The Rise and Rise of the Recovery Consistency Objective
Timing, as comedians say, is everything. It’s true if you’re on stage entertaining an audience.
Our 2015 Business Continuity Review – Cloudy with Scattered Security Breaches
Information security, both in-cloud and on-premise, was somewhat higher profile during 2015. The top three threats for the year for cloud environments were (in decreasing order of importance) app attacks, suspicious activity, and brute force.
Extending to Long Range Disaster Recovery Planning
People go to their “panic stations” (or rather, their designated disaster recovery roles!) to contain and repair the damage.
Why You Should Keep Doing IT Penetration Testing
If the business and IT environment fluctuates so much, why then is it still important to do penetration testing?
IT Network Firewall Technology is a Model for Business Continuity Too
Instead of (or as well as) trying to sneak past a firewall with a few innocent-looking data packets, the DOS attack tries to cripple a network
Image Backups Help You Get Back in Business Faster
What does it take to get PC or server backups to work properly and bring computers back to operational status?