• 28 April 2026, 11:37 AM

Author Archives: DSM Group

backup

Your Backup Is Potentially Useless. Here’s Why.

Most organisations believe they are protected because they have backups in place.

They tick the box.
They pass audits.
They assume they are covered.

But in reality, backups alone do not protect your business.

They protect your data.

And those are not the same thing.


The Misconception: Backup = Recovery

A backup strategy answers one question:

“Can we retrieve our data?”

But business continuity depends on a completely different question:

“How quickly can we operate again?”

That gap between data recovery and operational recovery is where most failures happen.


What Actually Happens During an Incident

Let’s take a realistic scenario:

A ransomware attack encrypts your systems at 09:00.

You have backups. Good.

Now what?

Step 1: Identify the breach

Hours can pass before the full scope is understood.

Step 2: Isolate affected systems

You cannot restore safely until the threat is contained.

Step 3: Validate backups

Are they clean? Are they recent? Are they complete?

Step 4: Begin restoration

This is where most assumptions break.

Large datasets take hours or days to restore
Infrastructure must be rebuilt or reconfigured
Dependencies between systems cause delays

Step 5: Test systems

You cannot bring systems live without validation.

Step 6: Restore user access

Staff still need:
Devices
Network access
Applications
Secure authentication

At this point, even with good backups, many businesses are still offline for days.


The Real Problem: Recovery Time

This is where two critical metrics come into play:

Recovery Time Objective (RTO)

How long it takes to restore operations.

Recovery Point Objective (RPO)

How much data you can afford to lose.

Most organisations focus heavily on RPO, which relates to backups.

But it is RTO that determines whether your business survives.

Because:

A 24 hour outage means lost revenue
A 72 hour outage means lost customers
A week long outage can mean potential business failure


Why Backups Fail in Practice

Backups do not fail because they do not exist.

They fail because they are incomplete as a strategy.

1. No Infrastructure to Recover Into

Backups need a target environment.

Without:
Pre configured servers
Network infrastructure
Security controls

You are rebuilding from scratch.


2. No Defined Failover Process

Most organisations do not have a clear, tested sequence for switching operations.

Instead, recovery becomes:
Reactive
Manual
Slow


3. No Workplace Recovery Plan

Even if systems are restored:

Where do staff work?
How do they access systems?
What happens if the office is unavailable?

This is one of the most overlooked risks.


4. No Testing Under Real Conditions

A backup that has never been tested is a theoretical solution.

Under pressure:
Scripts fail
Dependencies break
Teams do not know their roles

Testing exposes reality.

Most organisations avoid it.


What Real Business Continuity Looks Like

A proper strategy goes far beyond backup.

It includes:

1. Replicated Infrastructure

Not just stored data, but ready to run environments.

2. Defined Recovery Processes

Clear, documented, and rehearsed.

3. Rapid Failover Capability

The ability to switch operations in minutes, not days.

4. Workplace Recovery

Ensuring people, not just systems, can function.

5. Regular Testing

Simulating real world failure scenarios.


Backup Is One Piece of a Larger System

Backups are still essential.

But they are just one component in a broader resilience strategy.

Without the surrounding infrastructure and planning, they create a false sense of security.


The Question Most Businesses Avoid

It is easy to ask:

“Do we have backups?”

It is much harder, and more important, to ask:

“How long could we realistically operate without our systems?”

Because that answer defines your actual level of risk.


Final Thought

Technology failures do not usually destroy businesses.

Downtime does.

And downtime is not solved by backups alone.


If you have never tested your recovery under real conditions, you do not truly know your risk.

It might be worth asking:

How long could your business actually survive offline?
Talk to us about real world backup and recovery.

    Please prove you are human by selecting the star.

    Modern IT Landscape

    The Modern IT Landscape: Technical Challenges Facing Businesses in 2026

    he current IT environment is defined by rapid innovation, but also by compounding complexity, expanding attack surfaces, and operational fragility. Businesses are no longer simply “using IT”—they are entirely dependent on it. As a result, infrastructure decisions now directly determine resilience, security posture, regulatory compliance, and ultimately commercial survival.

    Below is a deep technical breakdown of the most pressing challenges organisations face today.


    1. Cloud Complexity and Misconfiguration Risk

    The shift to hybrid and multi-cloud architectures has created distributed, fragmented infrastructure models that are inherently difficult to secure and manage.

