Business Continuity

Business Continuity news, information, and how-to advice

padlock with circuitry lock in secure

The best kept secret in cybersecurity is protecting U.S. banks against catastrophic attacks

The Sheltered Harbor cybersecurity initiative for U.S. banks and financial services firms protects against hacker attacks.

data breach primary

Rethinking response: the benefits of seeking external support

Why your organization should look to external support following any event, incident or breach.

shadow it keyboard

The risk of shadow IT to business continuity

We hear about IT systems going down but how much do we think about whether incidents could have been prevented by taking adequate risk mitigation measures?

digital marketing

5 rules for smarter cyber communications

The way you communicate before, during and after a data breach determines its ultimate impact on your organization. It’s time to get smarter about this lesser known aspect of your cybersecurity program.

lock circuit board bullet hole computer security breach

Equifax: A teaching opportunity

Equifax did just about everything wrong. Here's what's going to happen because of it.

computer programmer or hacker

How cyber threats are changing the makeup of IT departments

Since cybersecurity and DR both have a hand in meeting availability demands, many companies are incorporating their DR into their wider cybersecurity strategies, weaving them into a single response plan for effectiveness. This means...

human weak link cybersecurity primary

Software supply chain puts businesses at risk

The new reality in 2017: High-profile breaches, including Equifax, SEC, Deloitte... In this article, former research director at Gartner and current VP at DFLabs, Oliver Rochford uses the CCleaner Breach to explain the unique...

hand holding paper cloud for Microsoft Azure logo

Why you should — and shouldn't — harness Azure for disaster recovery

The cost and flexibility benefits of Azure's public cloud make it an obvious choice for a disaster recovery platform. But how well do you know Azure and what challenges could you face in harnessing its power?

executive chairs boardroom

Improving cybersecurity governance in the boardroom

To tackle increasing data threats, companies need to put cybersecurity at the very heart of the business.

Locky Ransomware infects a Windows 10 computer

Surviving ransomware by keeping things simple

Ransomware is a topic everyone knows about, but unless you've experienced a ransomware attack, it's hard to really describe and understand the stress associated with these events.

Equifax logo on binary background

A cyber manifesto: cut the dilly-dallying...and let’s get after it!

Congress is dithering on dynamic cyber policy...and so private sector company to company digital security threat information sharing is virtually at a standstill. And 143 million Equifax customers woke up this morning to learn they're...

Equifax logo with keyboard lock and credit cards

From Equifax to Equi-'enterprise'

By now the Equifax debacle, disaster, ineptitude...has been wildly chastised and 1 in 2 Americans impacted by this have (or should have) taken corrective action. There is a lesson to be learned here not just by you and I as consumers,...

data center datacenter private cloud

There is no such thing as a DR test failure

The key to performing disaster recovery tests for your company is that, no matter the results, your real objective is to learn from the situation and your team’s process. Often times, it’s people not technology that make or break a...

07 antivirus

The reality of ransomware

Why every CISO needs to consider a ransomware infection as a likely scenario to include in their business continuity and disaster recovery plans. There are some unique challenges when responding to a ransomware attack that could...

hurricane harvey flood

Disaster recovery vs. security recovery plans: Why you need separate strategies

Responding to a cyber security incident has its own unique objectives and requires its own recovery plan.

Malware virus

Kaspersky discovers supply-chain attack at NetSarang

While investigating suspicious DNS requests for a financial institution, researchers at Kaspersky discovered backdoor in recently updated copies of software released by NetSarang, a developer of management tools for servers and...

insurance cyber attack protection

Five things you need to know about executive protection

Executive protection requires risk assessment and adherence to rules. Here's how you get executive buy-in.

disaster recovery plan ts

How to make your disaster recovery GDPR compliant

With GDPR coming into effect on 25 May 2018, it's costing businesses significant time and money to ensure compliance with the new regulations. But when it comes to your IT have you really covered all bases? Have you thought about your...

red team vs. blue team

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

UPS van

Las Vegas UPS Store makes risk adjustments due to DEF CON

The UPS Store in Caesars Palace is preparing to host thousands of hackers this weekend by issuing a warning to hotel guests who are looking for printing services – no USB printing and no links.

Load More