Business Continuity

Business Continuity news, information, and how-to advice

risk complexity tightrope
amazon prime box

final prep for airborne lte operations flight

Drones could help with disasters like Hurricane Matthew

Emergency personnel could use 'flying hot spots' to communicate in remote places where wireless antennas were lost or unavailable.

earth explosion

Taking down the internet: possible but how probable?

Security guru Bruce Schneier reported recently that the companies that maintain the “backbone” of the internet have been under increasing attacks designed to test their defenses. It’s the kind of thing, he said, that could mean an...

Hurricane Matthew

Crisis planning: 6 ways to put people first

"Planning for the 'what ifs' is not just about imagining events that are hard to imagine. It is about knowing which of your business functions will determine your ability to weather a crisis," says Bill Tibbo.

Cyber security breach attack on monitor with binary code

IT audits must consider the cyber kill chain and much more!

Its not enough to perform an IT audit to achieve compliance alone, Today's threat landscape includes sophisticated APT's, Advanced Persistent Threats, Remote access Trojans and Ransomeware to name a few, In order for an IT audit to...

07 insider

Anatomy of an insider attack

Planning for insider attacks requires attack path analysis. Using scenarios, like the one in this post, help identify weaknesses.

truck 147912696

Meteors, disasters and the diesel generators

In August of 2003 it was just after 4 pm and I was leaving a vendor event where I was watching a professional tennis match. I was looking forward to the weekend ahead with a light Friday on the schedule. I could not have known how...


Some thoughts on the Krebs situation: Akamai made a painful business call

This weekend Salted Hash is at DerbyCon, and we’ll be posting a few updates from the show, but some recent events have generated buzz, and they’re worth discussing. Namely, Brian Krebs is being censored, and that sets a bad precedent...

cassette tape

Backups aren't just for smoking crater scenarios

Every company I had worked for in the past was another piece in my continuing education. Along the way there have been some lessons that were recurring. One of the main ones was around backups. Time and again I would encounter the...

1 safe

The only three passwords your survivors will ever need

If you die or become incapacitated how would your spouse or friends deal with the digital waterfall of information that was inaccessible to them? How would they know all of your accounts and passwords? Would they be able to able to...

The Gold Rush

IoT and your digital supply chain

“Money, it's a gas. Grab that cash with both hands and make a stash”, Pink Floyd is always near and dear to my heart. No doubt the theme song to a lot of producers of devices that fall into the category of Internet of Things or...

candle laptop

Gmail outage for business users lasted over 12 hours

Gmail service for users of the Google for Work cloud-based productivity suite was down for over 12 hours on Wednesday, apparently affecting users in a number of countries including the U.S.

1 noise

7 ways to avoid alert fatigue

Just like when your car alarm goes off incessantly, you don’t always run for the door thinking your car was stolen. If only there was a way to hear for when actual robbers are near your car or in this case network.

deals of the week

Best Deals of the Week, September 5th - September 9th - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of September 5th. All items are highly rated, and dramatically discounted!

hillary clinton election debate

Clinton email highlights frustrating reality of bypassed IT policies

An email recently released by House Democrats isn't just a political response to Hillary Clinton's usage of personal technology while Secretary of State. The email between Clinton and General Colin Powell is a perfect example of what...

dhs security

Cyber incident response: Who does what?

“Who in the government will help me if we face a significant cyber incident?”


Case study: Using VCloud to replicate data offsite

At VMworld, Network World chatted with Tom White, IT Director at Environmental Science Corp., about how he virtualized disaster recovery using cloud technologies.

Delta airlines delay

Lessons from high-profile IT failures

What we can learn about disaster recovery and high availability from recent airline outages.

81p5l6fqewl. sl1500

25% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive - Deal Post

The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives

Load More