.


Jaguar Land Rover, 2025: The most expensive UK cyber breach ever. Production halted for a month. 33,000 staff affected. Cost: up to £1.9bn. Only survived with government help.


These weren’t careless companies. They had cybersecurity. They lacked resilience.

The Three Possible Outcomes

1. Failure (KNP): No plan, no recovery, business closed.

2. Severe Disruption (M&S): Weeks of downtime, huge cost, reputation hit.


3. Controlled Recovery: Quick containment, minimal disruption, back to normal fast.

The difference? Cyber resilience planning done properly.

The Four Pillars of Cyber Resilience

Think of these as your four superpowers: Anticipate, Withstand, Recover, Adapt.


1. Anticipate - Spot Problems Coming

Understand your risks before they become incidents.

  • Stay updated on threats
  • Act on risk assessments
  • Monitor for warning signs
  • Know which systems are critical


Map your critical systems - what can’t you lose for 24 hours?


2. Withstand - Absorb the Hit

Can you keep key operations running?

  • Keep offline and immutable backups that can’t be altered or deleted by ransomware
  • Test your backups regularly
  • Build redundancy for critical services
  • Segment your network
  • Maintain practical continuity plans


Test your backups, including your immutable copies. KNP had insurance but couldn’t recover because their backups weren’t secure or separated.


Immutable backups (sometimes called write-once backups) are versions of your data that can’t be changed, even by an administrator. They’re one of the simplest ways to ensure you always have a clean, restorable copy, no matter how bad the attack.


3. Recover - Bounce Back Fast

How quickly can you restore operations?

  • Have tested recovery procedures
  • Assign clear roles
  • Prepare comms templates
  • Know who to call for help


Imagine it’s 9 am on a Monday and your systems are locked. What’s your first move? Who makes the call? How do you keep customers informed? If you can’t answer that, you need a plan.


4. Adapt – Learn and Improve

  • Review every incident
  • Update plans for new threats
  • Hold regular “what did we learn?” sessions

After any incident, even a close call, sit down within a week and ask what worked, what didn’t, and what needs fixing.

The Resilience Gap

We recently audited a professional services firm. They had decent cybersecurity; firewalls, patching, awareness training.


But when we asked what would happen if ransomware hit that night, the room went quiet.


Their backups were online, never tested, no recovery priorities, no comms plan.


They had cybersecurity. They didn’t have resilience.


Less than 10% of UK organisations feel confident managing supply chain risks and even fewer feel resilient themselves.

Quick Resilience Health Check

Grab a coffee and tick what’s true for you:


Anticipate

☐ We know which systems are critical

☐ We monitor threats

☐ We assess our cyber risks

Withstand

☐ We have offline, immutable, and tested backups

☐ Our network is segmented

☐ We have redundancy for critical systems

Recover

☐ We have a tested incident plan

☐ Everyone knows their role

☐ We can communicate during an outage

Adapt

☐ We review incidents and update plans

☐ We run regular resilience exercises

Fewer than 8 ticks? You’ve got work to do and you’re not alone.

The 90-Day Resilience Roadmap

You don’t need perfection, just progress.

Month 1: Understand - Map your critical systems and risks.

Month 2: Prepare - Set up offline and immutable backups, write an incident plan, identify who to call.

Month 3: Test - Run a tabletop exercise, test restores, refine your plan.

The Bottom Line

Cyber resilience isn’t about being breach-proof.  It’s about being ready.


Outcomes speak:

  • KNP → No plan → Closed, 700 jobs lost.
  • M&S → Limited resilience → 46 days offline and £300m cost.
  • JLR → Some resilience → Recovered with support.

The survivors aren’t the ones that never get hit, they’re the ones that recover, learn, and come back stronger.


It’s not rocket science, it’s just smart business continuity, tuned for cyber threats.


Three things to remember:

  1. Breaches will happen so plan to survive them.
  2. Resilience means anticipating, withstanding, recovering, and adapting.
  3. Start small: know your key systems, test backups (including immutable ones) and have a plan.
Want Help Building Your Resilience?

At KH InfoSec, we help SMEs turn good cybersecurity into real cyber resilience.


Our Fractional CISO service gives you the expertise of a security leader (without the full-time salary or complexity).


Here’s what that looks like in practice:

  • We help you identify your critical systems and biggest risks.
  • We design continuity and incident response plans that actually work.
  • We implement and test immutable backups so you always have a clean recovery point.
  • We build a culture of continuous improvement and learning.


If you’re unsure where to start, let’s have an honest conversation about where you are now and what will make the biggest

difference.


Message us or visit KHInfoSec.com to book a short discovery call.


Because the real question isn’t “will we get hit?”. It’s “will we survive it?”

 Personal Data
By Heni Fourie January 20, 2026
Understand the importance of protecting your personal data and learn how cyber security and data protection consultancy can help your business.
By Heni Fourie December 11, 2025
KH-InfoSec offers tailored data protection services, helping businesses stay secure and compliant with POPIA, ISO 27001, GDPR, and more.
By Keith Hickson November 24, 2025
Question 2 of 10 in our You ask, We Answer Cyber Resilience series - Your Biggest Cyber Security Concerns Answered
Laptop screen displaying a chat window with the DeepSeek AI logo and a greeting message.
By Heni Fourie October 23, 2025
Learn how to secure AI systems, prevent data leaks, and stay GDPR compliant. Practical steps for SMEs to use AI safely without losing productivity.
Woman using a laptop with a digital padlock on screen, representing cybersecurity.
July 31, 2025
KH-InfoSec offers tailored data protection services, helping businesses stay secure and compliant with POPIA, ISO 27001, GDPR, and more.
IT Security
By Heni Fourie May 15, 2025
Learn key IT Security takeaways from cyber breaches at M&S, Co-op, and Harrods. Discover how to protect your business from similar threats with KH InfoSec.
Data Protection
By Heni Fourie May 12, 2025
Protect your business with expert data protection services. Risk reduction, compliance, and incident response tailored to your needs.
computer security
April 22, 2025
Protect your business with KH InfoSec's expert computer security services risk assessments, testing, compliance & more. Stay secure, stay ahead.
cyber security
October 2, 2024
KH InfoSec provides cyber security assessments to help businesses strengthen their IT systems, ensure compliance, and identify security vulnerabilities.
Cloud Misconfiguration
October 2, 2024
KH InfoSec helps secure your cloud setup with automated configuration management to reduce risks, ensure compliance, and prevent costly data breaches.