The Human Side of Conducting BIAs
One of the most interesting engagements MHA Consulting had this year was at a Fortune 500 company where 3 of our consultants conducted approximately 100 BIAs. Over the course of that engagement, […]
Helping Your Employees Stay Safe When Using Non-Company Wi-Fi Networks
MHA Corporate Security Awareness Series In recent years a great deal of attention has been focused on the threat that hostile outsiders and disgruntled employees pose to companies’ data and computer networks. […]
The 5 Biggest IT Management Mistakes
Thanksgiving is as good a time as any to acknowledge the fact that some IT departments, when it comes to being able to restore their organizations’ data in the event of an […]
Data Integrity: Ensuring Your Critical Business Information Is Reliable and Recoverable
I am a big coffee drinker, so I naturally found it interesting last week when I talked to someone who told me about a persistent problem he had at a coffee shop […]
Protecting Your IT in the World of Decentralized Computing
The data breach at Equifax that was revealed in September affected up to 143 million consumers. It is considered one of the worst such breaches ever, based on the sensitivity of the […]
Overreacting: Don’t Learn the Wrong Lessons During a Disaster
A natural disaster can jumpstart your business continuity plans, but it can also do it more harm than good. Is your disaster response hurting you? Disasters like the one in Puerto Rico […]
Deciding Between Creating Your Own Enterprise BCM Software Or Buying Off the Shelf
As anyone who has ever braved the Saturday crowds in Home Depot knows, we Americans love to do things ourselves. In fact, our love of “do-it-yourself” is so great it has pushed […]
Monitoring Risk: Maintaining Your Risk Mitigation Strategies
You identified risks, then chose and implemented a mitigation strategy. You’ve decided whether you’ll accept, avoid, transfer, or reduce risk. Unfortunately, you have not completed the job. Monitoring risk, including tracking identified […]
Aligning Your ITIL Process With Your Disaster Recovery Plan
Aligning ITIL processes to your DR plan leads to more efficient and effective use of IT infrastructure. Inadequate planning is a risk to the business, and is often overlooked until it is […]