CTO blog
Your trusted source within the Data Protection industry…
December 2025
Doing the Right Thing at the Right Time: Why Data Protection Decisions Cannot Wait
Every organization believes it has more time than it does.
In day-to-day operations, data protection rarely competes with urgent revenue, systems migrations, or staff shortages. Most leaders know they should modernize backup and business continuity, but the work is routinely postponed. “Next quarter” becomes “next year,” and “once the new system goes live” becomes “when things calm down.”
The truth is that things rarely calm down.
And in data protection, delay carries costs that only become visible when it is too late.
Across Europe, we see the same pattern repeated: a conscientious IT manager recognizes the weaknesses in their backup and business continuity posture. They initiate conversations. They gather information. They try to elevate the issue internally. But other priorities — systems rollouts, resignations, sick leave, budget cycles – push the matter down the agenda. Leadership hears the recommendation but cannot feel the urgency.
Nothing has failed yet, so the risk feels theoretical.
Until it isn’t.
When the Warning Signs Were There All Along
A representative example illustrates the point. An organization ran a legacy backup setup built around a single technology stack administered on-premise. For years, their IT lead held periodic discussions with external partners about modernizing the environment, isolating the backups, or adopting a managed service. The conversations were constructive, but competing responsibilities made it impossible to secure internal alignment.
The cycle repeated for nearly two years. Meetings were deferred to accommodate system migrations, staff illness, workload pressure, or management availability. The intent was good; the timing never felt right.
Then the failure arrived – not as a surprise, but as an inevitability.
The organization suffered a ransomware attack from a well-known culprit family, consistent with patterns reported by ENISA, Microsoft, and Mandiant. The attackers did not simply encrypt production data. They targeted the backup environment first. The backup server was encrypted. The backup software could not start. Critical metadata was lost. Only raw backup container files remained.
This is not an edge case.
It is the leading tactic in modern ransomware operations: compromise the identity plane, locate backup infrastructure, and neutralize the recovery path before encrypting primary systems. ENISA’s 2024 Threat Landscape report highlights this specifically: attackers increasingly prioritize backup compromise because it maximizes leverage and increases ransom conversion rates.
When the call for help finally comes, it often comes from a place of desperation rather than preparation.
The Behavioral Side of Delay
It is easy to assume these outcomes are technical in nature. In practice, the true drivers are behavioral and organizational:
- Competing priorities create perpetual deferral
Backup, storage, and business continuity work is important but rarely urgent. It is always the next item on the list. - Risk visibility does not travel upwards
An IT lead may understand the exposure, but senior leadership experiences symptoms, not infrastructure. Without a failure, nothing signals danger. - Familiarity with the existing system creates false reassurance
Legacy environments “have always worked,” making it harder to justify intervention – even as they silently age. - Teams are stretched
Most IT departments run lean, and MSPs face a known talent squeeze. The most capable staff gravitate toward broader cybersecurity roles, leaving backup and business continuity capacity thinner each year. - Complexity builds slowly
Retention policies drift. Backups expand. Infrastructure ages. None of it feels urgent until the moment everything depends on it.
Delay is rarely intentional.
It is simply the default outcome of crowded calendars and operational pressure.
Why the Attack Surface Has Shifted
Ransomware groups have adapted faster than many organizations.
Three trends stand out:
- Backup compromise is now a primary objective
Attackers know that the presence of a clean, isolated backup eliminates negotiation leverage. So, they look for backup servers, storage nodes, and admin credentials first. - Hybrid environments increase the pathway count
Identity misconfigurations, unpatched hypervisors, exposed management interfaces, and legacy systems create reliable footholds. - The regulatory bar has risen
NIS2, DORA, and GDPR have codified what “reasonable” protection looks like: isolated backups, tested recovery, documented governance. These are not suggestions; they are expectations.
Organizations relying solely on traditional backup architectures are not only exposed – they are below the threshold regulators now assume.
The Economics of Postponement
Many teams postpone backup modernization due to perceived cost.
Yet the economic reality is the opposite.
IDC estimates that recovery from a major ransomware attack now costs an average of EUR 1.7 million excluding ransom. Gartner projects that by 2027, 80% of organizations will shift to BaaS or DPaaS because traditional architectures are neither cost-effective nor defensible.
A 90-minute evaluation is inexpensive.
A recovery attempt on encrypted infrastructure is not.
The Human Cost
When an attack happens and backups fail, the technical impact is severe. But the human impact is often worse:
- IT teams feel responsible for an outcome they tried to prevent
- Leadership experiences shock: “How did this happen?”
- Recovery timelines stretch into days or weeks
- Customer trust erodes
- Insurers scrutinize controls
- Regulators ask for evidence that does not exist.
All of this was predictable – not because the teams were negligent, but because the timeline allowed risk to accumulate quietly.
What “Doing the Right Thing at the Right Time” Means
It does not mean replacing systems impulsively or over-investing.
It means recognizing that some decisions have a diminishing window of safety. Backup, storage, and business continuity sit firmly in that category.
Doing the right thing at the right time means:
- isolating backups from production networks
- enforcing strict separation of duties
- ensuring immutability against identity compromise
- validating recovery paths
- avoiding single-point backup architectures
- reducing dependency on individual staff
- documenting governance for auditors and insurers.
These are not embellishments – they are the minimum standards for resilience in 2025.
Across our work with MSPs and enterprises, we see that organizations who modernize early rarely experience catastrophic failures. Those who wait often face outcomes that were foreseeable.
A Path Forward – and a Path to B4Restore
A 90-minute conversation with B4Restore is not a commitment – it is an assessment.
It gives your team space to articulate its concerns, context, limitations, and priorities. And it gives us the opportunity to present a DPaaS model that can be adopted fully or partially, depending on what makes sense in your environment.
Even if there is no match, both sides leave with a clearer understanding of your resilience posture and options. That alone justifies the time.
But waiting rarely does.
Backups are not merely a technical component; they are the final line standing between disruption and recovery. Once that line is breached, choices narrow quickly. Doing the right thing at the right time is not a slogan – it is a principle that prevents preventable outcomes.
If you would like to know whether your current posture is defensible, whether your backups are truly isolated, or whether your organization could withstand the failure mode described above, the simplest next step is a conversation.
A path to resolution begins with clarity.
And the path to clarity begins with us at B4Restore.

Henrik Lind, Chief Technology Officer, B4Restore A/S