Pages
- About Us
- Anti-Spam Policy
- Backup & Archiving Solutions
- BCM Regulations
- Blog Articles & News
- Blog-2-Anand
- Business Continuity as a Service
- Business Continuity Management
- Business Continuity Training Services
- Clients
- Cloud Risk Assessment
- Contact
- Continuity Audit
- Copyright
- Crisis Management
- Cyber Resilience is key when it comes to Ransomware
- Data Management Documentation
- Data Management Platforms & Tools
- Data Management Services
- Data Management Strategy
- Data Management Training & Awareness
- Digital Information Security Policy
- Disclaimer
- Emergency Management Planning
- FAQ
- Framework Development
- Governance & Compliance
- Health Check
- Home
- Info & Cyber Security Services
- Information Security Management Systems
- IT Disaster Recovery
- IT Service Management
- IT Services & Solutions
- IT Sourcing Strategy
- MiRA Incident Response App
- OpsCentre Team Members
- Our Services
- Our Services OLD
- Outsourcing & Managed Services
- Pandemic Planning
- Pandemic Response Planning
- Partners
- Privacy
- Ransomware
- Resilience & Continuity Services
- Resources
- Risk Management
- RPx Recovery Planner
- Search Results
- Security Management
- Security Management Services
- Security Review & Assessment
- Security Risk Management
- Shockproof Your Business Against Risks, Disasters and Crises
- Social Media Disclosure
- Software Solutions
- Solution Design & Implementation
- Strategy Development
- Technology Refresh Development
- Testimonials
- Testing & Exercising Services
- Vulnerability & Penetration Testing
- Workplace Health and Safety
- zzz – CoronaVirus Resource Centre (WIP)
- zzz – CoronaVirus Resources (WIP)
Blog Articles & News
Alternate Site
Asset Management
Business Case
- How to Sell the Business Case for Business Continuity
- When the Business Case for Business Continuity affects Supply Chain Operations
- Does a Business Case for Business Continuity Change after Disaster?
- Business continuity statistics or scaremongering?
- Bankable Business Continuity
- Moving towards a business case for business continuity
- Embedding Business Continuity Management into your organisation's culture
- Embedding Business Continuity Management into your organisation’s culture
- 7 Habits of Highly Effective Business Continuity
- The Business Case for Business Continuity Management
Business Continuity
- Adapt or Die – A Darwinian Take on Business Continuity
- COVID19 – Business Recovery Phase
- Adapt or Die – A Darwinian Take on Business Continuity
- Towards Set-It-And-Forget-It Business Continuity
- Training Can Be Double-Edged in Business Continuity
- IT Systems Management and the 5 S’s
- Where Does a Business Continuity Plan Fit with Emergencies, Contingencies and Disasters?
- Business Continuity and Volcanoes – So Far, and Yet So Near
- The Business Continuity Runbook – Between Automated and Manual BC
- Legal Requirements for Business Continuity
- Near Misses, Critical Parts of Business Continuity
- The “Six Degrees” of Business Continuity
- Information Security and ERP Systems
- Business Continuity in 2017 – Lest We Forget?
- Santa Clause and Cyber Crime
- Robots and Business Continuity – We’re Well Past the Turing Test
- Business Continuity and Suppliers – Take Nothing at Face Value
- The Business Continuity Battle Against FUD
- Business Continuity Management and Avoiding Bankruptcy
- Why Business Continuity Will Be a Constant Battle Against Silos
- How Far Back Do You Go in Your Business Continuity?
- Business Continuity by Staying (Very) Close to Your Customer
- Business Continuity for Machines? Just a Sec, I’ll Print You Some
- The Observer Effect in Business Continuity
- Business Continuity? It’s in Our DNA, Right?
- 3 Ways to Build Collaboration into Business Continuity Management
- Business Continuity Management – How Relevant is It to Data Breaches?
- People are Important to Business Continuity Too
- Is Business Continuity about Prevention or Detection & Repair?
- Is IT Getting in the Way of Business Continuity?
- Are Politics Interfering with Your Business Continuity?
- Business Continuity and Resiliency Engineering
- The Use of Praise in Business Continuity
- Objectives or Capabilities, Where Does Business Continuity Start?
- Business Continuity Management May Need Another Name
- Agile Business Continuity – A Happy Medium Between Fossilisation and Chaos
- Business Continuity Jargon – For or Against?
- Adaptive BC – The New ABC of Keeping Things Running?
- Synchronizing Your Business Continuity Plans with a Changing Business
- Business Continuity and Machine Learning
- The Coming Roles of Virtual and Augmented Reality in Business Continuity
- Business Continuity by Working Backwards
- Why Business Now Needs Personal Business Continuity
- Business Continuity, Gut Feeling and Data-Driven Decisions
- How Business Continuity Goes to the Movies
- Secrets of a Business Continuity Culture
- Better Business Continuity with Analytics Chatbots
- Business Continuity and Multipathing
- Business Continuity and the Knock-On Blackouts
- The Other Face of the Business Continuity Hacks
- Business Continuity and Machine Learning – Is It Time?
