Skip to main content

There's a particular kind of chaos that sets in when the tool you're using to manage an incident turns out to be part of it.

It happens more than most organisations would like to admit. A threat actor gains a foothold. They sit quietly, watching. And what they're watching - often - is your internal communications. Your Slack channels. Your Teams threads. The email chain where your security team is debating whether the anomaly in the logs is worth escalating.

By the time the incident is declared, the attacker already knows your response plan.


The platform you trust most is the one you verify least

There's an uncomfortable irony at the centre of modern incident response. Organisations spend significant time and money hardening their infrastructure, securing endpoints, monitoring networks. And then, when something goes wrong, they coordinate their response over the same platforms they use for everything else - platforms that are frequently cloud-hosted, connected to the compromised environment, and trusted implicitly precisely because everyone uses them every day.

That trust is the vulnerability.

Slack, Teams, Google Workspace - these are collaboration tools built for productivity, not for crisis. They're not designed with the assumption that the person reading your messages might be an attacker. They don't isolate your incident response communications from the rest of your environment. And when your environment is compromised, they aren't either.


It's not a theoretical risk

In several high-profile breaches, attackers have maintained persistent access to internal communication platforms for weeks or months. They've watched response efforts unfold in real time. In some cases they've used that visibility to stay one step ahead - deleting evidence before investigators looked, pivoting to new footholds as old ones were discovered, or simply waiting until the team declared the incident resolved before resuming activity.

The communication channel designed to coordinate your defence became the attacker's best source of intelligence.


The fix isn't complicated - but it requires deliberate planning

Out-of-band communication isn't a new concept. The principle is simple: when your primary environment is compromised or suspect, you need a communication channel that exists entirely outside it. One that isn't connected to your corporate identity provider. One that doesn't share infrastructure with the systems under attack. One that was set up, tested, and understood before anyone needed it.

The problem is that most organisations treat out-of-band communication as an afterthought. It gets a line in the incident response plan - "in the event of a major incident, use [alternative channel]" - without any serious thought given to whether that channel is genuinely independent, whether people know how to access it, or whether it would actually function under the conditions it's meant for.

A communication platform you've never tested under pressure, accessed from personal devices, by people who aren't sure of the URL, is not a backup. It's an aspiration.


The question worth asking now

If your primary communication infrastructure went down - or was confirmed compromised - in the next hour, what would you do?

Not in theory. Practically. Who would you call? On what device? Through what platform? Does everyone in your incident response team know the answer to that question without having to look it up?

If the honest answer is "we'd probably figure it out," that's the gap. Because figuring it out in the middle of a live incident, using the same compromised tools you're trying to move away from, is precisely how a bad situation becomes significantly worse.

The communication platform should never be the incident. Making sure it isn't is a decision that has to be made well before one starts.


YUDU Sentinel provides independent, out-of-band communication infrastructure designed to remain operational when your primary systems can't be trusted.

Edward Jones
Written byEdward Jones
29 Apr 2026
A digital marketing expert with 10+ years experience across the full range of disciplines. Edward has an extensive history as a writer, with more than 300+ published articles across the technology and digital publishing sectors.