• Home
  • Services
    • Resilience & Continuity
      • Business Continuity Management
      • IT Disaster Recovery
      • Crisis Management
      • Emergency Management Planning
      • Workplace Health and Safety
      • Pandemic Response Planning
      • Risk Management
      • Strategy Development
      • Policy, Plan & Process Development
      • Testing & Exercising Services
      • Governance & Compliance
      • Outsourcing & Managed Services
      • Training Services
      • Training Courses
    • Info & Cyber Security Services
      • IT Security Management
      • Security Review & Assessment
      • Security Risk Management
      • Digital Information Security Policy
      • Vulnerability & Penetration Testing
      • Cyber Security Awareness Training
    • Data Management Services
      • Data Management Training & Awareness
      • Data Management Strategy
      • Data Management Documentation
      • Data Management Platforms & Tools
    • IT Services & Solutions
      • Solution Design & Implementation
      • IT Service Management
      • IT Process & Policy Development
      • IT Sourcing Strategy
      • Technology Refresh Development
      • ITIL Auditing
      • Cloud Risk Assessment
    • RPx BCP Software
    • MiRA Incident Response App
  • About Us
    • Meet The Team
    • Partners
    • FAQ
  • Clients
    • Testimonials
  • Resources
  • Blog
  • Contact
phone-icon
1300 BC PLAN
phone-icon
1300 BC PLAN
Skip to content

Author Archives: opscentre

Recovery Consistency Objective

The Rise and Rise of the Recovery Consistency Objective

Business Continuity, Disaster RecoveryBy opscentreMarch 22, 2016

Timing, as comedians say, is everything. It’s true if you’re on stage entertaining an audience.

Second Hand Security

Hi, Can I Interest You in Some Second Hand Security?

Information SecurityBy opscentreMarch 1, 2016

Buyers, beware! While a car with one careful previous owner (we’ve all heard that one, right?) may still be a viable purchase proposition, somebody else’s security may be ill-suited to your organisation. Second Hand Security can crop up in situations like company mergers and acquisitions.

Data Security

Employees vs. Employees – the Internal Battle for Data Security

Information SecurityBy opscentreFebruary 18, 2016

As organisations have boldly gone when no enterprise has gone before, meaning out to the far corners of cyberspace, the face of data security has changed significantly.

Zika

Zika and the Multi-Dimensional Development of a Pandemic

PandemicBy opscentreFebruary 16, 2016

The Zika virus is turning out to be a bigger and more unwelcome surprise than expected.

Data Protection

Should Mobile Device Data Protection Be Encouraged or Enforced?

Information SecurityBy opscentreFebruary 11, 2016

How many people in your enterprise use their personal mobile devices for work?

Business Continuity Review

Our 2015 Business Continuity Review – Cloudy with Scattered Security Breaches

Business Continuity, Business Resilience, Cloud Computing, Disaster Recovery, Information SecurityBy opscentreFebruary 4, 2016

Information security, both in-cloud and on-premise, was somewhat higher profile during 2015. The top three threats for the year for cloud environments were (in decreasing order of importance) app attacks, suspicious activity, and brute force.

←1
234567891011121314151617181920212223242526272829
…3031323334…
3536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109
110→
Go to Top
  • RSS Link
 
LINKS
  • Privacy
  • Disclaimer
  • Copyright
  • Spam Policy
 
  • Sitemap
  • Social Media
Contact
  • 1300 BC PLAN
  • [email protected]
  • Level 20, Tower 2 Darling Park,
    201 Sussex Street, Sydney NSW
    2000 Australia

Copyright © 2021 OpsCentre. All Rights Reserved