- The Business Continuity Manager and the Typewriter
- Data Lake Hacking is the New Dumpster Diving
- The Great Business Continuity Risk-Reward Mix-Up
- Our 2016 Business Continuity Review – From National Resilience to Toasters (and Back)
- BCM, ITSCM and BIA – Alphabet Soup or a Chance to Save Money?
- 6 Ways to Go Down the Road to ITIL Hell (or to Avoid Doing So)
- Business Continuity and Business Transformation
- Four Pitfalls in IT Risk Management that You Can Avoid
- In the Future, IT Service Management May Lose the “IT”
- Using MTTR, Not Just MTBF, in Your ITIL Problem Management Processes
- IT Service Management and Employee Engagement
- Uberisation and Business Continuity
- Adjusting Your IT Risk Management Language for Your Business Colleagues
- Cascading in IT Asset Management – Should You or Shouldn’t You?
- IT Strategy – More than Just a Simple Matter of Business Alignment
- Your Strategy for Shadow IT Sourcing
- Archived Backups and Backups of Archives – What Do You Need?
- Will IT Management Morph into Business Process Management?
- Is Blockchain Going to Be Big for Business Continuity?
- When Less is More in Risk Management
- Lean and Cost Cutting in IT Service Management
- IT Service Management and Handling Shadow IT – Fight, Flight or Better Marketing?
- The Business Continuity Fight of the Week: Real Clouds vs. Virtual Clouds?
- Where Do You Put the Cursor for Supply Chain Resilience?
- Designing Business Continuity into Your Business Strategies
- Learning from How Others Do Their Business Continuity
- A Lean Approach to Business Continuity
- If Facebook Rules the World, What about Business Continuity?
- Where Whistleblowing Fits into Business Continuity
- Cloud Business Continuity – Brilliant, but Still Garbage In, Garbage Out
- Human Rights and Business Reputations
- Does It Make Sense for a Battle Box to be a Physical Artefact?
- Winning in the IT Service Continuity Management Obstacle Race
- The Rise and Rise of the Recovery Consistency Objective
- Our 2015 Business Continuity Review – Cloudy with Scattered Security Breaches
- IT Security Trends in Technology, Politics and People – Always Two Sides to the Coin
- Why You Should Keep Doing IT Penetration Testing
- IT Network Firewall Technology is a Model for Business Continuity Too
- Do You Need a CRO for Your Business Continuity, or a CRO, or Both?
- Virtualisation Needs More Than Just a Physical Security Approach
- Crisis Communications and When No News is Not Good News
- Business Continuity Benefits – Not Just an Insurance Policy
- Opening Up Company Systems without Compromising Security
- Are You Obliged to Use a Risk Management Software Application?
- Crisis Management and the Growing Role of Social Media
- Are Global Shocks Part of Your Business Continuity Planning?
- Making a Profit Centre out of Business Continuity Management
- A New Metric for Business Continuity – the Stupidity Index
- The Heartbleed Threat to Business Continuity
- Mapping Networked Business Continuity Disciplines into Documents
- Is Seven the Magic Number for IT Security?
- Supply Chain Resilience and Other Great Unknowns
- BS 25999-2 to ISO 22301: Will Your Business Continuity Certification Still Be Valid?
- Business Continuity and Split Corporate Personality
- Is a Windows or Linux Server Better for Business Continuity?
- I Spy with My Google Glass Eye
- Smart Satellite Communications and Business Continuity Benefit
- Successfully Sitting on the Fence with Hybrid Cloud
- Version Control Basics for Better Business Continuity
- Can Tablet Computers Cure Disaster Recovery Headaches?
- Vetting and Monitoring Cloud Providers
- Server Crashes and Data Security Breaches: Just Like Death and Taxes
- New Business Continuity Lessons for Banks – and Others Too?
- DIY Phishing has a Message for Business Continuity
- The Purpose-Built Backup Appliance Comes of Age
- The Internet of Things and Big Data – Both Looking for a Killer App
- The importance of Network Security in Disaster Recovery Planning
- The Perils of the Password – How to Protect Your Business Continuity
- Factoring in Human Error in Your Business Continuity Planning
- Virtualise All You Want but Business Continuity Must Still Be End-to-End
- Tons of Technology for 2014 – But Does It Help Business Continuity?
- Point of Sale Hacking – a Growing Threat to Business Continuity?
- Business Continuity and Balancing Expert Resources
- Balancing Acts and the CIO – the Blondini of the Organisation?
- Is It Time to Review Your Malicious Software Reporting Policy?
- Outsourcing: Good Contracts are Only the Starting Point
- Data Sanitisation and Its Impact on Business Continuity
- A Perpetual Motion Machine for Sales and Business Continuity
- What the NSA Revelations Mean for Business Continuity
- Business Continuity and IT Security: Give Up or Give In?
