Business Continuity

Business Continuity news, information, and how-to advice

1 communications
electrical grid

ted koppel lights out video

Ted Koppel: Apocalypse likely

Retired “Nightline” anchor Ted Koppel, in his new book “Lights Out,” says he is simply documenting the veracity of warnings from top U.S. intelligence officials that the nation’s energy grid is vulnerable to a cyberattack that could...

01 title life preserver

14 DRaaS vendors that will rescue you in a pinch

Gartner assesses products ability to help networks recover quickly.

Digital Key

All CoinVault and Bitcryptor ransomware victims can now recover their files for free

Researchers from Kaspersky Lab and the Dutch Public Prosecution Service have obtained the last set of encryption keys from command-and-control servers that were used by CoinVault and Bitcryptor, two related ransomware threats.

fbi seal

The FBI isn't wrong; sometimes you will have to pay the ransom

Last week, during the 2015 Cyber Security Summit in Boston, Special Agent Joseph Bonavolonta said that the FBI's advice for some Ransomware attacks is to pay the ransom. Unfortunately, that might be the best option in some cases.

security threat ninja hacker hacked

Spending millions on APT defense? Don’t forget about Third Party Risk Management

Being a large company, you have a risk when hiring a third-party consultant - you condemn them to be hacked instead of you.

01 hurricane joaquin

9 ways to be tech-ready for the next hurricane

With Hurricane Joaquin stirring up high winds and rain off the East Coast, FEMA has released a set of guidelines that might help you stay connected and keep your systems operational once the storm hits.

Chess 122400472

How to create effective cyber strategy

In 60% of reported cases attackers compromise an organization within minutes. Only 25% of those organizations discover the compromise within days or less. 70% of attacks use the initial victim to target a secondary victim. No one is...


Inherited risk: The downside of mergers and acquisitions

Enterprises going through mergers and acquisitions reap the benefits of new products and other assets, but they also acquire all of the threat vectors that have been targeting the other organization.  

internet of things smart house

How to secure the Internet of Things and who should be liable for it?

How to secure connected devices before it will be too late?

chip and pin credit card

How to detect credit card theft in the early moments

A single email helped prevent thousands in fraudulent credit card transactions. This isn't a special trick, it's a service most financial institutions offer, but it's only useful if you enable it.

golf sand trap

Think your security strategy is up to par? Think again!

The strategies that protected our organizations in the past are no longer relevant today. Attackers will leverage trust relationships, human weakness, and technology to subvert our defenses. Our security strategies must reflect the...

fbi seal

FBI issues supplier scam warning to businesses

The FBI's Internet Complaint Center (IC3) issued a warning last week about a type of scam that has exposed businesses to a total of $1.2 billion in losses, once the numbers from October 2013 until August 2015 are added up.

img 0392

The disaster-recovery lessons we learned after Katrina

The destruction of the hurricane itself, and the subsequent flooding that put most of New Orleans underwater knocked many businesses out of commission—and more than a few completely out of existence. Thankfully, we have learned a lot...

noel biderman

Ashley Madison CEO quits, company says they're adjusting to breach

Noel Biderman, the CEO of Avid Life Media, resigned on Friday, weeks after a group calling itself Impact Team published compromised data, including details on more than 30 million Ashley Madison account holders.

business video ts

The incident response plan you never knew you had

By leveraging important elements of the existing business continuity plan (BCP) and resources, the security team can jump start the computer incident response plan (CIRP) and obtain a faster and more responsive organization.

ashley madison

Project Unicorn offers $500,000 reward for Ashley Madison hackers

On Monday, Avid Life Media (ALM) announced a $500,000 CDN reward for information leading to the identification, arrest, and conviction of the person or persons responsible for the hack on Ashley Madison.

servers with view

Virtualization doubles the cost of security breach

When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional environment, according to a new report from Kaspersky Lab.

ashley madison

Ashley Madison hack linked to suicide, spam, and public outrage

It's been a week since the hackers behind the Ashley Madison hack, a group known only as Impact Team, leaked nearly 30GBs worth of files, followed quickly by another 40GBs in two separate releases, containing application source code...

Load More