Cyber Attacks: A Pen and Paper Plan

October 21,2025

Business And Management

Britain on Alert: Firms Urged to Swap Pixels for Paper as Cyber Threats Escalate

In an age dominated by digital infrastructure, a stark new warning from the government urges a return to the most fundamental of tools: writing implements and paper. National security officials have formally advised business leaders throughout the United Kingdom to maintain physical, hard-copy versions of their cyber-attack contingency plans. This guidance underscores a growing recognition that digital defences alone are insufficient. When hackers succeed in penetrating a network, they can render every computerised system inaccessible, including the very plans designed to respond to the breach. A recent wave of sophisticated cyber intrusions has demonstrated the profound chaos that ensues, crippling major corporations and disrupting essential services. The call to keep offline copies is a pragmatic acknowledgement that in a true digital crisis, the old ways may be the only ones that work, ensuring a business can access its emergency protocols when its screens are dark.

NCSC Sounds the Alarm

This message of urgent preparedness has been amplified by the National Cyber-Security Centre (NCSC) in its latest annual review. The report highlights a disturbing escalation in the severity of cyber-attacks targeting the nation. While the overall number of incidents has remained relatively stable, the proportion of those classified as "nationally significant" has surged dramatically. This trend indicates that malicious actors, ranging from state-sponsored groups to organised criminal gangs, are becoming more effective at inflicting widespread damage. The NCSC's public declaration serves as a clear signal to boardrooms and business leaders that the threat landscape has evolved. The focus is no longer just on preventing attacks but on ensuring the capacity to survive and recover from them. This shift in emphasis from pure prevention to robust resilience marks a critical turning point in the UK's national cyber-security strategy.

The High Cost of Digital Paralysis

The tangible consequences of these advanced cyber-attacks have been starkly illustrated by recent events. High-profile victims include the Co-op, Marks and Spencer, and Jaguar Land Rover, all of whom have suffered hacks that brought their operations to a grinding halt. For these corporate giants, the loss of computer systems translated directly into empty supermarket shelves and motionless production lines. The financial repercussions are immense, but the reputational damage can be even more lasting. These incidents reveal the intricate dependency of modern commerce on digital networks, where a single breach can sever supply chains and disable customer-facing services. The struggles of these well-resourced companies serve as a cautionary tale for all organisations, demonstrating that no one is immune and that the absence of a non-digital backup plan can lead to catastrophic operational failure.

Engineering for Resilience

In response to the escalating threat, experts are championing a strategic evolution beyond traditional cyber-security. This new approach, termed "resilience engineering," shifts the focus from building impenetrable walls to designing infrastructure capable of withstanding and adapting to breaches. Richard Horne, chief executive for the NCSC, has stressed that organisations must have a clear plan for continuing to function in the absence of their digital networks while simultaneously working to restore them. Resilience engineering presupposes that attacks will eventually succeed. Therefore, it prioritises the ability to anticipate threats, absorb the initial impact, recover core functions swiftly, and adapt security protocols based on the experience. This forward-thinking strategy moves away from a reactive posture and towards a proactive model of continuous improvement and adaptation in the face of an ever-changing digital battlefield.

Cyber

The Anatomy of an Offline Plan

The guidance from the NCSC specifies what these essential non-digital plans should contain. Critically, they must be maintained as hard copies or on offline devices completely disconnected from the main network. The plans need to detail practical, analogue workarounds for essential business processes. This includes establishing clear communication channels that do not rely on corporate email or internal messaging platforms, which would likely be compromised or unavailable during an attack. Contact lists for key personnel, stakeholders, and emergency services should be printed out. Protocols for managing staff, communicating with customers, and handling media inquiries must also be documented. The core objective is to create a comprehensive playbook that allows an organisation to function and begin its recovery process without any reliance on its disabled digital infrastructure.

A Noteworthy Shift in Official Advice

While the concept of having backup plans is far from revolutionary, the UK cyber authority's decision to place such prominent emphasis on physical documentation as part of its yearly report is highly significant. This public-facing campaign reflects a growing concern at the highest levels of government about the country's vulnerability to major cyber disruptions. In previous years, the focus has often been on sophisticated digital defence tools and threat intelligence sharing. Now, the official advice explicitly includes low-tech, traditional methods as a critical layer of defence. This shift indicates an understanding that even the most advanced cyber-security systems can fail. It represents a pragmatic, belt-and-braces approach, blending cutting-edge technology with time-tested methods to create a more robust and multifaceted national defence strategy against increasingly aggressive digital adversaries.

The Rising Tide of Significant Incidents

The statistical data from the NCSC paints a clear picture of the escalating threat. Over the first three quarters of the year, the centre dealt with 429 cyber incidents, a figure comparable to the previous year. However, the critical difference lies in the severity of these events. A staggering 204 of these incidents were classified as "nationally significant," a dramatic increase from just 89 in the same period a year earlier. This category encompasses the top three classifications of threat in the official UK model, ranging from "Significant" to a "National cyber-emergency." This sharp rise demonstrates that adversaries are not just launching more attacks; they are launching more effective ones with far greater potential for national disruption, impacting critical infrastructure, major businesses, and public services.

