For years, the dominant question has always been the same:
“How do we prevent the next attack?”
Firewalls. EDR. Backups. Zero Trust.
All important. All necessary.
But there is one question that is almost never asked — and only surfaces when it’s already too late:
What happens to your data when security fails?
Because failure is not a possibility - it’s a certainty
No matter how mature your security stack is.
No matter the size of your team, budget, or vendors.
Incidents happen.
And when they do, the problem stops being technical and becomes existential:
• Can we trust the data that remains?
• Can we prove what was changed - and what was not?
• Are our records defensible to customers, regulators, or a court?
• Can operations continue, or does everything freeze?
Most organisations discover too late that restoring systems is not the same as restoring trust.
Backups restore data. They don’t restore truth.
When an incident happens, backups take centre stage.
But there is an uncomfortable truth that rarely gets said:
A backup tells you what you have. It does not tell you whether it is true.
After an incident:
• Audits stall
• Legal positions weaken
• Regulators lose confidence
• Customers hesitate - or walk away
• A restored file may have been altered before the backup was taken.
• A record may have been manipulated without leaving evidence.
• A contract may exist - but no one can prove when, how, or in what state it existed.
And without proof, consequences follow:
The real problem is ambiguity
The greatest enemy after an attack is not malware. It is ambiguity.
When no one can say with certainty:
• what is valid,
• what was compromised,
• what can be used as evidence,
the organisation enters operational paralysis.
Systems may come back online.
But decisions are delayed.
Contracts are questioned.
Reports are postponed.
Trust evaporates.
This is where resilience matters - not as a buzzword, but as a practice
Resilience is not about preventing failure at all costs. It is about accepting that failure will happen - and designing systems that continue to operate regardless.
A cyber-resilience strategy answers different questions:
• How do we prove data integrity, even after an incident?
• How do we maintain audit-ready records while systems are under attack?
• How do we demonstrate, independently and verifiably, that information is authentic?
Resilience does not start at the moment of the attack. It starts before, in how data is created, registered, and validated throughout its lifecycle.
Security protects. Resilience proves.
Security tries to stop the worst from happening. Resilience ensures that when it does, the truth survives.
And in a regulated, litigious, digital-first world, truth - provable, verifiable, audit-ready truth - is the most critical asset an organisation can have.
In the next articles, we’ll explore:
• why backups and logs are not enough,
• how to prove integrity across the entire data lifecycle,
• and what it really means to be prepared for the “day after” an incident.
Because when everything fails,
the question isn’t whether you have data - it’s whether you can prove it’s true.

