Business Continuity

Business Continuity news, information, and how-to advice

07 antivirus

The reality of ransomware

Why every CISO needs to consider a ransomware infection as a likely scenario to include in their business continuity and disaster recovery plans. There are some unique challenges when responding to a ransomware attack that could...

hurricane harvey flood

Disaster recovery vs. security recovery plans: Why you need separate strategies

Responding to a cyber security incident has its own unique objectives and requires its own recovery plan.

Malware virus

Kaspersky discovers supply-chain attack at NetSarang

While investigating suspicious DNS requests for a financial institution, researchers at Kaspersky discovered backdoor in recently updated copies of software released by NetSarang, a developer of management tools for servers and...

insurance cyber attack protection

Five things you need to know about executive protection

Executive protection requires risk assessment and adherence to rules. Here's how you get executive buy-in.

disaster recovery plan ts

How to make your disaster recovery GDPR compliant

With GDPR coming into effect on 25 May 2018, it's costing businesses significant time and money to ensure compliance with the new regulations. But when it comes to your IT have you really covered all bases? Have you thought about your...

red team vs. blue team

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

UPS van

Las Vegas UPS Store makes risk adjustments due to DEF CON

The UPS Store in Caesars Palace is preparing to host thousands of hackers this weekend by issuing a warning to hotel guests who are looking for printing services – no USB printing and no links.

disaster recovery plan ts

7 things your IT disaster recovery plan should cover

Enterprise networks and data access can be knocked out without warning, thanks to natural and man-made disasters. You can’t stop them all from happening, of course, but with a good disaster recovery plan you can be better prepared for...

fbi seal in sioc

Scammers demand Bitcoin in DDoS extortion scheme, deliver empty threats

The FBI has issued an advisory to businesses over a recent string of DDoS extortion attempts. The perpetrators are claiming to be affiliated with Anonymous or Lizard Squad, and their demands threaten sustained attacks unless a Bitcoin...

python snake programming language

Insider wreaks havoc on company—after he resigns

Over the course of several weeks, a former Navarro Security employee used off-the-shelf tools to destroy files, compromise email and redirect the company's web traffic to a competitor.

disaster recovery button

6 reasons why IT recoveries fail

The top 6 reasons IT recoveries fail to meet SLAs

alert hacking threat detected

Proposed 'hack back' law would not have stopped WannaCry

On Monday, the Financial Times published a story concerning a proposed bill form Representative Tom Graves, a Republican from Georgia's 14th district. Graves has proposed changing the Computer Fraud and Abuse Act (CFAA) to allow...

ransomware

Kentucky workers comp carrier survives ransomware

An overzealous Web surfer brings employee training to the forefront. See how they have tightened up the network.

Hurricane Matthew

Suffolk County greets hurricane season with updated alerting system

Last September, as the East Coast prepared for Tropical Storm Hermine, the emergency broadcasting system accidentally sent out an evacuation alert for all of Long Island's Suffolk County. The alert was meant just for Fire Island, but...

security group team circuitry

DHS wargames included a scenario similar to WannaCry

In March of 2016, the Department of Homeland Security conducted a national exercise to see how the government and the private sector would react to a multi-sector cyberattack on critical infrastructure. The scenario included malware...

1 incident response police tape crime death

Incident response is like tracking down a perpetrator

What is incident response? Larry Zulch, President & CEO, Savvius, walks us through the crime scene.

industrial refinery energy plant oil gas

Researchers and defenders needed in IIoT

Strategies to overcome the complexity of patching vulnerabilities in critical infrastructure

disaster recovery plan ts

Top DRaaS companies to watch

Forrester Research recently released its report naming Sungard AS, Bluelock, IBM, and iland as the top disaster recovery-as-a-service companies. See its reasoning why.

mobile forensics

Computer forensics follows the bread crumbs left by perpetrators

As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime.

rescue recovery data binary sea ocean lifesaver

Resiliency, staying afloat in the face of cyber threats

Today's reality is that if the enterprise uses networked computers, they will get hit at some point. Not having and practicing a recovery plan could be the doom of any organization.

Load More