{"id":16086,"date":"2026-03-15T12:18:04","date_gmt":"2026-03-14T23:18:04","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=16086"},"modified":"2026-03-15T12:18:04","modified_gmt":"2026-03-14T23:18:04","slug":"when-geopolitical-conflict-becomes-your-it-problem","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=16086","title":{"rendered":"When Geopolitical Conflict Becomes Your IT Problem"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Lessons from the Stryker Cyberattack<\/strong><\/h2>\n<h3 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>A global medical technology company. 56,000 employees. Operations in 60 countries. And in March 2026, systems wiped across every one of them \u2014 not because of a data breach or ransomware, but because of a school bombing in Iran.<\/strong><\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Employees of Stryker Corporation arriving at work found an unfamiliar black-and-white cartoon figure staring back at them from their login screens.\u00a0 They were welcomed with the logo of a pro-Iranian <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2026-03-12\/stryker-shipping-still-down-in-attack-claimed-by-pro-iran-group\">hacktivist group called Handala.<\/a> <span class=\"inline-flex\" data-state=\"closed\"><\/span>The attack took down ordering and shipping systems, with no timeline given for full restoration. <span class=\"inline-flex\" data-state=\"closed\"><\/span>The <a href=\"https:\/\/www.siliconrepublic.com\/enterprise\/strykers-cork-site-struck-in-cyberattack-handala-iran\">group claimed<\/a> to have wiped more than 200,000 systems, servers, and mobile devices, and extracted 50 terabytes of critical data.<span class=\"inline-flex\" data-state=\"closed\"><\/span><\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Stryker had no obvious connection to the conflict. One expert noted the company may have been targeted because of its 2019 acquisition of an Israeli medical technology company, or perhaps simply because attackers were scanning for vulnerable targets and <a href=\"https:\/\/www.newsnationnow.com\/world\/iran-hackers-cyberattack-stryker\/\">Stryker presented<\/a> an opening. <span class=\"inline-flex\" data-state=\"closed\"><\/span><\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">That second possibility is the one New Zealand businesses need to sit with.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h3 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>You Don&#8217;t Have to Be the Target to Be Hit<\/strong><\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The Stryker attack illustrates something uncomfortable about the modern threat landscape: your business doesn&#8217;t need to be politically relevant to become a casualty. According to <a href=\"https:\/\/techcrunch.com\/2026\/03\/11\/stryker-hack-pro-iran-hacktivist-group-handala-says-it-is-behind-attack\/\">IBM X-Force,<\/a> Handala&#8217;s toolkit includes phishing, custom wiper malware, ransomware-style extortion, and hack-and-leak activity.\u00a0 Its focus is on generating disruptive and psychological impact.<span class=\"inline-flex\" data-state=\"closed\"><\/span><\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">One\u00a0<a href=\"https:\/\/www.cnn.com\/2026\/03\/11\/politics\/pro-iran-hackers-cyberattack-medical-device-maker\">cybersecurity expert put it plainly<\/a>: &#8220;Too much of cybersecurity is focused on lower consequence breaches from financially motivated enemies, while we&#8217;re increasing our exposures to nation states and other enemies who seek to disrupt and destroy.&#8221;\u00a0<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">This is a wake-up call for local businesses,\u00a0 many of which operate as part of international supply chains, use US-based cloud platforms, or partner with companies that do.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;2px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>The Attack Vector: Email First, Everything Else Second<\/strong><\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Security experts confirm that phishing remains Handala&#8217;s primary attack method. That means that one of the most sophisticated geopolitical cyberattack of 2026, one that crippled a $25 billion global company, almost certainly began with someone clicking a link in an email.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Stryker&#8217;s own statement confirmed a severe, global disruption across its Windows environment impacting both client devices and servers. <span class=\"inline-flex\" data-state=\"closed\"><\/span>\u00a0The attack targeted the Microsoft environment.\u00a0 That&#8217;s the same platform most New Zealand businesses run their operations on every day.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>What This Means for Your Business<\/strong><\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The Stryker incident reinforces three disciplines that Kinetics has long advocated for local businesses:<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Assume you are a target.<\/strong> Threat actors scan broadly. Being a smaller business in New Zealand is not a shield.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Your people are your perimeter.<\/strong> Security awareness training isn&#8217;t a box-ticking exercise. It is the difference between a suspicious email being deleted and an organisation being taken offline.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Business continuity must be tested, not just documented.<\/strong> Stryker had continuity plans in place. The question is whether yours would hold up under a real-world disruption at scale.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Building Resilience Before You Need It<\/strong><\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Kinetics&#8217; KARE Foundation service is designed precisely for this environment.\u00a0 It&#8217;s layered, proactive cybersecurity that addresses not just technical vulnerabilities but the human and operational factors that sophisticated attackers exploit. From managed endpoint detection and response to security awareness training and backup integrity, it&#8217;s the foundation that gives businesses confidence when the threat landscape shifts, as it has this week.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The lesson from Stryker isn&#8217;t that every Kiwi business should be afraid. It&#8217;s that being prepared is a business decision, not just an IT one.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(61,61,61,0.1)&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;1px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">4 methods to test your BCP<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>1. Tabletop exercise<\/strong>\u00a0Gather your leadership team and IT around a table. A facilitator presents a scenario: <em>&#8220;It&#8217;s 8am Monday. Half your staff can&#8217;t log in. Your IT team finds the Handala logo on login screens. What do you do?&#8221;<\/em> Walk through every decision. Who do you call? What&#8217;s the chain of authority? Where are the phone numbers stored? Are they in a system that&#8217;s now offline?\u00a0 \u00a0This costs almost nothing and reveals gaps immediately.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>2. Component testing<\/strong> Test individual pieces in isolation. Can you actually restore from your backups? How long does it take? Is the restored data complete? Many businesses discover at this point that their backup regime looked good on paper but the restores are partial or weeks out of date. (KARE Backups are regularly tested)<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>3. Parallel recovery simulation<\/strong> Run a simulated recovery <em>alongside<\/em> normal operations.\u00a0 Don&#8217;t take production systems offline, but work through the recovery process as if you had to, measuring time and identifying blockers. This gives you realistic recovery time estimates without the risk of a full cutover.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>4. Full simulation (red team\/live fire)<\/strong> The most rigorous test: an external party attempts to simulate an attack while your team responds in real time. Expensive and disruptive, but for businesses with genuine high-stakes dependencies (finance, healthcare, critical infrastructure supply), it&#8217;s the only way to know for certain.<\/p>\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">The questions your test must answer<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Regardless of method, a cyberattack-specific BCP test should stress-test these specifically:<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Communications<\/strong>: If email and Teams are down, how do you coordinate? Do staff know to go to a pre-agreed out-of-band channel (a personal group chat, a phone tree)? Is the phone tree stored somewhere other than the systems that are offline?<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Authority and decisions<\/strong>: Who is authorised to shut down systems? To communicate externally with customers? To engage a cyber incident response firm? Decision paralysis in the first hour of an attack causes enormous additional damage.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Data recovery hierarchy<\/strong>: Not everything can be restored at once. What comes back first?\u00a0 Is that priority list documented and agreed <em>before<\/em> an incident?<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Vendor and partner notification<\/strong>: Which of your suppliers or customers need to be told, and how quickly?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lessons from the Stryker Cyberattack A global medical technology company. 56,000 employees. Operations in 60 countries. And in March 2026, systems wiped across every one of them \u2014 not because of a data breach or ransomware, but because of a school bombing in Iran. Employees of Stryker Corporation arriving at work found an unfamiliar black-and-white [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":11716,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-16086","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/16086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16086"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/16086\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}