Even if a company has fully realized, useful backups and remote provisioning in place, it still takes time to carry out a full investigation of the security failure, make sure the backup data are clean of compromise based on the preliminary investigation findings, reprovision, and then make sure the holes are closed before allowing outside network contact. It can take weeks just to reprovision if you have a device fleet in the 10s of thousands of devices, let alone figure out what happened and form a strategy to prevent it from immediately happening again soon as the outside connection is reopened. No one recovers over night, and if they do, then that in itself is suspicious.