Business Continuity

Business Continuity news, trend analysis and opinion

pepper robot
1 incident response police tape crime death

disaster recovery plan ts

Top DRaaS companies to watch

Forrester Research recently released its report naming Sungard AS, Bluelock, IBM, and iland as the top disaster recovery-as-a-service companies. See its reasoning why.

storm clouds dark

Did cloud kill backup?

No, but it does necessitate a reinvention of data protection for the new normal of the multi-cloud world

mobile forensics

Computer forensics follows the bread crumbs left by perpetrators

As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime.

1 sign contract

What's in the fine print of your disaster recovery vendor agreement?

Make sure these points are in your service-level agreements with DRaaS vendorsWhen considering DRaaS vendors, ask your potential partner how far they are willing to go in protecting your business and your data, and if these promises...

basketball on court

NCAA coaches have a lot in common with data center managers

NCAA basketball coaches and data center managers play a similar role to ensure their teams (or infrastructures) are ready to perform when it matters most.

0 intro

7 tips for developing a powerful data disaster plan

Commvault has provided the following tips that will help enterprises develop simple yet powerful holistic data protection plans that enable enterprises to quickly recovery the data they need if there is a data disaster, in an...

disaster recovery button

Disaster recovery: How is your business set up to survive an outage?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times.

student data protection ts

Ensure your data infrastructure remains available and resilient

Data infrastructure and application outages are preventable with proper application and data protection.

Ransomware makes California nursing school feel ill

About three months ago, an instructor at Gurnick Academy, a California-based nursing school, had his biggest fear come alive. When he tried to access his lectures, the files were encrypted. The teacher was literally locked out of his...

1 lights

How to handle business continuity in a crisis

IT resilience ensures business continuity in crisis, but only if executed with forethought and diligence. Todd Scallan of Axcient suggests applying any of these six tips to make IT resilient.

quantum computing

Experts split on how soon quantum computing is coming, but say we should start preparing now

Whether quantum computing is 10 years away -- or is already here -- it promises to make current encryption methods obsolete, so enterprises need to start laying the groundwork for new encryption methods.

Stack of school books on desk with an apple on top

4 historic security events of 2016 and what they teach us [Infographic]

From the massive data breaches at Yahoo to the election hacks, history will look back on 2016 as a very instructive year indeed.

Hurricane Matthew

Crisis planning: 6 ways to put people first

"Planning for the 'what ifs' is not just about imagining events that are hard to imagine. It is about knowing which of your business functions will determine your ability to weather a crisis," says Bill Tibbo.

092016blog discarded phones

No phone is worth drowning over … or dying of embarrassment

Sometimes you’re better off accepting that the phone is a goner … lest you become one yourself.

1 noise

7 ways to avoid alert fatigue

Just like when your car alarm goes off incessantly, you don’t always run for the door thinking your car was stolen. If only there was a way to hear for when actual robbers are near your car or in this case network.

server cables network switches

How to review and test backup procedures to ensure data restoration

If you want to test backup and restore procedures with your eyes wide open, consider these factors and tips.

The New rogue IT

When your IT department goes rogue

In my last post, we discussed the latest habit of non-IT departments in organizations large and small: hatching rogue IT operations on the cloud, taking your company’s data for a spin in the Wild, Wild Web — unpatched, unprotected,...

architecture

Defense in depth: Stop spending, start consolidating

When it comes to layered defense and security tools, less is often more just as more can sometimes be less. The average enterprise uses 75 security products to secure their network. That's a lot of noise and a lot of monitoring and...

Load More