By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: when internal communication also collapses
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > when internal communication also collapses
Mobile

when internal communication also collapses

News Room
Last updated: 2026/01/29 at 12:32 AM
News Room Published 29 January 2026
Share
when internal communication also collapses
SHARE

Every time an organization suffers a serious cyberattack, the same pattern repeats itself with disturbing precision. Systems go down, access is blocked, technical teams are locked in crisis rooms… and, suddenly, the company discovers a vulnerability that rarely appears in risk reports: it cannot communicate internally.

It’s not just a minor technological problem. It is a governance failure in many companies where internal communication depends entirely on the same systems that a potential attacker will seek to disable first: corporate email, messaging integrated into office suites, intranets, centralized directories. When those systems are compromised (or simply shut down as a precaution), the organization loses something essential: the ability to coordinate, decide, and execute under pressure.

It’s not a question of “if,” but of “when.”

Many boards of directors continue to approach cybersecurity from a probabilistic logic (is it likely to happen to us?) and have implemented a proactive prevention policy with protocols that cover all their digital sides to prevent possible incidents. Although these measures are necessary, cybercrime is still on the rise and companies cannot ignore the real possibility of a successful attack.

The statistics speak very clear language: during the month of October 2025, organizations in Spain suffered an average of 1,932 cyber attacks per week, that is, about 11.5 attacks per hour, nights and weekends included.. It is 6% more than in 2024. Given this scenario, the question to be asked would be: what will happen if – despite all the measures implemented – a cyber attack paralyzes computer systems?

During a cyberattack, the crisis committee, the IT team, the legal department, corporate communications, senior management and key suppliers must be coordinated. The situation requires a communication tool that meets three basic conditions: independence, security and immediate availability.

Otherwise, critical decisions are delayed, fragmented, or made blindly. The teams improvise with unauthorized tools, personal phones or applications designed for private use and without security guarantees. The result is a paradox with a dangerous slope: in the name of urgency, the risk surface expands. From the perspective of a CEO or CIO, it is vital to understand that, during a cyberattack, communication is not simply a support for the business: It is the business.

Requirements to maintain operation

During a cyberattack, IT systems and usual communication channels (email, collaborative tools, etc.) will likely be unavailable. Although not all companies that are victims of a cyberattack will suffer devastating consequences, all will experience incidents that will test their operational resilience.

The difference between a controlled crisis and a reputational collapse will not only be in the robustness of firewalls or backups, but also in the ability of leadership to communicate quickly and securely. European legislation goes in that direction. The NIS2 framework requires critical sectors (such as healthcare or public administration) to have an independent communication channel to maintain operation outside of compromised IT infrastructures.

Cyber ​​resilience means being able to defend yourself in degraded digital environments and continue operating without having to paralyze entire areas of the business. In turn, it implies being able to convene and keep a crisis committee operational, share verified instructions without risk, avoid accidental leaks and maintain the traceability of the decisions made. In this context, it would be a mistake to trust collaborative platforms that depend on centralized corporate identities. The recent past has shown that attackers not only access data, but also intercept conversations, strategies, and even the internal narrative of the incident.

Secure communication as an element of governance

With attacks becoming more frequent and sophisticated, complying with the legislative framework means doing everything possible to avoid a crisis, but also being prepared to face it. Cybersecurity is no longer just a technical issue: it is a governance issue. Involves senior management and the board of directors. And it requires ensuring that the organization has the right tools to stay afloat when all else fails.

Some organizations resort to physical emergency systems; others opt for certified tools for critical sectors. The key is that the channel does not depend on compromised infrastructure. Establishing it ahead of time is an invaluable lifesaver when the storm hits.

By Miguel Rodríguez, CRO and board member of Threema

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Refurbished Nintendo Switches are on sale for up to  off Refurbished Nintendo Switches are on sale for up to $60 off
Next Article UK government to develop AI tutoring tools | Computer Weekly UK government to develop AI tutoring tools | Computer Weekly
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

ServiceNow’s stock slides on iffy subscription revenue forecast –  News
ServiceNow’s stock slides on iffy subscription revenue forecast – News
News
Google DeepMind Introduces ATLAS Scaling Laws for Multilingual Language Models
Google DeepMind Introduces ATLAS Scaling Laws for Multilingual Language Models
News
8 Best Sleep Headphones of 2026
8 Best Sleep Headphones of 2026
News
Kuda MFB gets national licence, plans physical expansion
Kuda MFB gets national licence, plans physical expansion
Computing

You Might also Like

The EU and India finally seal their great trade agreement. Trump has accelerated what had been stuck for two decades
Mobile

The EU and India finally seal their great trade agreement. Trump has accelerated what had been stuck for two decades

5 Min Read
Minecraft 26.1 Snapshot 5 makes baby mobs look different, adds a new item
Mobile

Minecraft 26.1 Snapshot 5 makes baby mobs look different, adds a new item

3 Min Read
“AI does not replace the lawyer’s judgment, it requires more judgment”
Mobile

“AI does not replace the lawyer’s judgment, it requires more judgment”

11 Min Read
“The actions of the AEAT will not rest exclusively on the result of an AI”
Mobile

“The actions of the AEAT will not rest exclusively on the result of an AI”

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?