Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Back to Guides
Incident Responseadvanced

Operating Without Systems: Incident Response

When every connected system is encrypted or compromised, how does your team actually operate? This guide covers the practical reality of incident response when your tools, communications, and documentation are all unavailable.

12 min read
Share

The First Thirty Minutes

The call comes at 3:00 AM. Ransomware has been deployed across your infrastructure. Domain controllers are encrypted. Email is down. The VPN concentrator is offline. Your team cannot access the building management system, the phone system, or the incident response platform.

This is not a drill scenario. It is the lived experience of thousands of UK organisations every year. And the first thirty minutes determine everything that follows.

Communication Without Infrastructure

The most immediate challenge is coordination. Your team needs to communicate, but every corporate communication channel depends on infrastructure that may be compromised.

Pre-Staged Communication Channels

  • Personal mobile numbers: A printed or offline-stored list of key personnel mobile numbers enables basic coordination
  • Pre-configured messaging groups: Signal or WhatsApp groups created before the incident, using personal devices, provide encrypted team communication
  • Out-of-band conference bridges: Pre-arranged dial-in numbers for conference calls that do not depend on corporate infrastructure

Every one of these requires prior preparation. The contact list must exist before the incident. The messaging groups must be created before the incident. The conference bridge must be arranged before the incident. Offline secure storage ensures this preparation survives the incident.

Decision-Making Without Data

Your monitoring dashboards are encrypted. Your asset inventory is inaccessible. Your network topology documentation is on SharePoint. How do you make informed containment decisions?

Pre-Staged Decision Support

  • Network topology maps: Printed or offline-stored diagrams of your network architecture enable containment decisions without access to monitoring tools
  • Critical services list: A prioritised list of business services and their infrastructure dependencies guides recovery sequencing
  • Vendor contact matrix: Third-party support contacts, contract numbers, and escalation procedures enable external assistance

Recovery Without Credentials

Your backup console requires Active Directory authentication. Your cloud console uses SSO. Your password manager is on a server that is encrypted. How do you actually begin recovery?

Break-Glass Credential Packs

Maintain offline copies of every credential needed to begin recovery from a total compromise:

  • Local administrator passwords for key servers
  • Backup console local authentication credentials
  • Cloud console root account credentials (not federated)
  • DNS registrar account access
  • Certificate authority root key material
  • Firewall and switch local admin credentials

The First 24 Hours: A Practical Sequence

  1. Hour 0 to 1: Establish communication, assess scope, activate incident response team using offline contact details
  2. Hour 1 to 4: Contain the attack using network topology documentation. Isolate affected segments. Preserve forensic evidence
  3. Hour 4 to 12: Begin recovery using offline credentials. Prioritise identity infrastructure (domain controllers), then communication (email), then business-critical applications
  4. Hour 12 to 24: Initiate regulatory notification using pre-staged templates. Brief the board. Engage external support using vendor contact matrix

What This Looks Like in Practice

An organisation with offline secure storage accesses their Vault within the first hour. They retrieve the incident response pack containing contact lists, credential packs, network documentation, and notification templates. Within four hours, they have contained the attack and begun recovery. Within 24 hours, they have restored core business services and initiated regulatory notification.

An organisation without offline preparation spends the first 24 hours trying to work out who to call, what credentials they need, and how to access their backup systems. Recovery takes weeks instead of hours.

Conclusion

Operating without systems is not a theoretical exercise. It is the reality of major cyber incidents. The organisations that recover in hours are those that prepared for exactly this scenario by maintaining critical response assets in physically disconnected storage. The preparation must happen before the incident. The offline storage must be in place before the attack. There is no improvisation that compensates for prior governance.

Mark Fermor
David Bailey
Kenny Phipps
Online Now
Concierge

Put this guide into practice

Ready to apply what you have learned? Explore how Firevault delivers the offline protection covered in this guide.

Takes about 2 minutes. No account needed.

Free2 minsNo sign-up

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy