Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Back to Knowledge Vault
InsightMarch 24, 2026Mark Fermor7 min read

Lock the Digital Door, Turn the Power Off: Defence and Resilience Explained

The Government urges businesses to lock the digital door on cyber criminals through Cyber Essentials. But defence is not resilience. For the data that matters most, physical disconnection ensures it survives when defences fail.

Lock the Digital Door, Turn the Power Off: Defence and Resilience Explained

In February 2026, the Government launched the Lock the Door campaign, urging businesses to adopt the Cyber Essentials scheme to protect against common cyber threats. The campaign, developed by the National Cyber Security Centre (NCSC) and the Department for Science, Innovation and Technology (DSIT), is timely, practical, and important. It addresses one half of a complete data protection strategy: defence. The other half is resilience.

At Firevault, we design and operate physically disconnected storage infrastructure. We work with organisations that have already invested in strong cyber defences and recognise that their most sensitive data requires a fundamentally different protection model: one that removes the network connection entirely. This article explains why both defence and resilience matter, and how they complement each other.

Defence: What the Lock the Digital Door Campaign Covers

The Lock the Digital Door campaign promotes Cyber Essentials, a government-backed certification scheme built around five key controls:

  • Firewalls: Protecting the network perimeter from unauthorised access
  • Secure configuration: Removing unnecessary services and default settings that create vulnerabilities
  • Software updates: Ensuring known vulnerabilities are patched promptly
  • User access control: Restricting who can access systems and data, and at what privilege level
  • Malware protection: Defending endpoints against malicious software

These five controls represent the baseline. They are the minimum that every organisation should have in place. The Government is right to promote them aggressively.

The Statistics That Demand Attention

The campaign is backed by figures from the Cyber Security Breaches Survey 2025 and the Cyber Security Longitudinal Survey that make the case for action unavoidable:

  • £14.7 billion: the annual cost of cyber threats to businesses — *DSIT, 2026*
  • 82 per cent: of medium and large businesses suffered a cyber incident in the past year
  • 92 per cent: fewer insurance claims were made by organisations with Cyber Essentials in place — *NCSC*
  • £195,000: the average cost of a significant cyber incident

Cyber Security Minister Baroness Lloyd stated: "No business is out of reach from cyber criminals. SMEs play a vital role in our economy, and business owners work incredibly hard to build something valuable, but too many still assume cyber criminals only go after big brands." — *GOV.UK Press Release, February 2026*

The data is clear. The threat is not theoretical. It is operational, financial, and existential for many smaller firms.

Defence Assumes Connection. Resilience Does Not.

Every one of the five Cyber Essentials controls operates on a shared assumption: that the systems being protected remain connected to a network. Firewalls protect a network perimeter. Software updates require an online update path. Access controls manage credentials on connected systems. Malware protection monitors connected endpoints.

This is not a flaw in the scheme. It is a scope decision. Cyber Essentials is designed to defend connected infrastructure from the most common attacks. It does this well, and the 92 per cent reduction in insurance claims is evidence of its effectiveness.

But defence and resilience are different disciplines. Defence keeps attackers out. Resilience keeps your business running when attackers get in. Ransomware does not need to bypass a firewall if it enters through a phishing email to an authorised user. Credential theft does not need to overcome access controls if the credentials unlock a system that is always online. Supply chain attacks do not need to penetrate a well-configured system if they can compromise a trusted vendor with network access.

The NCSC Annual Review 2024 reported a threefold increase in the most severe cyber incidents compared to the previous year. The common thread is that connected systems are, by definition, reachable. And reachable systems can be reached by attackers. Defence reduces the likelihood. Resilience addresses the consequence.

Cyber Essentials is the right answer to the right question: how do we defend connected systems? But for the data that an organisation cannot afford to lose, there is a more fundamental question: does this data need to be connected at all? That is not a defence question. It is a resilience question. — Mark Fermor, Founder, Firevault

Resilience Through Physical Disconnection

Consider the scenario. A small professional services firm achieves Cyber Essentials certification. Firewalls are configured correctly. Software is patched. Access controls are in place. Anti-malware is running on every endpoint. Their defence is strong.

Then a ransomware attack enters through a compromised supplier update. The malware moves laterally across the network. Every connected system is encrypted. The firm's client records, financial data, and intellectual property are locked. The ransom demand arrives.

The five Cyber Essentials controls did their job. They defended against the most common attacks. But this attack got through. Defence reduced the likelihood. Now the question is resilience: can the firm recover?

Now consider the same firm with one additional measure. Their most critical data, the client records, the contracts, the irreplaceable documents, is stored on a [Firevault system](/vault). Physically disconnected from the network. No IP address. No network path. No connection to the compromised infrastructure.

The ransomware encrypted everything it could reach. It could not reach the vault. The firm loses operational continuity, which is painful. But it does not lose the data that defines its business and its obligations to clients. Defence kept most threats out. Resilience kept the crown jewels safe.

Crown Jewels Strategy

The Government's campaign is right to focus on baseline defence for all businesses. Cyber Essentials should be universal. But within every organisation, there exists a category of data where defence alone is not sufficient.

Board materials. Client privilege files. Financial records. Succession plans. Intellectual property. Personal documents of directors and high-net-worth individuals. Regulatory evidence. Contracts that, if exposed, could result in litigation, reputational damage, or competitive disadvantage.

This is the crown jewels category. It is the data where the consequences of compromise are not measured in downtime or recovery costs, but in existential outcomes. Business closure. Personal liability. Loss of professional standing.

For this category, the correct strategy is not stronger defence alone. It is adding [resilience through physical disconnection](/offline-secure-storage/what-is-oss). Turning the power off ensures that no matter what happens to the connected infrastructure, the most critical data remains beyond the reach of any network-based threat.

Defence and Resilience: Complementary Disciplines

Firevault does not compete with Cyber Essentials. The two address different dimensions of the same challenge. Cyber Essentials is defence: it protects operations. [Offline Secure Storage](/offline-secure-storage/what-is-oss) is resilience: it protects crown jewels.

The Lock the Digital Door campaign is an important step. Every business should lock its digital doors. But for the data that matters most, locking the door is not enough. Turning the power off ensures that even when attackers get through the door, your most critical data is already beyond their reach.

Sources and Further Reading

Key Takeaways

  • The Lock the Digital Door campaign is necessary and well-designed, promoting baseline cyber defence that every business should adopt
  • Cyber Essentials is defence: five proven controls that protect connected systems from common attacks
  • Defence and resilience are different disciplines: defence keeps attackers out; resilience keeps you running when they get in
  • Physical disconnection is resilience: removing critical data from the network entirely ensures it survives any breach
  • Every organisation needs both: Cyber Essentials for operations, offline storage for crown jewels
Share this article

Related Articles

Mark Fermor
David Bailey
Kenny Phipps
Online Now
Concierge

Which offline secure storage solution is right for you?

Answer a few quick questions and we will recommend the right solution — whether that is a personal vault or a scalable offline storage system built for your needs.

Takes about 2 minutes. No account needed.

Free2 minsNo sign-up

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy