Gemalto yesterday released the findings of its Breach Level Index for 2016, which states that 1,792 data breaches worldwide led to the compromise of almost 1.4 billion data records last year, an increase of 86 percent over the previous year. Identity theft...
Sure, malware’s a persistent pain. But IT security pros today have other things on their minds. Carbon Black, a Waltham, Mass. security vendor, recently polled 400 cybersecurity researchers. The majority of them, 93 percent in fact, said that non-malware attacks...
Tens of thousands of policyholders caught in a disaster in 2016 were better able to recover from the losses and hardships inflicted thanks to insurance. Global insured losses from catastrophes totaled around $54 billion in 2016 – the highest level since 2012,...
Is there a case for blockchain in your organization? Cutter Business Technology Journal contributing authors Steven Kurshand Arthur Schnure recently argued that companies should begin considering which parts of their organization might benefit...
According to a recent Kaspersky Lab report, attackers who demand a ransom in return for not launching a DDoS attack (or to call off an attack in progress) can earn thousands of dollars in bitcoins, enabling the profitability of such attacks to exceed 95 percent....
While data backup and replication have their similarities, they are not the same, and rather than competing with one another can be used as complimentary tools to maximise the efficiency of an IT environment. Data backup is the process of taking a...
“Give me your gut!” (as in “gut feeling”) has long been the cry of business continuity management in meetings, trying to make sense of complex situations or cut through to the essentials. Gut feelings are nonetheless only as good as...
As I’ve said many times, cybersecurity seems to be more about reacting than acting or being proactive. Now, a new study by 1E found that, in fact, IT professionals spend a third of their time reacting to emergencies. Nearly 30 percent of the IT tasks are...
More than 30,000 people in low-lying coastal areas have been urged to evacuate their homes ahead of powerful Cyclone Debbie, as it bears down on the Queensland coast in northeastern Australia. With landfall expected early Tuesday, Cyclone Debbie is currently a...
IRVINE, Calif. – Vision Solutions, a leading provider of business resilience solutions for IBM Power Systems, published episodes two and three of its “Power Talk” podcast. Episode two features a conversation with guest Larry...
New Ransomware Prevention Checklist Provides Actionable Steps to Recover from and Prevent Costly Cyber Attacks SUNNYVALE, Calif. – Zetta, a leading provider of high-performance business continuity solutions, today released a new...
New Release Incorporates Industry-Unique Modular Architecture Consisting of High Performance Disk, Cloud and Optical Tiers with Unrivaled Performance and Capacity – At a Price Comparable to Tape COLORADO SPRINGS, Colo. –Alliance Storage...
We have been a fan of the Incident Command System (ICS) since the 1990s. It was created in my fair state – California – to manage wildfires. Everyone realized early on, it had many more uses that just the fire service. It it now required for all...
You lock your home—now lock your network. This means having a reliable and secure data center and following basic safety rules, like locking down ports, shutting off services, removing rights and privileges when no longer justified, and using firewalls....
A man drives a car into pedestrians on Westminster Bridge, keeps driving, crashes the car outside the Houses of Parliament, then tries to enter the complex armed with a knife. Four people are dead, including a policeman and the assailant, and at least 40 injured....
Back in 2015 the world was captivated by the Universal film “Jurassic World”. Viewers praised Chris Pratt’s performance in this science fiction thriller, but were more entertained by a different kind of hero. During a pterosaur attack causing resort...
In theory, BYOD or bring your own device lightens the load in terms of IT sourcing, because it transfers the work (and cost) of acquiring a device to the user of that device. Users are happy because they can use the devices they favour, while IT...
Application and Portal Make High Performance Disaster Recovery Available to Everyone DENVER – Agility Recovery, North America’s premier provider of business continuity and post-disaster recovery solutions, today announced myAgility 3.0, a...
Intergate.Quincy facility receives federal EPA ENERGY STAR® certification for superior energy efficiency with the highest possible green score SEATTLE, Wash. – Sabey Data Centers, one of the largest privately-owned data center owners,...
Integrated solution helps organizations gain visibility, take action and assume control over personally identifiable information under management MOUNTAIN VIEW, Calif. – Veritas Technologies, the leader in information management, today unveiled an...
Whether you’re looking to hire a business continuity expert, or you’re training to become one, this guide will help you determine the qualifications and experience that are required Before we get into certifications or BCM specific qualifications,...