    • Cloud adoption continues to accelerate, driven by scalability and AI workloads
    • However, misconfigurations remain the dominant cause of breaches, with poorly secured storage, IAM policies, and exposed services acting as entry points
    • Recent findings show up to 80% of cloud breaches stem from basic configuration errors

    Technical Reality

    Modern environments include:

    • Multi-cloud (AWS, Azure, private cloud)
    • Kubernetes / container orchestration layers
    • CI/CD pipelines with embedded secrets
    • API-driven microservices

    Each layer introduces:

    • Identity sprawl (users, service accounts, tokens)
    • Policy inconsistency across platforms
    • Limited visibility into east-west traffic

    Implication

    Without centralised governance, continuous configuration monitoring (CSPM), and identity control, organisations are operating with unknown exposure risk.

    DSM Alignment

    A properly architected colocation plus private cloud hybrid model, supported by managed services, allows:

    • Deterministic control over infrastructure
    • Reduced reliance on hyperscaler complexity
    • Secure segmentation and predictable performance

    2. Explosion of Attack Surface and Identity-Based Threats

    The traditional network perimeter is effectively gone. Modern environments are defined by identity, not location.

    • Machine identities (APIs, certificates, service accounts) now vastly outnumber humans
    • Credential theft accounts for a growing proportion of breaches, with sharp increases in compromised identities

    Technical Reality

    Attack vectors now include:

    • Stolen API tokens from CI/CD pipelines
    • Compromised service accounts with excessive privileges
    • Lateral movement via poorly segmented networks
    • Abuse of OAuth and federated identity systems

    Traditional controls such as firewalls and VPNs are ineffective against:

    • Authenticated attackers
    • Insider threats
    • Compromised machine identities

    Implication

    Security must move toward:

    • Zero Trust Architecture (ZTA)
    • Continuous authentication and behavioural monitoring
    • Least privilege access enforced dynamically

    DSM Alignment

    This is where managed cybersecurity services become critical:

    • Identity governance and privileged access management
    • Network segmentation within controlled data centre environments
    • SIEM and XDR monitoring with real-time threat detection

    3. AI-Driven Threat Acceleration

    Artificial Intelligence is now both a defensive tool and a threat multiplier.

    • The majority of organisations are using AI, significantly expanding attack surfaces
    • AI enables attackers to automate phishing campaigns, malware generation, and reconnaissance

    At the same time:

    • AI systems introduce new trust boundaries
    • Autonomous agents can interact with systems without human validation

    Technical Reality

    AI introduces:

    • Unstructured data exposure risks
    • Model poisoning and prompt injection vulnerabilities
    • API-level attack surfaces
    • Autonomous decision-making risks

    Implication

    Security models must evolve to:

    • Treat AI agents as identities
    • Enforce strict access controls and audit trails
    • Monitor behaviour, not just signatures

    DSM Alignment

    A secure, controlled hosting environment rather than uncontrolled public AI integrations enables:

    • Data sovereignty
    • Controlled AI workload deployment
    • Reduced exposure to external threat vectors

    4. Data Centre Demand, Power Constraints, and Sustainability Pressure

    The backbone of IT, data centres, is under unprecedented strain.

    • Global demand for data centre capacity is expected to triple by 2030
    • Power consumption is rising dramatically, becoming a primary constraint
    • Data centres are now considered critical national infrastructure in the UK

    Technical Reality

    Operators face:

    • Power density challenges from AI workloads such as GPU clusters
    • Cooling inefficiencies between air and liquid systems
    • Grid constraints and energy pricing volatility
    • ESG and carbon reporting requirements

    Implication

    Businesses must consider:

    • Where workloads are hosted
    • Energy efficiency of infrastructure
    • Long-term sustainability commitments

    DSM Alignment

    Facilities designed with:

    • Water cooling and energy-efficient systems
    • Renewable energy integration such as solar
    • Scalable high-density rack capability

    …provide both cost control and ESG alignment, which is increasingly a commercial requirement.


    5. Regulatory Pressure and Data Sovereignty

    Governments are tightening control over data location, cyber resilience, and supply chain security.

    • There is increasing focus on digital sovereignty and reducing reliance on foreign hyperscalers
    • New legislation is driving higher standards for critical infrastructure protection

    Technical Reality

    Organisations must now manage:

    • Data residency requirements
    • Encryption and key ownership
    • Third-party risk including supply chain attacks
    • Auditability and compliance reporting

    Implication

    Public cloud alone is often insufficient for:

    • Sensitive workloads
    • Regulated industries
    • Long-term compliance strategy

    DSM Alignment

    UK-based data centre and IT services provide:

    • Sovereign infrastructure control
    • Compliance-ready environments aligned to recognised standards
    • Reduced exposure to geopolitical and vendor risk

    6. Operational Resilience and Disaster Recovery Gaps

    Modern businesses must assume breach or failure is inevitable.