- Business Continuity and Why the New Age Still Needs the Old
- Homing In on Best Use of the Public Cloud
- How Much Can Predictive Analytics Help Business Continuity?
- Unthinkable – Business Continuity without a Battle Box?
- Business Continuity and Creative Cyber Criminals
- Risk, Business Continuity and IT DR – the Year of 2013 in Review
- How Much Can You Outsource a Risk?
- Should You Warn Vendors about Impromptu Disaster Recovery Tests?
- How SMBs Can Consolidate Their Business Continuity Strategy
- Using Qualitative Tools to Assess Your Business Efficiency
- What Should You Upgrade – Dinosaur Computers or Dinosaur IT Skills?
- Accelerated Business Continuity – Are Real-Time Analytics the Future?
- Eight Security Questions to Ask a Cloud Vendor Before You Sign Up
- Is Google Earth a Good Tool for Business Continuity and Disaster Recovery?
- What Are Your Top Ten Organisational Risks?
- Agile Organisations and Business Continuity
- IT Security for Small Businesses – Are You Listening?
- ‘If It Ain’t Broke, Don’t Fix It’ – When Change is Not the Only Constant
- Critical Vendor Reviews are Part of Business Continuity Management Too
- How Technology Smooths the Way for Business Continuity and Disaster Recovery
- The Army as the Model for Business Communications
- ITIL, ITSM, and the Way They Can Help Business Continuity
- How Not to Be a Victim of Your Own Data Centre
- Making Virtualisation in IT an Advantage, not a Risk
- Encryption Alone Won’t Ensure Business Continuity and Here’s Why
- Organisations in Europe Are Making Risk Management a Priority
- Are Chinese Businesses Doing Well Because of or In Spite of the Web Security?
- Five Strategies to Prevent a Distributed Denial of Service (DDoS) Attack
- Social media – Risks and Productivity Impacts in the Workplace
- Virus Protection – Think of it like Car Insurance
- Cyber Security Risks for Financial Systems
- Agile Business Continuity – Simple as ABC?
- When Business Continuity Means Not Coming to Work
- Just When You Thought It Was Safe… Emergent Risks
- Duct Tape Business Continuity – Can It Work?
- IT Security and Business Continuity Through Divide and Conquer Tactics
- Business Continuity and the use of Robots
- Shrinkage, Fraud and Other Hidden Parts of Business Continuity Management
- Cloud Business Continuity Moving Towards Self-Healing Solutions
- Move over, the Six Million Dollar Man. Now It’s NYC’s Turn for Increasing Resilience.
- Getting Visual with Natural Catastrophes and Business Continuity
- Disaster Recovery Myths about Deleted Computer Files
- Disaster Recovery Goes Mobile with a Self-Propelled Solution
- Spot Your BYOD Challenge for Business Continuity
- Where is the Truth in Business Continuity Today?
- Social Networks, Business Continuity and the Pyramid of Needs
- On the Trail of the Business Continuity Calculator
- What’s the Bill for Repairs after Recent Natural Australasian Disasters?
- How Business Continuity is Built into Australian Police Operations
- Business Continuity RAA-RAA? Get Ready for Resilient Australia Awards
- IT Business Continuity – How Safe and Green Can You Be at the Same Time?
- Resilience Management Models – Is There Anybody Out There?
- Making Business Continuity Friends in Manufacturing
- “Location, Location, Location”, OK but where’s the Business Continuity?
- The Agile Approach to Implementing Business Continuity
- What Would You Like to Win a Business Continuity Award For?
- Disaster Recovery and IT Systems with Minds of their own
- HaaS and the Business Continuity Challenge
- What Business Continuity Management and Zero-based Budgeting have in Common
- Isn’t a Threat Landscape More than just Worms and Viruses?
- Have You Got Your Global Risk Analysis Kit?
- ASIC BC Guidance as an Alternative to Putting Your Money under the Mattress
- To Share or Not to Share Business Continuity in a Shared Supply Chain
- Embedding Business Continuity Management Into A Company’s Culture
- NFPA1500 or how the Fire Department Does Business Continuity
- Never a Dull Day with Business Continuity
- What the SS540 Business Continuity Standard is Designed to Do
- Business Continuity Plans for Mergers and Acquisitions
- Linking ISO 22301 to Related Management System Standards
- Keep CALM and Share My Business Continuity With Me
- Divergent Attitudes to Business Continuity Regulation and Recommendation
- Physicians, Heal Thy Business Continuity Thyself
- Reality Bites – Business Continuity Incident Examples and Statistics
- Why Should You Care About Business Continuity Management Governance?
- Not only is tape back-up still around, but it’s also still beating disk
- Disaster Recovery – the Price to Pay for Self-Inflicted Disasters
- Customers Who Make the Laws for Business Continuity in Manufacturing
- Keeping Business Continuity Plans Up to Date – Say “Aah”!
