Outward-Looking Business Continuity
It is easy to indulge in navel-gazing when it comes to business continuity. We examine your business, its components, its requirements, its objectives and the risks that could affect it.
It is easy to indulge in navel-gazing when it comes to business continuity. We examine your business, its components, its requirements, its objectives and the risks that could affect it.
A Local Resilience Forum? Should you have one? Also referred to for short as an LRF, the idea is to bring together different respondents in a local area in order to guarantee cooperation
Current press coverage may be focusing on exaflops and artificial intelligence, but the IT success story of the decade is still likely to be cloud computing as Cloud Business Continuity struggles to bring much progress.
Smart mobile has so far been largely a consumer-driven market. That has been good news for the business sector. It has reaped the benefits of the technological advances and better user experiences, with which vendors have sought to woo Jane and Joe Public.
Willie Sutton was the man who (according to a popular story) gave the definitive answer to the question “Why do you rob banks?” He said “Because that’s where the money is”.
The economic arguments for bring your own device (BYOD) working are multiple. The first one is that if employees fund their own terminals (smartphones, tablets, portables), their employer does not have to.
Sourcing and procurement in business is becoming less and less hands-off. Gone are the days when an enterprise could shut its eyes to labour conditions in a supplier’s company, as long as the products or services arrived on time and at the agreed cost yet behind the scenes what impacts the most is business reputations when the human element becomes non-existent.
Culture and language determine much of how we live, think and act. So does history. These factors could explain why the Netherlands has gained a reputation as a leading exporter of IT Cyber-Security.
The 2016 Defence Whitepaper from the Australian government is now available online. It discusses a broad range of defence topics, of which cyber defence is just one.
Ransomware attacks are on the rise, according to recent reports. Cybercriminals often favour these attacks, because they find them to be effective and lucrative.
Convenience is the name of the game, especially when it helps customers spend more. The new generation “tap and go” paywave and paypass cards are designed to do that.
If you have a battle box for your enterprise, then it probably contains vital information such as employee and major supplier contact details, the most important business contracts, system codes for accessing or restarting critical applications, and so on.
In an ideal organisational world, ITSCM (IT service continuity management) guarantees rapid recovery of critical IT services after unplanned downtime.
You might not go as far as to bet that they would never, ever suffer a breach of security. Yet today’s scandals seem to concern entities in the private sector.
Timing, as comedians say, is everything. It’s true if you’re on stage entertaining an audience.
Buyers, beware! While a car with one careful previous owner (we’ve all heard that one, right?) may still be a viable purchase proposition, somebody else’s security may be ill-suited to your organisation. Second Hand Security can crop up in situations like company mergers and acquisitions.
As organisations have boldly gone when no enterprise has gone before, meaning out to the far corners of cyberspace, the face of data security has changed significantly.
The Zika virus is turning out to be a bigger and more unwelcome surprise than expected.
How many people in your enterprise use their personal mobile devices for work?
Information security, both in-cloud and on-premise, was somewhat higher profile during 2015. The top three threats for the year for cloud environments were (in decreasing order of importance) app attacks, suspicious activity, and brute force.
With mobile computing already so widespread and the promise to add billions more attached devices, a large part of your security will be determined by the state of your technology.
Revelations of government snooping and pressure on cloud providers to provide customer data to authorities have led to new developments in the way encryption is applied with those ready for the Bring Your Own Encryption (BYOE) phase.
If you use a cloud service or let your employees access company systems from their own smartphones, you’ve probably already noticed how your IT security perimeters has expanded.
Have you ever looked at an IT security plan and
Corporate policies on anything from safety to ethical sourcing are
Barrels of apples can go bad, both literally and figuratively,
System hacks, data breaches and information theft are frequently in
What do encryption and reputation have to do with each
Does this sound like a contradiction in terms? If your
Much of IT security revolves around the question of how
Get Started
For urgent inquiries, call us on 1300-BCPLAN (Intl. +612 9098 9000)
As an executive in any business, it is understandable that you want to ensure it is 100% safe, because your business is only as strong as its weakest link.
+612 9098 9000
subscribe our newsletter go get the latest updates and news from Opscentre
Copyrights © 2024 OpsCentre | Powered by PixxelStudio86.