Blog & News

bigstock Best Internet Concept Globe 192866755

Why the Internet is an Elephant

Proverbially at least, elephants never forget. Neither does the Internet. Once information is out there, you must assume it will always be out there, and that deleting it at its source may make no difference.

Read More »
shutterstock 142527925 1 1

Why Stop at Just Disaster Recovery with Your DRP?

Do more with less. Who hasn’t already heard that in business? And just because something – like disaster recovery planning and management – is vital to ensuring enterprise survival does not mean that you cannot leverage your investment to get more out of it.

Read More »
Smart Mobile Architecture

How’s Your User Experience for Your Disaster Recovery?

It may sound strange to talk about “touchy-feely” stuff like user experience in the context of IT disaster recovery. After all, the priority is on getting systems up and running again within recovery time and recovery point objectives, rather than sitting around in focus groups discussing feelings and opinions.

Read More »
IT services 3

Time to Get Your Disaster Recovery Plan Straight?

Time is money, as they say, and it is also a key factor in IT disaster recovery. Take, for instance, the well-known recovery time objective or RTO, which defines how fast you should get back to normal operations after an IT incident.

Read More »
bigstock 188384056

IT Systems Management and the 5 S’s

We may live in a digital age, but much of the concepts from the previous industrial era still carries through. We have virtual cloud data factories and production lines, just like their physical counterparts for making cars, furniture, aircraft and so on.

Read More »
bigstock Privacy Policy Private Secur 149902133

Cyber Security and the Legal Sector

It’s commonplace to see articles and discussions about cyber security and the law, but this article is not about that. It is about cyber security and law firms, those august institutions with their lawyers, barristers, and attorneys.

Read More »
bigstock 214593988

Linux the Unhackable? That All Depends…

Linux has an enviable reputation as a secure platform for servers. But Linux the Unhackable? Certain myths persist about the inherent resistance of Linux to viruses and the superfluity of firewalls.

Read More »
bigstock Compliance Legal Rule Complian 96719963

Legal Requirements for Business Continuity

Business continuity is good for your business, but is it also a legal requirement? Laws and regulations differ from one country or one industry to another, although there is a basic expectation that organisations will act responsibly.

Read More »
bigstock 201445291

ITSM and Statement of Work

With the aim of IT service management being to serve the business or the organisation funding the IT, it’s crucial that business requirements drive ITSM projects and procurement.

Read More »
bigstock 210403816

Santa Clause and Cyber Crime

Does Father Christmas know just how exposed his operation is? With one of the largest address books ever conceived (names, addresses, gift preferences of billions of people) and a seasonal workforce of elves that may or may not have been vetted before hiring, Santa’s gift selection, preparation and delivery system may be hugely at risk.

Read More »

Get Started

Our Resilience, Compliance and Awareness solutions enable you to keep the lights on

For urgent inquiries, call us on 1300-BCPLAN (Intl. +612 9098 9000)