    • Focus is shifting from prevention to resilience and recovery
    • Many organisations still lack tested disaster recovery plans and reliable backup strategies

    Technical Reality

    Common weaknesses include:

    • Backups stored in the same environment as production
    • Unverified recovery processes
    • Lack of orchestration for failover
    • Inadequate ransomware recovery strategies

    Implication

    Downtime is no longer just operational. It is financially catastrophic, reputationally damaging, and potentially a regulatory failure.

    DSM Alignment

    Robust Disaster Recovery as a Service solutions deliver:

    • Defined recovery objectives such as 15-minute RPO
    • Offsite, immutable backups
    • Rapid failover capability
    • Full business continuity assurance

    7. Skills Shortage and Tool Sprawl

    Even well-funded organisations struggle with execution.

    • Security teams are overwhelmed by alert fatigue, tool fragmentation, and skills shortages
    • Many organisations operate numerous disconnected security tools, creating silos and blind spots

    Technical Reality

    This leads to:

    • Slow incident response
    • Inconsistent policy enforcement
    • Increased mean time to detect and respond

    Implication

    Technology alone is not the solution. Integration and expertise are critical.

    DSM Alignment

    Managed IT and security services provide:

    • Consolidated tooling and visibility
    • Experienced technical and security professionals
    • Continuous monitoring and response capability

    Complexity to Control

    The overarching challenge facing businesses today is not any single technology. It is the convergence of all of them.

    Cloud, AI, identity, regulation, infrastructure, and evolving threats are individually manageable, but collectively overwhelming.

    The organisations that succeed will be those that:

    • Regain control over their infrastructure
    • Simplify architecture where possible
    • Embed security at every layer
    • Prioritise resilience over theoretical perfection

    This is where a fully integrated approach combining data centre, IT services, and cybersecurity becomes essential rather than optional.

    How to Improve Employee Productivity 31 1024x576 1

    Cyber Security Laws Are Changing: What It Means for Your Business

    Cyber security is no longer just a technical consideration. It is now a core part of business risk, governance, and compliance. As regulations continue to evolve across the UK and internationally, organisations are expected to take a more structured, accountable, and evidence driven approach to protecting their systems and data.

    For many businesses, this is not about starting from scratch. It is about strengthening what is already in place and ensuring it stands up to increasing scrutiny.


    A Shift in Expectations

    Recent changes in cyber security regulation are shaping how organisations are expected to operate.

    There is now greater emphasis on accountability, with leadership teams expected to understand and take ownership of cyber risk. At the same time, expectations around incident detection and response have tightened, with faster reporting requirements becoming standard.

    Perhaps the most significant shift is the move towards evidence. It is no longer enough to say that security measures are in place. Businesses must be able to demonstrate what is being monitored, what risks have been identified, and how those risks are being managed.

    There is also increasing focus on supply chains. Organisations are expected to understand the security posture of their partners and suppliers, not just their own internal systems.


    What This Means in Practice

    The practical impact for businesses is a move away from periodic reviews towards continuous oversight.

    Organisations need to be able to:

    • Maintain ongoing visibility of vulnerabilities across their environment
    • Prioritise and address risks in a structured way
    • Keep clear records of actions taken
    • Provide evidence quickly and confidently during audits

    Many traditional IT support models were not designed with these requirements in mind. As a result, some businesses may find gaps between what they currently have in place and what is now expected.


    The Role of Your IT Partner

    As requirements evolve, so too must the role of your IT provider.

    A modern IT partner should help you stay ahead of risk and maintain compliance, not simply respond to issues as they arise.

    Key capabilities to look for include:

    • Continuous visibility of your security position
    • Clear prioritisation and management of vulnerabilities
    • Reporting that supports audits and regulatory requirements
    • Proactive guidance on improving your security posture
    • Alignment with recognised standards such as ISO 27001 and Cyber Essentials

    This approach helps ensure that security is not just in place, but also measurable and demonstrable.


    Supporting a Structured Approach to Security

    At DSM Group, we support businesses in taking a more structured and consistent approach to cyber security.

    Our Vulnerability Management as a Service provides continuous scanning and clear insight into potential risks, alongside prioritised guidance on remediation.

    Our Security as a Service offering builds on this by delivering ongoing monitoring, threat detection, and support in maintaining a strong overall security posture.

    These services are designed to provide clarity and confidence, helping businesses understand their risks and demonstrate how they are being managed.


    Preparing for What Comes Next

    Regulation will continue to evolve, and expectations around cyber security will only increase.

    Organisations that take a proactive approach now will be better positioned to meet future requirements. By putting the right processes, visibility, and support in place, compliance becomes a natural outcome of good practice rather than a reactive exercise.