Understanding the Threat Categories

The UK's framework for categorising cyber-attacks provides a clear hierarchy of severity. At the top is Category 1, a "National cyber-emergency," which would involve a severe and widespread impact on the country. Serious breaches include those designated "Highly significant incident," which is Category 2, and "Significant incident," which is Category 3. Eighteen of the events recorded this year landed in the "highly significant" classification. This figure represents a fifty percent jump and is the third consecutive year showing such a rise. To provide context, the series of intrusions affecting retailers like Marks & Spencer and Harrods is understood to qualify as a "Significant incident." The NCSC refrains from detailing which specific attacks fall into each category, but the framework itself highlights the structured approach authorities take in assessing and responding to the diverse threats facing the nation.

The Human Impact of Cyber Warfare

The real-world consequences of these digital assaults extend far beyond financial loss and operational disruption. An extremely severe breach during the previous year targeted a provider of blood testing services, leading to severe problems for several London hospitals. The resulting chaos caused major disruptions to clinical services, with reports directly linking the incident to the death of a minimum of one patient. This tragic outcome serves as a grim reminder that cyber-attacks are not victimless crimes confined to the digital realm. They can have profound and devastating impacts on public health and safety, crippling essential services that people rely on. The NCSC’s reluctance to categorise this specific incident publicly does little to diminish its severity, highlighting the life-and-death stakes involved in protecting the UK's critical national infrastructure from malicious online actors.

The Dominance of Financial Motives

For a great many cyber-attacks, the motivation is simple and powerful: financial gain. Criminal gangs, many of which operate from Russia or nations of the former Soviet Union, have industrialised the process of digital extortion. Their primary weapon is ransomware, a type of malicious software that encrypts a victim's files, rendering them completely inaccessible. The attackers then demand a ransom, typically paid in cryptocurrencies like Bitcoin, in exchange for the decryption key. In many cases, these gangs also employ a double-extortion tactic, stealing sensitive data before encrypting the systems and threatening to release it publicly if the ransom is not paid. This financially motivated cyber-crime model has proven to be incredibly lucrative, fuelling a global criminal enterprise that poses a persistent and significant threat to organisations of all sizes.

Cyber

The Resurgence of Teenage Hackers

While organised crime syndicates from Eastern Europe dominate the ransomware landscape, a notable and concerning trend has been the re-emergence of highly skilled adolescent hacking collectives. These groups are often believed to operate from nations where English is the primary language, including the UK. Unlike the financially motivated ransomware gangs, their motivations can be more varied, sometimes revolving around notoriety, disruption, or ideology. During this calendar year, British law enforcement has taken into custody seven teenagers in connection with major cyber-attacks, signalling a growing problem with homegrown talent being drawn into serious digital crime. These young but capable hackers often possess a sophisticated understanding of network vulnerabilities, using their skills to breach corporate and government systems, demonstrating that a significant threat can originate not just from hostile states but also from a teenager's bedroom.

A Call for Greater Collaboration

In light of the multifaceted threat, Whitehall is not only advising on preparation but is also actively encouraging organisations to collaborate more closely with national security agencies. Businesses are being strongly encouraged to take greater advantage of the extensive suite of complimentary resources provided by the NCSC. One of the flagship initiatives is the Cyber Essentials programme, a government-backed scheme that helps organisations protect themselves against a wide range of common cyber-attacks. As an incentive, smaller companies which attain this certification can qualify for free cyber-insurance. The overarching message is one of shared responsibility; while the government provides resources and intelligence, businesses must take proactive steps to harden their defences and engage with the national security apparatus to build a more resilient digital economy for the entire country.

A Business Owner's Harrowing Experience

The story of Paul Abbott provides a powerful, firsthand account of the devastating impact a cyber-attack can have. His Northamptonshire-based logistics business, KNP, ceased trading in 2023 after intruders locked up its vital operating software and requested a payment. Mr. Abbott believes such incidents are now an inevitability, not a possibility. He revealed that his company was investing a substantial £120,000 per year into its cyber-security, including insurance and services from external management firms, yet it was still compromised. Following this life-altering experience, his focus has shifted to a three-pronged approach: robust security, comprehensive staff education, and, crucially, detailed contingency planning. His experience validates the government's advice, showing that even significant investment in digital defence is not foolproof and that planning for what to do when those defences fail is absolutely essential for survival.

The Practicality of Old-Fashioned Methods

Cyber-security experts have endorsed the government's call for a return to physical documents, dismissing any suggestions that it is an outdated approach. Graeme Stewart, who leads the public sector division at the security company Check Point, emphasised the practical wisdom behind the advice. He noted that once hackers gain control, entire digital networks, including cloud-based storage, become wholly unusable. The physical plan becomes the only reliable resource in a total network outage. Stewart drew a compelling analogy, comparing navigating the internet without basic protections to entering a construction zone lacking a hard hat. It is a fundamental safety precaution that is simply non-negotiable in a hazardous environment. His commentary reinforces the idea that true resilience lies in a layered defence that incorporates both high-tech and low-tech solutions.

Cyber-Security as a Core Business Function

The ultimate message from both government and industry experts is that cyber-security must be elevated to the same level of importance as occupational health and safety protocols. It can no longer be treated as an optional extra, an afterthought, or the sole responsibility of the IT department. Graeme Stewart argues that it must become a fundamental component of the daily work routine for every employee. Just as staff are trained on fire evacuation procedures, they must also be educated on identifying phishing emails and adhering to security protocols. This cultural shift requires leadership from the top, with boards and executives championing a security-first mindset. When cyber-security is woven into the fabric of an organisation's culture, it ceases to be a burden and instead becomes a collective responsibility, creating a much stronger and more resilient human firewall against external threats.

Do you want to join an online course
that will better your career prospects?

Give a new dimension to your personal life

whatsapp
to-top