- Social Media and Crisis Communications – Starting Out Right
- Hurricane Sandy and Business Continuity Plan Best Practice
- Preparing for Product Recall beyond Standard Reverse Logistics
- WorkCover Sticks and Business Continuity Carrots
- Don’t Abdicate Your Disaster Recovery Just because your Employees are Doing It
- How would You like a “Disaster Resilience” Plan?
- What Does Bloom’s Taxonomy Have to Do with Disaster Preparedness?
- The Real Business Continuity Lesson to be Learned from Hurricane Sandy
- BCM in a Health Organisation – Who Gets Priority?
- New Zealand Earthquakes and Disaster Rebuilding
- Business Continuity Test Scenarios at the Speed of Light?
- Cloud Disaster Recovery, OK, but what if the Cloud IS the Disaster?
- Bush Fires and Business Continuity – Has Anything Really Changed?
- Embedding BCM – Not Just Another Road Paved with Good Intentions?
- How the Cloud Mixes Up Everything and the Impact on Disaster Recovery
- What does AS/NZS5050 have to Do with Black Swans and Defining Your Destiny?
- Check Your Level of Crisis Management Maturity
- What HICS does to Help Hospitals Cope with Disasters and More
- Cloud Disaster Recovery still Needs to be Analysed and Tested
- Too Much “Business as Usual” can be Bad for Your Health
- APRA and Business Continuity in Finance – Accountable in More Ways than One
- BCM Culture – Who is the Most Important Player in Your Organisation?
- What’s the Basic Business Benefit of IT Disaster Recovery via the Cloud?
- Preventing Policy and Employee Disconnects in Business Continuity Plans
- Is that Maximum Tolerable Outage, Maximum Tolerable Disruption, or What?
- SydneyALERT Aims to Improve Emergency Information to the Public
- If Bigger Australian States have DISPLANs, What do Smaller States Have?
- Business Continuity Plans of 2012 – a Mayan Point of View?
- Resilience Management and the Road to Unified Continuity
- Business Continuity Plans that Accentuate the Positive
- What Sort of Cloud Best Suits Your Disaster Recovery Plan?
- Production Pressure that Prevents Proper Business Continuity Plans
- Emotional Continuity Management – Still Just Right-Brain?
- Why Earthquake Intensity can Affect Any Disaster Recovery Plan
- Going Deeper than just a Dashboard in Your Business Continuity Plan
- Showing Off as Part of Business Continuity Plan Best Practice
- Maximum Tolerable Outage(s) for the Supply Chain in 2013
- Is it Time for Disaster Recovery Plans to Include QR Codes?
- Where’s the Proof of Business Continuity Plan Best Practice?
- Integrative Negotiation as Part of a Business Continuity Plan
- Why being a Minority in Business Continuity Planning is still OK
- Why Prospect Theory has a Role in Your Business Case for Business Continuity
- Ethics and Business Continuity Plan Best Practice
- Maximum Tolerable Outage by Whose Criteria?
- Ray Bradbury and the Role of Paper in Business Continuity Planning
- 4 Trends in Business Continuity Plans for IT and Beyond
- Operation Teapot and Vital Records in Business Continuity Plans
- Is your Disaster Recovery Plan Based on Inaccessible Backup Data?
- 7 Levels of Business Continuity Plans in the Cloud
- Data Destruction, the Flip Side of Disaster Recovery Planning
- How Hacktivism Fuels the Business Case for Business Continuity
- Maximum Tolerable Outage is Also Defined by User Frustration Levels
- One Day You too may have a Disaster Recovery Plan in Your DNA
- Business Continuity Plan Best Practice and Business Book Top Sellers
- Which Business Continuity Plan Best Practice can deal with BYOD?
- Enabling projects for business continuity plan best practice
- Business continuity test scenarios – what do you know?
- Dynamic disaster recovery plans and the promise of “set it and forget it”
- A government disaster recovery plan with long term visions
- Disaster Recovery Plans and the “New Normal”
- Business Continuity Plan Best Practice and the APT Conundrum
- Business Continuity Plans and Clouds with Fewer Silver Linings
- Business Continuity Planning Outside the Box
- Did the London Olympics Overdo the Business Continuity Planning?
- Is Stale Data Hoarding Really Part Of Business Continuity Good Practice Guidelines?
- The London Olympics 2012 and Business Continuity plan best practice
- Auditors as allies for the business case for business continuity
- Business Continuity Consultant of the Year?
- Hiring a business continuity consultant – scoping is key
- What’s in a name? (as in Business Continuity)
- What About Debris In Disaster Recovery?
- International Disaster Recovery Planning Disparities
- More on business continuity good practice guidelines
- Small business continuity and succession planning
- Calculating the Approximate Cost of Downtime
- Anyone for Partial Business Continuity?
- Business continuity and football clubs
- Loophole In Business Continuity Planning In The Finance Sector?
- Malware Threats and Your Business Continuity Plan
- Automation and Business Continuity Plan Best Practice
- What’s the Difference between Crisis Management and Disaster Recovery Planning?
