Business Continuity

Business Continuity news, trend analysis and opinion

1 sign contract
basketball on court

0 intro

7 tips for developing a powerful data disaster plan

Commvault has provided the following tips that will help enterprises develop simple yet powerful holistic data protection plans that enable enterprises to quickly recovery the data they need if there is a data disaster, in an...

healthcare it

Technology health check: 10 early-warning signs of a failing vendor or product

By identifying signs of a failing vendor or product, customers can conduct risk mitigation and make alternate plans.

Hand touch screen graph on a tablet chart data businessman

Get the data your business needs without paying high fees

If your business needs data but can’t commit a large chunk of your budget to get it, here are a few options.

disaster recovery button

Disaster recovery: How is your business set up to survive an outage?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times.

student data protection ts

Ensure your data infrastructure remains available and resilient

Data infrastructure and application outages are preventable with proper application and data protection.

Ransomware makes California nursing school feel ill

About three months ago, an instructor at Gurnick Academy, a California-based nursing school, had his biggest fear come alive. When he tried to access his lectures, the files were encrypted. The teacher was literally locked out of his...

1 lights

How to handle business continuity in a crisis

IT resilience ensures business continuity in crisis, but only if executed with forethought and diligence. Todd Scallan of Axcient suggests applying any of these six tips to make IT resilient.

quantum computing

Experts split on how soon quantum computing is coming, but say we should start preparing now

Whether quantum computing is 10 years away -- or is already here -- it promises to make current encryption methods obsolete, so enterprises need to start laying the groundwork for new encryption methods.

Stack of school books on desk with an apple on top

4 historic security events of 2016 and what they teach us [Infographic]

From the massive data breaches at Yahoo to the election hacks, history will look back on 2016 as a very instructive year indeed.

Hurricane Matthew

Crisis planning: 6 ways to put people first

"Planning for the 'what ifs' is not just about imagining events that are hard to imagine. It is about knowing which of your business functions will determine your ability to weather a crisis," says Bill Tibbo.

092016blog discarded phones

No phone is worth drowning over … or dying of embarrassment

Sometimes you’re better off accepting that the phone is a goner … lest you become one yourself.

1 noise

7 ways to avoid alert fatigue

Just like when your car alarm goes off incessantly, you don’t always run for the door thinking your car was stolen. If only there was a way to hear for when actual robbers are near your car or in this case network.

server cables network switches

How to review and test backup procedures to ensure data restoration

If you want to test backup and restore procedures with your eyes wide open, consider these factors and tips.

The New rogue IT

When your IT department goes rogue

In my last post, we discussed the latest habit of non-IT departments in organizations large and small: hatching rogue IT operations on the cloud, taking your company’s data for a spin in the Wild, Wild Web — unpatched, unprotected,...

architecture

Defense in depth: Stop spending, start consolidating

When it comes to layered defense and security tools, less is often more just as more can sometimes be less. The average enterprise uses 75 security products to secure their network. That's a lot of noise and a lot of monitoring and...

auditor

How an audit can shore up your security strategy

The high-profile data breaches of recent years have forced many organizations to take a closer look at their security technologies and policies, experts say.

Data Center Risk Management

How to prepare your organization for the risk of data loss

Have you implemented policies to ensure your business is risk-ready?

fbi seal

The FBI isn't wrong; sometimes you will have to pay the ransom

Last week, during the 2015 Cyber Security Summit in Boston, Special Agent Joseph Bonavolonta said that the FBI's advice for some Ransomware attacks is to pay the ransom. Unfortunately, that might be the best option in some cases.

Load More