Business Continuity

Business Continuity news, information, and how-to advice

computer network cables internet switch ethernet
phantom 4 still 3

fave raves

Time is money when disaster strikes

Enterprise storage, backup and disaster recovery products win over IT pros.

00 disaster title

This list will help you painlessly recover from disaster

Just like an evacuation plan at your home when a fire strikes, you need a disaster recovery blueprint set aside so that everyone in the company knows what to do and where to go when disaster strikes the network. Here’s a list of 10...

disaster recovery knob

In the event of an emergency, you will be prepared

Preparedness drills for physical safety are commonplace. Why not begin doing the same for digital safety? And what would such a thing entail?

audit

How to audit external service providers

Failure to audit your providers is like neglecting to audit your internal enterprise, culminating in similar ramifications. In both cases, you can’t close holes you don’t know exist. But knowing what to audit can be the lion’s share...

01 dbaas title

Top 10 DBaaS security concerns

Survey shows the worries users have of their databases in the cloud.

server cables network switches
live

How to review and test backup procedures to ensure data restoration

If you want to test backup and restore procedures with your eyes wide open, consider these factors and tips.

storm businessman clouds rain rough seas

For IT, climate change means preparing for disaster

Disaster recovery as a service is a fast-growing segment of the industry, analysts say.

brussels explosion

Facebook engages Safety Check after Brussels attacks

Facebook activated its Safety Check service Tuesday for users living near Brussels after a series of terrorist attacks killed at least 34 people and wounded 200.

fbi director james comey hearing

Why every leader needs to understand Apple vs. FBI

We must avoid any solution that provides a master key to any encryption technology. Violating the privacy of our citizens must remain the exception and not the rule.

architecture

Defense in depth: Stop spending, start consolidating

When it comes to layered defense and security tools, less is often more just as more can sometimes be less. The average enterprise uses 75 security products to secure their network. That's a lot of noise and a lot of monitoring and...

ljubljana

Hackers, hackers everywhere in Ljubljana

So, that’s a wrap. What a great couple days it has been here in Ljubljana, Slovenia. Not sure where that is? Well, Google Maps can sort that our for you. I remember a few months back that it was announced that a friend of mine...

reviewing plans

Reviewing incident response plans for data risk preparedness

Don’t let holes in your incident response plan review open gaping vulnerabilities in how you act on security events.

high voltage power lines

Protecting vital electricity infrastructure

Attacks on critical infrastructure, specifically electric generation and transmission facilities, could be used to cause widespread panic and create economic distress.There is increased awareness of potential risks to the electric...

data breach lessons

Lessons learned in the aftermath of a breach

Jim Jaeger, chief cyber services strategist with Fidelis Cybersecurity, talks about lessons learned from some big name breaches in this two-part blog series.

cyber insurance

RSA 2016: Cyber-Insurance

When I was a kid growing up on Montreal, every now and again a door to door salesman would knock on the door. My parents would roll their eyes and chase the interlopers away. Sometimes they would be selling encyclopaedias...

auditor

How an audit can shore up your security strategy

The high-profile data breaches of recent years have forced many organizations to take a closer look at their security technologies and policies, experts say.

ransom note

Are you prepared to respond to ransomware the right way?

Rob Gresham explains the evolution of ransomware and shares insights into smarter ways to prepare and respond

tripbox malvertising 2

Malvertising, weaponized documents continue to threaten networks

Even the most trained cybersecurity professionals can fall victim to these types of undercover attacks, putting not only an employee at risk but also the company whose network the employee is using.

Load More