Disaster Recovery

Disaster Recovery news, analysis, research, how-to, opinion, and video.

security incident responders life preservers
customer feedback frustrated man speech bubbles social media

allscripts health care ransomware bitcoin

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.

certified rubber stamp with red ink

Underwriting cyber exposure – the business case for certifying

The ability to have an independent and agnostic organization provide a certification of a product or service has more upside than down.

communication understanding executives phone diversity

Alternative communications planning and cybersecurity incident response

Cyberattacks can happen for a whole variety of reasons. No company is entirely safe. And these days, when digital communication is so vital to the basic operations of a company, incorporating a messaging strategy that takes into...

security threats and vulnerabilities

Incident management for SMBs

In today's dynamic threat environment, developing a risk management methodology is a strategic imperative for all companies.

computer keyboard delete trash

SamSam group deletes Atlanta's contact portal after the address goes public

An image shared with local media during the early stages of a SamSam ransomware infection in Atlanta exposed the contact portal assigned to the city by the group responsible for the attack. When questioned about their actions via the...

blue padlock in circle pixels digital security padlock

9 policies and procedures you need to know about if you’re starting a new security program

Any mature security program requires each of these infosec policies, documents and procedures.

hacker hack attacke cyber malware keyboard

Maslow’s hierarchy of needs for incident response

The advent of laterally spreading malware requires the security community to progressively build out incident response to include more thorough scoping to determine the true extent of an event and threat hunting to find those threats...

lighthouse beam beckons to a businessman in a boat on a sea of red tape

What happens if... disaster recovery for the smart city and beyond

Using disaster-recovery-as-a-service (DRaaS) for smart distributed data.

2 problems panic running evacuation

Lessons from Hawaii – how prepared should we be?

If something happens you’ve never seen before, how do you know what to do next?

las vegas nighttime

Board cybersecurity field trips

Maybe this time, what happens in Vegas won't stay in Vegas!

Airport departure sign with airplane flying over

Why we continue to fail: lessons learned from the Atlanta Airport fiasco

Five basic failures happened that make the Atlanta airport a softer target for future attack.

fire chino hills california

Why staging a fake attack is only real thing to keep you secure

How the Napa County fires opened my eyes to the readiness - or lack thereof - most of us are to a real disaster, physical or digital.

human weak link cybersecurity primary

Why incident response is the best cybersecurity ROI

Former White House CIO says unexpected breaches can wreak havoc on a company's bottom line. Proper incident response planning can mitigate damage costs.

7 response

5 trends from 2017 that will still matter in 2018

There were too many lessons to count, so here are 5 things that aren’t going away any time soon.

rescue recovery data binary sea ocean lifesaver

Reliability vs. redundancy: aren’t they the same thing?

Business continuity planning assumptions are changing the way companies recover from impact scenarios and minimize the disruption to daily business activities.

data breach primary

Rethinking response: the benefits of seeking external support

Why your organization should look to external support following any event, incident or breach.

digital marketing

5 rules for smarter cyber communications

The way you communicate before, during and after a data breach determines its ultimate impact on your organization. It’s time to get smarter about this lesser known aspect of your cybersecurity program.

lock circuit board bullet hole computer security breach

Equifax: A teaching opportunity

Equifax did just about everything wrong. Here's what's going to happen because of it.

Load More