- Disaster Recovery Plan Templates for Critical Data
- Small business crisis plans few and far between
- Business Continuity Plan Templates and the BCI 2012 Horizon Scan
- Business Continuity Good Practice Guidelines for 2022?
- Lessons from a Business School on Business Continuity
- ISO 22301 Societal Security for Business Continuity Management is coming
- MTO and RTO in a Cloud Backup Context
- Business Continuity Management for the Masses
- Is Social Networking now part of Business Continuity Plan Best Practice?
- Business Continuity Test Scenarios and Predicting What to Test
- Building Business Continuity into the Heart of a System
- How to get your Colleagues to use a Business Continuity Plan Template
- Human Beings in the Disaster Recovery Equation
- What do People Put into a Business Continuity Plan? What do They Leave Out?
- Maximum Tolerable Outage of Your BC Team
- Fail Early – a Mantra for Business Continuity Test Scenarios
- Business Continuity Planning and Vandalism
- The BIG business continuity plan from BCI
- Business Continuity Plan Best Practice and BCP Standards
- The Role of Social Media in a Crisis – BCAW Webinar
- Business Continuity Awareness Week – 19th to 23rd March 2012
- Going Mobile with Business Continuity Test Scenarios
- Business Continuity Plan App
- Smartphone Business Continuity Software
- Smartphone APP for Business Continuity Plan
- Maximum Tolerable Outage Alphabet Soup
- Half-Price Business Continuity Plan
- Business Continuity and Alternate Site Distance
- Isn’t my Insurance the Only Business Continuity Plan I need?
- Business Continuity Test Scenarios – the Game!
- Business Continuity Management in Your Business DNA
- The Challenge of Distributed Detail in Business Continuity Planning
- Pandemics and Business Continuity Plans
- Does a Business Continuity Consultant Interfere?
- Would Business Continuity Awareness Week Benefit from Remarketing?
- When the Private Sector Makes its Business Continuity Planning Public
- SMB Disaster Recovery Plan Templates and the 3P Principle
- Business Continuity Plans and Lessons Learned
- Disaster Recovery Plan – the Map is Not the Territory
- Rightsizing Your Business Continuity Consultant
- How Often Should A Business Continuity Plan Be Tested?
- Black Swans and Business Continuity Consultants
- Business Continuity Management or Leadership?
- Getting BC In Through The Virtualisation Back Door
- Primary Metrics For Disaster Recovery And Business Continuity
- Morphing DR Plans Into BC plans
- The Difference Between Disaster Recovery And Business Continuity
- Where Does Emergency Management Stop And Business Continuity Start?
- The Danger Of Disaster Recovery Overkill
- Minimising the impact of recession on how well you recover
- Benchmarking and business continuity
- Metrics, red flags and reality
- Business Continuity Management indicators – leading or lagging?
- Business continuity in the supply chain
- Innovation in business continuity plans
- Business Continuity After Customer Collapse
- Business Continuity Good Practice Guidelines 2010
- Virtualisation and Disaster Recovery
- The telecommunications industry and business continuity
- Disaster recovery and the domino effect
- Business continuity plan best practice – best for whom?
- What's your maximum tolerable outage?
- Business continuity test scenarios – do you have to “pull the plug”?
- Employee and Personal Impacts of a Disaster
- Business Continuity and Common Risks for Small Businesses
- Preparing for an exceptional event that happens every year
- How do you get the organisation to recognise the importance of Business Continuity?
- Cloud Computing and Business Continuity – Have we seen this somewhere before?
- OpsCentre goes to University
- Canberra Business Continuity Certification – Bringing Public and Private Sectors Together
- Getting real with CBCP – Certified Business Continuity Professional
- DRII Training Courses Available – CBCP
- Sydney Round Table Event – Testing Business Continuity Plans
- Careers at OpsCentre: Business Continuity Consultant
- Cloud Computing – "Too Much Redundancy Is A Myth"
- Cloud Computing – “Too Much Redundancy Is A Myth”
- Cloud Computing: Risky Business Round Table
- Business Continuity Awareness Week Events
- Japan Earthquake – Before and After
- Business Continuity Planning – More Than Just Disaster Recovery
- Advice for dealing with risks in public cloud computing
- OpsCentre has added an Events section to the website
- Don't have time for Business Continuity Management? Then why not outsource it!
- OpsCentre Roundtable Event – Managing Emerging and New Era Risks
- OpsCentre Round Table Event – Operational Risk – the convergence of People, Processes & Technology
- OpsCentre Round Table Event – Operational Risk – the convergence of People, Processes & Technology
- Be ready for everything and anything
- Business Continuity Best Practice Strategies – YouTube Video
- Introduction to Business Continuity Management
- Sydney's F3 Traffic Debacle has lessons for us in Business Continuity Management
- Sydney’s F3 Traffic Debacle has lessons for us in Business Continuity Management
- Key Supplier Resilience as part of Business Continuity Management
- Business Continuity Planning for Small to Medium Enterprise
- Compliance Management
- Business Continuity – Is your business 'Recovery Ready'?
