Business Continuity

Business Continuity | News, how-tos, features, reviews, and videos

security threats and vulnerabilities

Incident management for SMBs

In today's dynamic threat environment, developing a risk management methodology is a strategic imperative for all companies.

computer keyboard delete trash

SamSam group deletes Atlanta's contact portal after the address goes public

An image shared with local media during the early stages of a SamSam ransomware infection in Atlanta exposed the contact portal assigned to the city by the group responsible for the attack. When questioned about their actions via the...

ransomware at your service 4

SamSam ransomware attacks have earned nearly $850,000

First emerging in late 2015, the group believed to be responsible for the SamSam ransomware family has targeted small and large businesses, healthcare, governments, and education. To date, the group has made nearly $850,000 USD

blue padlock in circle pixels digital security padlock

9 policies and procedures you need to know about if you’re starting a new security program

Any mature security program requires each of these infosec policies, documents and procedures.

hacker hack attacke cyber malware keyboard

Maslow’s hierarchy of needs for incident response

The advent of laterally spreading malware requires the security community to progressively build out incident response to include more thorough scoping to determine the true extent of an event and threat hunting to find those threats...

lighthouse beam beckons to a businessman in a boat on a sea of red tape

What happens if... disaster recovery for the smart city and beyond

Using disaster-recovery-as-a-service (DRaaS) for smart distributed data.

2 problems panic running evacuation

Lessons from Hawaii – how prepared should we be?

If something happens you’ve never seen before, how do you know what to do next?

las vegas nighttime

Board cybersecurity field trips

Maybe this time, what happens in Vegas won't stay in Vegas!

Airport departure sign with airplane flying over

Why we continue to fail: lessons learned from the Atlanta Airport fiasco

Five basic failures happened that make the Atlanta airport a softer target for future attack.

fire chino hills california

Why staging a fake attack is only real thing to keep you secure

How the Napa County fires opened my eyes to the readiness - or lack thereof - most of us are to a real disaster, physical or digital.

human weak link cybersecurity primary

Why incident response is the best cybersecurity ROI

Former White House CIO says unexpected breaches can wreak havoc on a company's bottom line. Proper incident response planning can mitigate damage costs.

7 response

5 trends from 2017 that will still matter in 2018

There were too many lessons to count, so here are 5 things that aren’t going away any time soon.

rescue recovery data binary sea ocean lifesaver

Reliability vs. redundancy: aren’t they the same thing?

Business continuity planning assumptions are changing the way companies recover from impact scenarios and minimize the disruption to daily business activities.

padlock with circuitry lock in secure

The best kept secret in cybersecurity is protecting U.S. banks against catastrophic attacks

The Sheltered Harbor cybersecurity initiative for U.S. banks and financial services firms protects against hacker attacks.

data breach primary

Rethinking response: the benefits of seeking external support

Why your organization should look to external support following any event, incident or breach.

shadow it keyboard

The risk of shadow IT to business continuity

We hear about IT systems going down but how much do we think about whether incidents could have been prevented by taking adequate risk mitigation measures?

digital marketing

5 rules for smarter cyber communications

The way you communicate before, during and after a data breach determines its ultimate impact on your organization. It’s time to get smarter about this lesser known aspect of your cybersecurity program.

lock circuit board bullet hole computer security breach

Equifax: A teaching opportunity

Equifax did just about everything wrong. Here's what's going to happen because of it.

computer programmer or hacker

How cyber threats are changing the makeup of IT departments

Since cybersecurity and DR both have a hand in meeting availability demands, many companies are incorporating their DR into their wider cybersecurity strategies, weaving them into a single response plan for effectiveness. This means...

hand holding paper cloud for Microsoft Azure logo

Why you should — and shouldn't — harness Azure for disaster recovery

The cost and flexibility benefits of Azure's public cloud make it an obvious choice for a disaster recovery platform. But how well do you know Azure and what challenges could you face in harnessing its power?

Load More