Got data? But more to the point, got the RIGHT data, and now? Low-friction and fast access to data are top priorities for data/analytics and marketing professionals in 2017. Here’s the picture of priorities: It’s a high or critical...
The concept of cyber threat intelligence is really not much different from other areas of the intelligence field. In national security, intelligence gathering techniques seek to detect potential situations and draw conclusions that enable people to take action before...
(TNS) — Communities across Ohio on Wednesday will be testing tornado sirens as part of a drill for the Emergency Alert System. The sounding of the sirens, which is set for 9:50 a.m., is part of Severe Weather Awareness Week, which runs through March 25,...
DURHAM N.C. — If local building officials notified you that your home is substantially damaged, you may be able to receive funds to make your structure safer and stronger. If you are rebuilding or repairing a substantially damaged home or business, your...
Passwords remain one of the most critical security controls widely used to protect and secure company infrastructure and data. While the need for strong passwords has long been discussed, they continue to be the difference between a secure infrastructure and a...
State Health Services Reinvents Way Cancer is Treated with Secure Remote Access to Patient Data SANTA CLARA, Calif. – Citrix today announced NSW Health, a leading Australian public health provider, has rolled-out a range of Citrix technologies empowering...
NEW YORK – Accenture (NYSE: ACN) has acquired Focus Group Europe, a United Kingdom-based, privately owned, ServiceNow® consulting services provider and software reseller that is one of the largest remaining pure-play ServiceNow consulting partners in the UK....
Together, AppDynamics and Cisco will give customers comprehensive visibility from code to consumer and everything in-between SAN JOSE, Calif. – Cisco (NASDAQ: CSCO) today announced that it has completed the acquisition of AppDynamics, a leader in application and...
SAN ANTONIO, Texas – To align with Red Hat’s recent lifecycle support changes, Rackspace is now offering both a “long-life” and “standard” version of managed services support for Red Hat OpenStack Platform in its Rackspace...
The Business Continuity Institute – Mar 22, 2017 12:11 GMT Password leaks from public breaches help us learn how people think, allow us to identify patterns and build dictionaries of passwords. As password cracking methods evolve, Upper characters, Lower...
Sabey Customers Gain Access to Next-Generation Cloud Networking Services and Secure, Terabit-Scale Connectivity SEATTLE – Sabey Data Centers, one of the largest privately-owned data center owners, operators and developers in the United States, today...
Recovering from a ransomware attack is costly and time-consuming, so it’s vastly preferable to avoid an attack in the first place. And the easiest way to prevent a ransomware attack is to understand how the malware works. The goal of ransomware authors is to get...
No matter how scaled-out, hyperconverged or abstracted data center infrastructure becomes, one element remains the same: Servers need high-speed access to vast amounts of storage. This produces a paradox, however, because as more storage comes online, it takes longer...
Cybersecurity isn’t just about securing the data on the network. It’s about securing the data anywhere on any endpoint, on any device, on any application. An incident from last week put the importance of endpoint security front and center. A Secret Service...
BATON ROUGE, La. – An additional $6.6 million will help schools devastated by the August floods move forward with repairs and rebuilding efforts. This brings the total to nearly $67 million FEMA has obligated for schools. FEMA’s Public Assistance (PA)...
While large enterprises and high-tech startups instigated the SaaS infrastructure revolution and primarily benefited from it, many mainstream small-and-medium-size businesses (SMBs), sole proprietors and “mom-and-pop” retailers may feel like they got left...
It’s the first day of Spring and here in New Jersey we’re expecting a balmy 50 degrees Fahrenheit. Rising temperatures + snowmelt = flooding. NOAA’s Spring Outlook calls for moderate to major flooding in northern North Dakota and in the Snake River...
Vendors like to go to the movies, meaning they like to see their products and logos in Hollywood productions, and are usually prepared to pay for the privilege. Cars, computers, canned beverages, you can surely think of examples you’ve seen, as heroes, heroines,...
NEW YORK – Accenture (NYSE:ACN) is launching a High Velocity Sourcing and Procurement solution to help organizations address procurement challenges and reap the benefits of excelling across multiple procurement dimensions at speed, while minimizing risk....
Continuous monitoring of user activity with Netwrix Auditor enables Henry County Hospital to streamline compliance efforts IRVINE, Calif. – Netwrix Corporation, provider of a visibility platform for data security and risk mitigation that enables healthcare...
Privacy is a human right, and at the core of the privacy principles is Article 8 of the European Convention on Human Rights. In the new digital world, where information-sharing is prevalent, the need to protect individuals’ privacy is important, but we are...
