Governments often make legal requirements about things that could damage people’s health, whether in a physical, financial, or possibly other sense.
The title of this blog post could almost have read “Never send a human to do a machine’s job”.
If you have already installed mobile apps on your smartphone to go beyond the stock selection provided with the device, you may well have noticed how a mobile app asks for permission to access certain resources or take certain actions.
It’s always an editorial dilemma – Do we start with the event with the biggest business continuity impact? The event that was the most unbelievable? For the 2016 Business Continuity Review, we have some difficult choices, including the massive cyberattack of the toasters, the most powerful man in the world (soon) trying to carve up the Internet, and a smartphone threatening the health of a national economy.
Hooray for World Backup Day, you might think, reminding people how important it is to safeguard data and systems.
In an ideal organisational world, ITSCM (IT service continuity management) guarantees rapid recovery of critical IT services after unplanned downtime.
Timing, as comedians say, is everything. It’s true if you’re on stage entertaining an audience.
Information security, both in-cloud and on-premise, was somewhat higher profile during 2015. The top three threats for the year for cloud environments were (in decreasing order of importance) app attacks, suspicious activity, and brute force.
People go to their “panic stations” (or rather, their designated disaster recovery roles!) to contain and repair the damage.
If the business and IT environment fluctuates so much, why then is it still important to do penetration testing?
Instead of (or as well as) trying to sneak past a firewall with a few innocent-looking data packets, the DOS attack tries to cripple a network
What does it take to get PC or server backups to work properly and bring computers back to operational status?