Disaster Recovery

Disaster Recovery news, analysis, research, how-to, opinion, and video.

lighthouse beam beckons to a businessman in a boat on a sea of red tape
2 problems panic running evacuation

las vegas nighttime

Board cybersecurity field trips

Maybe this time, what happens in Vegas won't stay in Vegas!

Airport departure sign with airplane flying over

Why we continue to fail: lessons learned from the Atlanta Airport fiasco

Five basic failures happened that make the Atlanta airport a softer target for future attack.

fire chino hills california

Why staging a fake attack is only real thing to keep you secure

How the Napa County fires opened my eyes to the readiness - or lack thereof - most of us are to a real disaster, physical or digital.

human weak link cybersecurity primary

Why incident response is the best cybersecurity ROI

Former White House CIO says unexpected breaches can wreak havoc on a company's bottom line. Proper incident response planning can mitigate damage costs.

7 response

5 trends from 2017 that will still matter in 2018

There were too many lessons to count, so here are 5 things that aren’t going away any time soon.

rescue recovery data binary sea ocean lifesaver

Reliability vs. redundancy: aren’t they the same thing?

Business continuity planning assumptions are changing the way companies recover from impact scenarios and minimize the disruption to daily business activities.

data breach primary

Rethinking response: the benefits of seeking external support

Why your organization should look to external support following any event, incident or breach.

digital marketing

5 rules for smarter cyber communications

The way you communicate before, during and after a data breach determines its ultimate impact on your organization. It’s time to get smarter about this lesser known aspect of your cybersecurity program.

lock circuit board bullet hole computer security breach

Equifax: A teaching opportunity

Equifax did just about everything wrong. Here's what's going to happen because of it.

computer programmer or hacker

How cyber threats are changing the makeup of IT departments

Since cybersecurity and DR both have a hand in meeting availability demands, many companies are incorporating their DR into their wider cybersecurity strategies, weaving them into a single response plan for effectiveness. This means...

hand holding paper cloud for Microsoft Azure logo

Why you should — and shouldn't — harness Azure for disaster recovery

The cost and flexibility benefits of Azure's public cloud make it an obvious choice for a disaster recovery platform. But how well do you know Azure and what challenges could you face in harnessing its power?

Locky Ransomware infects a Windows 10 computer

Surviving ransomware by keeping things simple

Ransomware is a topic everyone knows about, but unless you've experienced a ransomware attack, it's hard to really describe and understand the stress associated with these events.

data center datacenter private cloud

There is no such thing as a DR test failure

The key to performing disaster recovery tests for your company is that, no matter the results, your real objective is to learn from the situation and your team’s process. Often times, it’s people not technology that make or break a...

07 antivirus

The reality of ransomware

Why every CISO needs to consider a ransomware infection as a likely scenario to include in their business continuity and disaster recovery plans. There are some unique challenges when responding to a ransomware attack that could...

hurricane harvey flood

Disaster recovery vs. security recovery plans: Why you need separate strategies

Responding to a cyber security incident has its own unique objectives and requires its own recovery plan.

disaster recovery plan ts

How to make your disaster recovery GDPR compliant

With GDPR coming into effect on 25 May 2018, it's costing businesses significant time and money to ensure compliance with the new regulations. But when it comes to your IT have you really covered all bases? Have you thought about your...

red team vs. blue team

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

disaster recovery plan ts

7 things your IT disaster recovery plan should cover

Enterprise networks and data access can be knocked out without warning, thanks to natural and man-made disasters. You can’t stop them all from happening, of course, but with a good disaster recovery plan you can be better prepared for...

Load More