Disaster Recovery

Disaster Recovery | News, how-tos, features, reviews, and videos

4 silent skeptic
candle laptop blackout

trouble ahead 166144370

How do we build digitally resilient organizations?

As we head towards a digitally dependent future, the need for digital resilience has never been greater. Defining digital resilience and describing the need was the first step, but how do we build organizational capability?

Dinosaurs / Tyrannosaurus Rex / Jurassic / Prehistoric / Ancient / Old / Outdated / Binary

3 characters from Jurassic Park that could’ve benefited from an IT disaster recovery plan

Jurassic Park and IT disaster recovery — how do they connect? In fact, we can learn some pretty valuable IT-DR lessons from the characters of the movie franchise.

businessman on a rock in a stormy ocean

Are you prepared for hurricane season? Disaster recovery and business continuity plan best practices

Despite the lull of a calm hurricane season so far, your enterprise’s disaster recovery/business continuity plan needs to be in place.

futuer blast hyper drive matrix

Digital resilience – a step up from cybersecurity

We are living in an increasingly digital world, but many organizations are still unaware of the extent to which they rely on digital technology and the risks that come with it. As we head towards a digitally dependent future, the need...

cyber terrorism dynamite explosion blow up binary detinate

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's...

orange number 5 pool ball top five 5 tips

5 simple steps for SMBs to ensure cyber resiliency

While these tips are by no means a complete guide for how SMBs can be resilient, they can be the start of a continuous process small and mid-sized business should implement to be better prepared.

leading digital transformation puppet

Leveraging digital transformation

Data protection plays a key part in digital transformation adoptions, changes to existing practices and reforming company culture. Digital transformation expert Vic Tingler discusses how businesses can digitally transform to increase...

sepia number 3 film reel top three

The 3 hidden costs of incident response

Every business function seeks to apply finite resources to maximum benefit, and to do that effectively in security, like threats, requires a keen understanding of those costs that are known and those that are hiding.

10 backup archiving

Exploring the paradigm shift from backup to data protection

Smart organizations evaluate their overall data footprint and transform their traditional back office IT to a streamlined data protection approach for both cloud and on-premises data.

Atlanta skyline

Atlanta's recovery highlights the costly mistake of being unprepared

The Samsam attack against the city of Atlanta in March was chaotic and crippling. The ransomware, named for the group responsible for development and deployment, left the city scrambling to deal with critical systems that were forced...

security incident responders life preservers

Two incident response phases most organizations get wrong

It's important to remember: Incident response isn't a thing, it's a process.

customer feedback frustrated man speech bubbles social media

Customers describe the impact of the Allscripts ransomware attack

A ransomware attack against a SaaS provider hurts customers, but when it's a healthcare company that’s hit, patients suffer. Such was the case with January's attack against Allscripts, one of the largest electronic health record and...

allscripts health care ransomware bitcoin

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.

certified rubber stamp with red ink

Underwriting cyber exposure – the business case for certifying

The ability to have an independent and agnostic organization provide a certification of a product or service has more upside than down.

communication understanding executives phone diversity

Alternative communications planning and cybersecurity incident response

Cyberattacks can happen for a whole variety of reasons. No company is entirely safe. And these days, when digital communication is so vital to the basic operations of a company, incorporating a messaging strategy that takes into...

security threats and vulnerabilities

Incident management for SMBs

In today's dynamic threat environment, developing a risk management methodology is a strategic imperative for all companies.

computer keyboard delete trash

SamSam group deletes Atlanta's contact portal after the address goes public

An image shared with local media during the early stages of a SamSam ransomware infection in Atlanta exposed the contact portal assigned to the city by the group responsible for the attack. When questioned about their actions via the...

blue padlock in circle pixels digital security padlock

9 policies and procedures you need to know about if you’re starting a new security program

Any mature security program requires each of these infosec policies, documents and procedures.

Load More
You Might Also Like