    Final Thoughts

    Cyber security today is about more than protection. It is about assurance.

    Being able to clearly demonstrate that risks are understood, monitored, and managed is becoming a fundamental requirement for doing business.

    With the right approach and the right support, this does not need to be complex. It simply needs to be consistent, visible, and well managed.

    Like to know more?

      Please prove you are human by selecting the key.

      O365 dashboard scaled 1

      Acronis 365 Backup Solutions with DSM Group

      Protecting Your Microsoft 365 Data

      Microsoft 365 (formerly Office 365) has become the backbone of business productivity – with Exchange Online, SharePoint, OneDrive, and Teams central to daily operations. However, what many organisations don’t realise is that Microsoft operates on a shared responsibility model. While Microsoft ensures service uptime and infrastructure resilience, protecting your business-critical data is your responsibility.

      That’s where Acronis 365 Backup, delivered by DSM Group, comes in.


      Why Microsoft 365 Data Still Needs Backup

      Relying on the default retention policies within Microsoft 365 can leave your organisation exposed. Common risks include:

      • Accidental Deletion – A user mistakenly deletes files, emails, or Teams messages.
      • Malicious Actions – Disgruntled employees or external attackers intentionally remove or corrupt data.
      • Ransomware & Malware – Malicious code can spread through shared mailboxes and OneDrive.
      • Compliance & Legal Hold – Regulatory requirements often demand longer data retention than Microsoft provides by default.

      Without a third-party backup, once Microsoft’s retention period lapses, your data is permanently lost.


      DSM Group’s Acronis 365 Backup Solution

      DSM Group leverages Acronis Cyber Protect Cloud to deliver comprehensive Microsoft 365 backup and recovery. Our solution covers:

      • Exchange Online – Protect mailboxes, calendars, contacts, and attachments.
      • SharePoint Online – Secure entire sites, documents, libraries, and permissions.
      • OneDrive for Business – Backup files and folder structures with versioning.
      • Microsoft Teams – Preserve chat messages, shared files, and team site content.

      All data is stored securely in DSM’s UK Data Centres, ensuring compliance with GDPR and local data residency requirements.


      Key Features & Benefits

      • Automated Backups – Schedule daily or more frequent backups for complete peace of mind.
      • Fast Recovery – Granular restore options let you recover a single email, file, or entire mailbox in minutes.
      • Ransomware Protection – Built-in Acronis Active Protection detects and blocks suspicious activity.
      • Compliance Ready – Meet GDPR, FCA, and other regulatory obligations with extended retention and audit trails.
      • Scalable & Flexible – Pay only for what you need – easily scale up as your Microsoft 365 usage grows.
      • UK Data Sovereignty – Your backups never leave DSM’s secure UK facilities.

      How It Works

      1. Seamless Integration – DSM connects your Microsoft 365 tenant to the Acronis backup platform with no downtime.
      2. Policy Setup – Backup frequency, retention policies, and security settings are tailored to your business needs.
      3. Ongoing Protection – Your data is backed up automatically to DSM’s secure cloud.
      4. Quick Recovery – Restore lost or corrupted data on-demand, whether it’s a single file or an entire SharePoint site.

      Why Choose DSM Group?

      With nearly 40 years of experience in data protection, colocation, and business continuity, DSM Group provides more than just backup software. We deliver:

      • End-to-End Management – From configuration to ongoing monitoring and support.
      • UK-Based Support – Expert helpdesk and technical support available when you need it.
      • Trusted Infrastructure – Hosted within DSM’s eco-friendly UK Data Centres.
      • Proven Experience – Trusted by businesses across multiple industries for secure data management.

      Get Started Today

      Don’t leave your Microsoft 365 data unprotected. Whether it’s a single accidental deletion or a ransomware attack, the cost of data loss can be devastating.

      DSM Group’s Acronis 365 Backup solution ensures your data is always secure, compliant, and recoverable.

      Contact us today to discuss your Microsoft 365 backup requirements and request a free demo.

      mands-hack

      A Deep Dive into the M&S Hack: Root Cause, Impacts, and the Path Forward

      In an era where data is as valuable as currency, cyberattacks have grown not only in frequency but in sophistication. The recent breach involving Marks & Spencer (M&S), one of the UK’s most established retail giants, underscores the vulnerabilities that even long-standing and digitally mature organisations can face. At DSM, we take these incidents seriously — not just as cautionary tales, but as learning opportunities to better secure our clients’ infrastructure.

      In this post, we explore the root cause of the M&S hack, its impacts, and the potential remediations and industry best practices that organisations of all sizes should consider.


