BCM Basics: How to Manage Your Business Continuity Documentation
This post is part of BCM Basics, a series of occasional, entry-level blogs on some of the key concepts in business continuity management. Quality documentation is the backbone of a sound business […]
Three to Get Ready: The 3 Key Areas of Business Continuity
Any organization that invests time and effort into improving its resilience is to be commended, but unfortunately many companies prioritize the wrong things in their business continuity endeavors. In today’s post we’ll […]
Healthcare Under Attack: Building Resilience in the Face of an Aggressive Cyber Threat
Healthcare organizations are uniquely vulnerable to hackers and are subject to more than their share of cyberattacks. In today’s post, we’ll look at the measures hospitals and other facilities that care for […]
At Risk of Distraction: The Seductive Appeal of RMIS Software
An emerging hot topic in business continuity and risk management is the software known as a risk management information system (RMIS). An RMIS can help an organization identify, assess, monitor, and mitigate […]
Rehearsing Plan B: The Importance of Mastering Your Workarounds
In terms of bang for the buck, not all business continuity activities are created equal. One of the most valuable ways BC practitioners can spend their time is making sure their organizations […]
Planning to Fail: 10 Common Mistakes Companies Make with Their BC Plans
Most organizations recognize the importance of having a sound business continuity recovery plan, but many plans are undermined by the presence of overlooked weaknesses. In today’s post, we’ll look at 10 mistakes […]
Zero Trust Security: What BC Practitioners Need to Know
Zero Trust is the emerging approach to network security that requires verification of all traffic, external and internal. Here’s what business continuity professionals need to know about the rigorous new security framework […]
Get Cyber Smart: How to Make Sure Recovery Plans Align with Information Security Needs
Recovery plans and strategies cannot be created in a silo. Instead, they should be developed in coordination with the cybersecurity department to ensure that recovery measures do not inadvertently create vulnerabilities that […]
Be a Hard Target: Train Your Employees in Security Awareness
Most organizations today are justifiably obsessed with cybersecurity, but many overlook their greatest IT vulnerability: their employees. The best way to strengthen a company’s defenses is by providing every employee with security […]
Recovering Right: How to Improve at IT Disaster Recovery
Far from relieving organizations of the responsibility of recovering their IT systems, today’s cloud-based and hybrid environments make it more important than ever that companies know how to bring their systems back […]
Safeguarding Your Computer Systems: How to Build an IT Disaster Recovery Team
The cost of not having an IT disaster recovery team can range from being unable to recover from a disruption, to overspending. In today’s post we’ll look at the right way to […]
Weathering the Storm: Tips for Coping with a Disrupted Climate
The current ongoing disruption in long-standing weather patterns means that organizations everywhere are at risk of being struck by punishing natural disasters. Today’s post looks at how companies can ensure they will […]