- Business Continuity – Is your business ‘Recovery Ready’?
- OpsCentre offers complimentary Business Continuity Consultation
- Top 5 things to look for in a Business Continuity Consulting provider
- Business Continuity and Disaster Recovery Events Calendar
- What type of Business Continuity Recovery Site do you need?
- Are your service providers the weak link in your business continuity strategy?
- Business Continuity Terminology – What’s the difference between MTO, RTO and RPO?
- What is the difference between disaster recovery and business continuity planning?
- Is an outdated business continuity plan worse than none at all?
- Business Continuity Testing Isn’t a Pass or Fail Exercise
- Business Continuity Testing Isn't a Pass or Fail Exercise
Business Continuity Maintenance
Business Continuity Plan
- Combining Scenario and Impact Planning in Business Continuity
- CIOs warned to prioritise governance and business continuity
- Have you outgrown your paper-based business continuity and disaster recovery plans?
- OpsCentre offers Recession Buster ‘Quick Start’ Business Continuity Planning
- ‘Tis the season to get a Pandemic Plan in place
Business Continuity Software
Business Continuity Standards
Business Continuity Testing
Business Continuity, Pandemic
Business Impact Analysis
Business Interruption
Business Interruption News
Business Resilience
- Resilience and TICTF (Too Interconnected to Fail)
- Get Your Own Local Resilience Forum
- When the Resilience of the Web Comes Back to Haunt You
- Smart Power, Cheap Power… Safe Power? Smart Grids and Resilience
- Data Snooping and Privacy – Is There a Pilot in the Plane?
- How Well Does Your Company Password Policy Perform?
- What Constitutes National Resilience?
- OpsCentre Round Table Event – Cloud Computing: Risky Business?
- Roundtable Event – Building Resilence in your organisation – Is it really possible?
- Business Resilience and Agility
Cloud Computing
Crisis Management
Cyber Security
Disaster Recovery
- Decommissioning is Part of Disaster Recovery Planning
- How’s Your User Experience for Your Disaster Recovery?
- Towards Set-It-And-Forget-It Business Continuity
- Why Stop at Just Disaster Recovery with Your DRP?
- Decommissioning is Part of Disaster Recovery Planning
- Why Stop at Just Disaster Recovery with Your DRP?
- How’s Your User Experience for Your Disaster Recovery?
- Time to Get Your Disaster Recovery Plan Straight?
- Mind Your Language in Your Disaster Recovery Planning
- AI in Your DR – Should You, or Shouldn’t You?
- Disaster Recovery Failure with a Cyber Security Twist
- Should Disaster Recovery Be a Legal Requirement?
- Disaster Recovery and Human Error
- IT Security and Strange Mobile App Permissions
- Is World Backup Day Such a Good Idea?
- Extending to Long Range Disaster Recovery Planning
- Image Backups Help You Get Back in Business Faster
- Teachers and Role Models Falling Down on Disaster Recovery
- Does the Concept of Agile Recovery Make Sense?
- It is with Regret that the Demise of RAID 6 is Announced – for 2019 Precisely
- Active/Active IT Configurations and How HA and DR Work Together
- Disaster Recovery Forecast: Cloudy with Scattered Virtual Machines
- Disaster Recovery and the Pitfalls of ‘No Pain, No Gain’
- Pros and Cons of Virtual Tape Libraries
- Five Aspects of Usability to Integrate into Your Disaster Recovery Planning
- What Are Your Disaster Recovery Options if Your Data Storage Fails?
- When a Government Deliberately Stores Data Outside the Country
- Disaster Recovery and the Darker Side of the ‘Undo’ Function
- What’s Stopping People from Defining Their Own Recovery Objectives?
- How to Start Tackling a Big Web Threat – Cross Site Scripting
- Disaster Recovery and Technological Horrors
- The Ebola Disaster and Double-Edged Logistics
- Coffee-Shop Recovery Tactics for Today’s Enterprise
- Information Security – What Do You Think It’s All About?
- Have You Met the Recovery Consistency Objective?
- Where are the Holes? Turning IT Security Inside-Out
- Who is Responsible for Cloud Data Security?
- IT Security is Essential in the Cloud – But Which Cloud Do We Mean?
- Integrated Network Technologies Make Disaster Recovery Simpler (Sort Of)
- Penetration Testing: How Many Shades of Grey?
- “Data, Data, Everywhere, nor Any Drop to Drink”
- Disaster Recovery – Sometimes the Devil Really is in the Details
- Beyond Data Back-Up Requirements to E-Discovery Compliance
- Living Dangerously with Virtual Machine Mismanagement
- Disaster Recovery Services and Multi-Tenancy in the Cloud
- Disaster Recovery as a Service and the New ‘Not Invented Here’ Syndrome
- Continuous Data Replication – Is This ‘Goodbye’ to Your RPO?