      What Happened?

      In June 2025, M&S confirmed that customer data had been exposed via a third-party supplier breach. The attack did not directly target M&S’s core systems, but rather leveraged vulnerabilities in MoveIt, a file transfer software widely used by many enterprises — echoing the Clop ransomware gang’s global campaign from 2023 which exploited a zero-day vulnerability in the same software.

      This breach exposed sensitive employee and customer data, including contact details, payroll records, and in some cases, national insurance numbers. Although payment data was reportedly not affected, the breach was serious enough to warrant a coordinated incident response, internal investigations, and involvement from the Information Commissioner’s Office (ICO).


      Root Cause Analysis

      1. Third-Party Vulnerability

      The breach highlights the ever-growing risk associated with supply chain and third-party software. M&S was not directly attacked; instead, its data was compromised via its association with a vulnerable vendor. The MoveIt vulnerability allowed attackers to bypass authentication and gain access to sensitive files through unauthorised transfers.

      2. Inadequate Segmentation and Vendor Management

      While M&S likely had robust cybersecurity protocols in place for its internal systems, the lack of segmentation between internal and vendor systems may have enabled lateral movement of data. Additionally, vendor due diligence and continuous monitoring appear to have been insufficient — a common shortfall even among large organisations.

      3. Delayed Patch Implementation

      Despite alerts being issued about the vulnerability, many organisations — including M&S’s third-party supplier — failed to apply security patches promptly. In high-risk environments, time-to-patch is often the difference between containment and compromise.


      Impacts of the Breach

      1. Customer and Employee Trust

      Perhaps the most intangible yet damaging outcome is the erosion of trust. Customers and employees entrust organisations like M&S with their personal data, and breaches — even when caused by third parties — reflect poorly on data stewardship practices.

      2. Financial and Legal Repercussions

      While M&S has not disclosed the exact cost, historical data suggests large-scale breaches can cost millions in legal fees, compensation, fines (especially under UK GDPR), and increased insurance premiums. The ICO could issue a significant penalty if M&S is found to have failed in its data protection obligations.

      3. Operational Disruption

      Though retail operations continued, IT and legal teams were forced into crisis mode. These disruptions pull resources away from strategic initiatives and can harm internal morale.

      4. Reputational Damage

      The press coverage of the breach was widespread. In a time when ESG and digital trust matter to investors and consumers alike, reputational damage can have long-term commercial effects.


      Lessons Learned and Resolutions

      1. Zero Trust Architecture (ZTA)

      Organisations must adopt a Zero Trust approach — assuming that every device, user, or system could be compromised. This philosophy promotes the idea of least privilege, continuous validation, and strict access controls.

      2. Third-Party Risk Management

      Vendor relationships must go beyond contractual SLAs. This includes:

      • Continuous security assessments
      • Penetration testing
      • Real-time monitoring of vendor risk profiles
      • Contractual obligations for prompt patching and breach reporting

      At DSM, we vet every supplier and partner using a rigorous compliance and risk methodology, including ISO27001-certified processes.

      3. Proactive Threat Detection

      Implementing real-time threat intelligence, SIEM tools, and behaviour-based monitoring is essential. M&S and its vendors might have benefited from anomaly detection systems that flag unusual file transfers or system activity.

      4. Segmentation and Data Minimisation

      Limiting how much data vendors can access, and segregating networks, could have reduced the breach scope. The principle of data minimisation — collecting and retaining only what’s strictly necessary — would have also limited exposure.

      5. Regular Patch Management Protocols

      Having a formalised, time-bound patch management policy — with escalation procedures — is vital. DSM supports customers with automated patching solutions, compliance audits, and vulnerability scanning as part of our managed services offering.


      Looking Ahead

      This breach serves as a stark reminder: cybersecurity is only as strong as the weakest link. Whether you’re a large retailer, a public sector body, or an SME, third-party risk must now be considered a top-tier cyber threat.

      At DSM, our commitment to secure, resilient infrastructure means going beyond traditional boundaries of IT support. We design environments that assume breach, isolate risk, and ensure business continuity through our workplace recovery, DRaaS, and colocation services.


      Final Thoughts

      Cyber resilience isn’t about preventing all breaches — that’s virtually impossible. It’s about detection, response, and minimising the blast radius. If the M&S breach teaches us anything, it’s that resilience is a shared responsibility — between businesses, suppliers, and IT partners.

      If you’re concerned about your own third-party risk exposure or would like a free cybersecurity readiness assessment, contact DSM today. Let’s build a safer, smarter, and more resilient future — together.

      1 2 3 9