Business Continuity

Business Continuity news, information, and how-to advice

lighthouse beam beckons to a businessman in a boat on a sea of red tape

2 problems panic running evacuation

Lessons from Hawaii – how prepared should we be?

If something happens you’ve never seen before, how do you know what to do next?

las vegas nighttime

Board cybersecurity field trips

Maybe this time, what happens in Vegas won't stay in Vegas!

Airport departure sign with airplane flying over

Why we continue to fail: lessons learned from the Atlanta Airport fiasco

Five basic failures happened that make the Atlanta airport a softer target for future attack.

fire chino hills california

Why staging a fake attack is only real thing to keep you secure

How the Napa County fires opened my eyes to the readiness - or lack thereof - most of us are to a real disaster, physical or digital.

human weak link cybersecurity primary

Why incident response is the best cybersecurity ROI

Former White House CIO says unexpected breaches can wreak havoc on a company's bottom line. Proper incident response planning can mitigate damage costs.

7 response

5 trends from 2017 that will still matter in 2018

There were too many lessons to count, so here are 5 things that aren’t going away any time soon.

rescue recovery data binary sea ocean lifesaver

Reliability vs. redundancy: aren’t they the same thing?

Business continuity planning assumptions are changing the way companies recover from impact scenarios and minimize the disruption to daily business activities.

padlock with circuitry lock in secure

The best kept secret in cybersecurity is protecting U.S. banks against catastrophic attacks

The Sheltered Harbor cybersecurity initiative for U.S. banks and financial services firms protects against hacker attacks.

data breach primary

Rethinking response: the benefits of seeking external support

Why your organization should look to external support following any event, incident or breach.

shadow it keyboard

The risk of shadow IT to business continuity

We hear about IT systems going down but how much do we think about whether incidents could have been prevented by taking adequate risk mitigation measures?

digital marketing

5 rules for smarter cyber communications

The way you communicate before, during and after a data breach determines its ultimate impact on your organization. It’s time to get smarter about this lesser known aspect of your cybersecurity program.

lock circuit board bullet hole computer security breach

Equifax: A teaching opportunity

Equifax did just about everything wrong. Here's what's going to happen because of it.

computer programmer or hacker

How cyber threats are changing the makeup of IT departments

Since cybersecurity and DR both have a hand in meeting availability demands, many companies are incorporating their DR into their wider cybersecurity strategies, weaving them into a single response plan for effectiveness. This means...

human weak link cybersecurity primary

Software supply chain puts businesses at risk

The new reality in 2017: High-profile breaches, including Equifax, SEC, Deloitte... In this article, former research director at Gartner and current VP at DFLabs, Oliver Rochford uses the CCleaner Breach to explain the unique...

hand holding paper cloud for Microsoft Azure logo

Why you should — and shouldn't — harness Azure for disaster recovery

The cost and flexibility benefits of Azure's public cloud make it an obvious choice for a disaster recovery platform. But how well do you know Azure and what challenges could you face in harnessing its power?

executive chairs boardroom

Improving cybersecurity governance in the boardroom

To tackle increasing data threats, companies need to put cybersecurity at the very heart of the business.

Locky Ransomware infects a Windows 10 computer

Surviving ransomware by keeping things simple

Ransomware is a topic everyone knows about, but unless you've experienced a ransomware attack, it's hard to really describe and understand the stress associated with these events.

Equifax logo on binary background

A cyber manifesto: cut the dilly-dallying...and let’s get after it!

Congress is dithering on dynamic cyber policy...and so private sector company to company digital security threat information sharing is virtually at a standstill. And 143 million Equifax customers woke up this morning to learn they're...

Load More