- Tape Backup Developments – Death-Defying or Simply Better?
- Disaster Recovery Lessons from Radiology
- A Theorem for IT Disaster Recovery – But With Practical Application
- Emergency Management – Getting Ahead of the Social Media Test Curve
- Disaster Recovery, Horses for Courses and Other Metaphors
- A Quick Guide to IT Disaster Recovery Technology
- When You Just Know What the Next Disaster Will Be
- Why Server Virtualisation Is Not a Disaster Recovery Plan
- Data Deduplication Ramifications for Disaster Recovery
- What Disaster Recovery Planners can Now Expect for Data Storage
- A Startling Idea in Disaster Recovery (and Nothing to do with Technology)
- Security Risk Management – Standing Still is Moving Backwards
- Disaster Recovery – the Truth is Out There
- Disaster Recovery Set to Grow in the Cloud
- When Retail Giants Move into Disaster Recovery
- Disaster Recovery – How Would You Like to (Not) Pay for That?
- Disaster Recovery Planning and the Use of Automation Software
- WAN and Cloud Disaster Recovery: Look out for the Latency
- Virtualisation at the Heart of a Health Provider’s Disaster Recovery Planning
- Disaster Recovery can be a “Free” Consequence of Cloud Computing
- Disaster Recovery Tape Storage Myths
- Disaster Recovery Templates
- MTO and RTO inside and outside disaster recovery
- Disaster Recovery Repackaged for SMEs
- MTO, RTO… How about MTD (Maximum Tolerable Degradation)?
- Disaster recovery template mania?
- Alternatives to tape back-up
- Disaster Recovery and Interdependency
- Offsite Backup Tape Archiving for Disaster Recovery
- Validating your data backup plan
- Tape or Disk Backups? – Why not do Both?
- Is your Disaster Recovery plan up to scratch?
- News feature: Risky business
- Webinar: Disaster Recovery Planning & Testing – The Real Cost of Downtime
- Webinar: Disaster Recovery Planning & Testing – The Real Cost of Downtime
- OpsCentre's Disaster Recovery Video on YouTube
- Latest Global Disaster Recovery research just released by Symantec
DRII
Events
Governance
Information Security
- Threat Hunting Could Accentuate the Corporate Divide
- Even in Australia, Europe’s New Data Regulation Could Affect Your Business
- The Vulgarisation of IT System Hacking Could Be Good News
- Just Delete It – Destruction as an IT Security Strategy
- Dealing with Combined Mobile and Cloud IT Security Problems
- Enterprise Attacks that Start in Mobile Apps
- IoT Device Security Doomsday on the Horizon?
- Are Routers Open Doors for Hackers?
- Is It Time to Rename Malware as Sneakyware?
- BYOD, BYOT, BYOC, All One Facet of a Bigger Challenge
- Ransomware is so 2016 – The New Menace is Ransomworm
- Travelling at the Speed of IT Security
- At this Moment, Deep Inside Your System, an APT May Be at Work
- IT Security and the Worry About WordPress
- The Delicate Position of the Chief Information Security Officer (CISO)
- How Often Should Users Change Their Computer Passwords?
- Whaling? If Your IT Security Smells Fishy, It Probably Is
- Big Data Security Challenges Now and Into the Future
- ABS Census Attacked by DDoS
- Expanding ITIL to Cover the Whole DevOps Model
- Would You Reveal Your Password for Chocolate? For Even Less?
- Will Every IT Security Risk Now Be Followed by a Fake Risk?
- Cyber Criminals attack on Third Parties
- Have Data Protection, Can Travel – IT Security without Borders
- Will Buggy Releases Triumph Over Smart Mobile Architectures?
- Willie Sutton Logic and Cyber-Attacks
- Why BYOD Isn’t All Enterprise Security Gloom
- Are Cyber-Security Skills Due to Nature or Nurture?
- The (Non) Strategy of Australian Government Cyber Defence
- Proper Backups Can Beat Ransomware Attacks
- The Inherent Risks of payWave and PayPass Cards
- Nobody, but Nobody is Safe from Cybercriminals
- Hi, Can I Interest You in Some Second Hand Security?
- Employees vs. Employees – the Internal Battle for Data Security
- Should Mobile Device Data Protection Be Encouraged or Enforced?
- How Ready Do You Feel for Bring Your Own Encryption?
- Micro Answers to Expanding IT Security Perimeters
- IT Security and the End of Ivory Towers, Bolt-Ons and Bigger Fences
- IT Security, One Rotten Apple and a Whole Bad Barrel
- 3 Broad Categories of Cyber-Security Trends for 2016
- Data Encryption and Reputation Management
- Cryptographic Protection that Does Not Hide Your Information
- Password Salting may be Effective, but is it Healthy?
