Disaster Recovery vs. Business Recovery – Business Continuity 101
A common point of confusion for new BCM practitioners is the difference between business continuity and disaster recovery. Though people often think these are synonyms, the distinction is that business continuity relates […]
What is Business Continuity? – Business Continuity 101
If you’re new to disaster recovery or risk mitigation, you might be overwhelmed with business continuity terminology. To start, what is business continuity? If you’re not sure, don’t worry. We’re going to cover […]
Balancing Automation with Third Party Risk
Before taking on any new process automation or software, it’s important to consider the third party risk associated with the new approach. Current market pressures and constrained resources, especially people resources, combined […]
The Benefits of a Business Continuity Program
We’ve mentioned multiple times that implementing a BCM program can be challenging and at times painful. No one likes to point out their business’s vulnerabilities. Many times the investment of time and […]
Staying Resilient in Today’s Threat Environment
With the increasing prevalence of IT hacks, intelligent business owners are becoming more aware of the importance of Business Continuity as a business skill. Staying resilient can determine the longevity of a business in […]
Common Insider Threats
Last week we discussed combating insider threats, beginning with identifying them. This is such an important subject, that we want to help you identify some of the most common insider threats. As a reminder, […]
Mitigating Insider Threats: 7 Steps to Keeping Your Company Safe
More than ever, your users are the weak link in your network security. Mitigating insider threats isn’t just about thwarting the malicious action of a disgruntled employee; a careless insider can also cause catastrophic […]
BC Practitioner’s Guide to IT Security Concerns
Within their organizations, business continuity (BC) practitioners should be advocates for an active approach to heading off threats to the company’s computing services. Today’s blog will lay out some of the concerns […]
Disaster Situations You Don’t Think Will Happen – But They Do
Disaster situations are uncomfortable to think about. Even the most pessimistic among us have been guilty of avoiding the discussion by saying things like “that won’t happen to us.” But that’s the […]
Ransomware Defense: Prevention and Preparation
Ransomware defense is often an uncomfortable subject where enterprises must face some hard truths and new responsibilities. Nevertheless, it’s becoming increasingly necessary. According to the FBI, there were an average of 4,000 ransomware […]
A Complete Crisis Management Program Is the Key to Recovery
Traditional crisis management is adjusting to the new “Always On” era. In this new landscape, it is critical to be proactive and adaptive in managing events that pose threats to your organization. An […]
Business Continuity Tools to Help Your BCM Program Succeed
Having the right business continuity tools can make the work you do on your BCM program easier and more consistent. In this post, we’ll explore categories of tools that will make your […]