Business Continuity

Business Continuity news, information, and how-to advice

Cyber security breach attack on monitor with binary code
07 insider

truck 147912696

Meteors, disasters and the diesel generators

In August of 2003 it was just after 4 pm and I was leaving a vendor event where I was watching a professional tennis match. I was looking forward to the weekend ahead with a light Friday on the schedule. I could not have known how...

servers

Some thoughts on the Krebs situation: Akamai made a painful business call

This weekend Salted Hash is at DerbyCon, and we’ll be posting a few updates from the show, but some recent events have generated buzz, and they’re worth discussing. Namely, Brian Krebs is being censored, and that sets a bad precedent...

cassette tape

Backups aren't just for smoking crater scenarios

Every company I had worked for in the past was another piece in my continuing education. Along the way there have been some lessons that were recurring. One of the main ones was around backups. Time and again I would encounter the...

1 safe

The only three passwords your survivors will ever need

If you die or become incapacitated how would your spouse or friends deal with the digital waterfall of information that was inaccessible to them? How would they know all of your accounts and passwords? Would they be able to able to...

The Gold Rush

IoT and your digital supply chain

“Money, it's a gas. Grab that cash with both hands and make a stash”, Pink Floyd is always near and dear to my heart. No doubt the theme song to a lot of producers of devices that fall into the category of Internet of Things or...

candle laptop

Gmail outage for business users lasted over 12 hours

Gmail service for users of the Google for Work cloud-based productivity suite was down for over 12 hours on Wednesday, apparently affecting users in a number of countries including the U.S.

1 noise

7 ways to avoid alert fatigue

Just like when your car alarm goes off incessantly, you don’t always run for the door thinking your car was stolen. If only there was a way to hear for when actual robbers are near your car or in this case network.

deals of the week

Best Deals of the Week, September 5th - September 9th - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of September 5th. All items are highly rated, and dramatically discounted!

hillary clinton election debate

Clinton email highlights frustrating reality of bypassed IT policies

An email recently released by House Democrats isn't just a political response to Hillary Clinton's usage of personal technology while Secretary of State. The email between Clinton and General Colin Powell is a perfect example of what...

dhs security

Cyber incident response: Who does what?

“Who in the government will help me if we face a significant cyber incident?”

video

Case study: Using VCloud to replicate data offsite

At VMworld, Network World chatted with Tom White, IT Director at Environmental Science Corp., about how he virtualized disaster recovery using cloud technologies.

Delta airlines delay

Lessons from high-profile IT failures

What we can learn about disaster recovery and high availability from recent airline outages.

81p5l6fqewl. sl1500

25% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive - Deal Post

The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives

space launch systems

NASA CIO allows HPE contract's authority to operate to expire

In the wake of continued security problems, NASA's CIO is sending a no-confidence signal to Hewlett Packard Enterprise, which received a $2.5 billion contract in 2011 to address problems with the agency's outdated and insecure...

zika mosquito

As Zika looms, a question arises: Who gets to telecommute?

The Zika virus outbreak in Florida -- and rising concerns it will spread north -- are worrying workers and forcing companies to adjust.

phishing

How do you measure success when it comes to stopping Phishing attacks?

What's considered a win when it comes to Phishing? This question was posed to IT workers and non-executive types earlier this month, and everyone had a different opinion on the topic. The general feeling among defenders was that a...

money meeting merger aquisition business deal

Striking a deal: will your cybersecurity issues hold up the next merger?

Cybersecurity due diligence can avoid discovering critical issues after a deal has gone through

01 plan

9 steps for a successful incident response plan

It is of vital importance to have a plan in place before an incident hits your company.

Load More