- How to Make It Through a Failed Security Audit
- Four Fatal Flaws in IT Security Flagged at Black Hat Europe 2015
- Is Your Toaster Spying on You? Security Concerns in the Internet of Things
- Employees are Still Unaware of the Need for Information Security
- Auditing Security in New Virtualized IT Environments
- How Printer Security Issues Have Been Creeping Up on Us
- The IT Security Risk on Your Wrist
- Time to Put Up Your Defences
- Diamonds are Forever and So (Unfortunately) Is Biometric Security
- How Are You Doing with Your Android Security?
- A Marketing Lesson in the Debate about AES 128 and AES 256 Encryption
- Backfiring Data Encryption or Being Hoisted by Your Own Petard
- Data Loss Prevention and the Insider Twist to IT Security
- I know What You’re Doing in My IT System from these Tell-tale Signs
- Patterns in Data Theft and What Organisations Should Look Out For
- The Pesky Human Factor in Password Resets and IT Security
- Hacking Yourself to Find Holes in IT Security Before Others Do
- What is Virtual Machine Side Channel Analysis and Why Should You Care?
- Putting the Cloud inside Your Company Firewall
- Androids, Apples, the Long Distance Wipe and Mobile Computing Security
- How much of an Iceberg are Data Security Issues Today?
- Information Security – Are Companies Giving Up?
Information Technology
- National Preparedness Month, World BackUp Day, and Change that Sticks
- Why IT Strategy Fails and What to Do About It
- Ethics and Your IT Sourcing Strategy
- Should You Have a Secret Agent for IT Asset Management?
- Four Steps to External IT Sourcing without Tripping Up
- IT Service Management as a Business Partner
- Seven Mistakes to Avoid in Planning Your IT Strategy
- IT Asset Management and Hardware Hoarders
- IT Service Management and Complete Recovery from Service Failure
- The Comeback of the CMDB for IT Asset Management
Innovative concepts
IT Risk Managment
IT Security
- Insiders, Still One of IT Security’s Biggest Problems
- Why the Internet is an Elephant
- Building a Kill Chain to Boost Your IT Security
- Linux the Unhackable? That All Depends…
- Cyber Security and Pointers from Criminology
- IT Security and the Unikernel – the Answer to Hackers and Attackers?
- The End of the Password (Again)?
- Why You Can’t Trust Anyone These Days
- Bad Habits Are the Worst IT Security Risk
- A Zero Trust State of Mind in IT Security
- When Bolted-On IT Security is the Only Option
- The Most Worrying Definition of the Blended Attack
- The Rise and Rise of the Insider Threat in IT Security
- What Will It Take to Kill Off the Password?
IT Service Management
- Steering a New ITSM Course with Container Management
- ITSM and Statement of Work
- ITSM and the Scourge of Server Sprawl
- IT Service Management, Your New Name is Marketing
- The Four, No… The Five “P”s of IT Service Design
- ITSM for All, Including Those Who Have Nothing to Do with IT
- IT Service Management, Meet Marketing!
- IT Service Management, Automation, and Erosion of Job Satisfaction
- IT Self Service Management is Not the Easy Option
- Adapting Your IT Sourcing to BYOD (or is that CYOD?)
- Cloud IT Sourcing via Brokers – A Solution Whose Days Are Numbered?
- ITSM and DevOps – A Win-Lose Situation?
- IT Service Management and Digital Transformation
Pandemic
- Zika and the Multi-Dimensional Development of a Pandemic
- Middle East Respiratory Syndrome – Is Carelessness or Ignorance the Bigger Problem?
- When the Best Response to a Pandemic is… Don’t!
- Ebola and the Ramifications of Pandemics You Should Consider
- Current Australian Preparedness against Ebola
- Ebola Outbreak – What Should You Know About It?
- Keep Your Pandemic Plan Updated in Case of MERS
- Israeli Super-Vaccine for Flu Reported
Research Polls
Risk Evaluation
Risk Management
- Risk Management and Proactively Dealing with Threats
- Risk Assessment Pitfalls to Watch Out For
- The Macro and the Micro of the Perfect Storm in Enterprise Risk Management
- IT Risk Management as Seen by the Man with the Black Swan
- IT Risk Management and Technical Debt
- 6 Pitfalls in IT Risk Management
- Outward-Looking Business Continuity
- Free Wi-Fi Spots Are Security Risks for the Unwary
- Risk Management for the Masses! Or At Least For Each Project…
- Look Who’s Doing Risk Management
- The Internet of Things and the Two Faces of Risk Management
- Are Company Boards Taking Risk Management Seriously?
Risk Managment
Training
Testimonials
- Julian Galliard, Manager – Risk and Compliance, Integral Energy
- Mark Hatton, Head of Delivery Management – Infrastructure Services, Telstra
- Peter Seymour, Head of Infrastructure Services – Fujitsu Australia
- Sam O’Brien, Manager – ISMS & BCP Programs, NSW Office of the Director of Public Prosecutions
- Wayne Ruckley, Executive Director IM&T (CIO), NSW Department of Justice