I don’t know about you, but this spring break is different in my family. My daughter, who has almost finished her first year at a liberal-arts college, came back for spring break with the big question “Mom, what major should I choose?” Of course, as...
DENVER – Flooding is the most common natural disaster in the United States. Already there are reports of localized flooding in states across the Rocky Mountain region—and the upcoming snowmelt means there is potential for even more serious flooding....
In a past life I was a system administrator, or “sysadmin”. I enjoyed it, but even in those halcyon days of remoting into servers and driving to the office at 2 AM (hoping the server room wasn’t on fire), I knew I had a limited shelf life....
Cyber attackers have already waged attacks on Internet of Things (IoT) devices to build massive botnets and launch crippling distributed denial-of-service (DDoS) attacks, knocking websites and online services offline. IT security professionals now fear that the rise...
The enterprise is anxious to automate as much of its data ecosystem as possible, starting with the cloud. But is automation the best solution for every challenge, and if not, how can enterprise executives determine what should be automated and what should remain under...
FatPipe’s SD-WAN platform, in Version 9, represents the first fully integrated and scalable SDN and SD-WAN product on the market SALT LAKE CITY, Utah – FatPipe® Networks, the inventor and multiple patents holder of software-defined networks for...
RK Emergency Management Support LLC Established To Spearhead Contingency Assistance, Building on Service Experience With Emergency Food and Shelter Operations Mobile Kitchen, Part of the Fleet of Dedicated Response Vehicles “The service capabilities that...
If you haven’t noticed lately, risk management is going through a global transformation wherever you look! The COSO ERM framework is being revised with a new tagline, Enterprise Risk Management – Aligning Risk with Strategy and Performance. Dennis...
This post is short and sweet, but very important. Most of us are drawn to new tech toys, but at the same time, we resist change. We want the latest and greatest, and yet a part of us resists the added security responsibility that comes with new technology. This is...
If you’ve been following my research, you know I like to divide the business world into three categories of company: Digital Predators successfully use emerging digital technologies to gain market share and/or displace traditional incumbent companies (e.g.,...
Cloud services are becoming the main part of the infrastructure for many companies. Enterprises should pay maximum attention to security issues, moving away from typical approaches used in physical infrastructures, which are often insufficient in an atmosphere of...
Ransomware has experienced a meteoric rise over the last two years, and I contend that it is due for a meteoric fall. Here’s why: As unlikely as it may seem, Ransomware relies solely upon trust. Many of the criminals behind ransomware appear to have an...
The Latin American Veeam ProPartner Program recognizes 21 Veeam partners who have demonstrated outstanding performance in delivering Availability solutions across the region; celebrates 63 percent YoY revenue growth across all partner levels BAAR, Switzerland...
Omega’s NorthFace ScoreBoard Award Spotlights Company’s Ability to Exceed Customer Expectations for the Fifth Year in a Row NEW YORK – CA Technologies (NASDAQ: CA) was again named a recipient of the NorthFace ScoreBoard AwardSM from Omega...
New HPE Apollo System supercomputer will help BASF reduce computer simulation and modeling times from months to days LUDWIGSHAFEN, GERMANY and PALO ALTO, Calif. – BASF SE and Hewlett Packard Enterprise (NYSE: HPE) today announced that the companies will...
March 14, 2017 | Patrick Potter Do you ever use the term, ‘you are creating a tempest in a teapot’? It means, don’t make a big deal out of something that isn’t. Doing a little research, I found other similar phrases I...
From time to time, an anecdote comes across our desks that, as researchers, we find hard to leave alone. A few months ago, one of these opportunities appeared, and we thought it might be interesting to lift the hood, and show you how we dig into tough research...
Big Boss calls you into his office and gives you the quarterly revenue number he wants you to report. He tells you “this is the number, now go make it happen.” What options do you have here and what consequences are you willing to accept in this...
Although most organizations have contemplated – to some degree – the what and how of business continuity plans, including discussions about the stability of the IT system and what to do if the company’s facilities or IT infrastructure are...
(TNS) – Water pollution and mudslides could be the next major problems facing Gatlinburg three and a half months after a deadly firestorm swept through the city, according to two experts who spoke during the emotional public forum portion of a City Commission...
A recent KnowBe4 survey of more than 500 organizations found that 33 percent of respondents experienced a ransomware attack in the past year — and 53 percent of organizations with multiple solutions in place to block ransomware still become victims. Seventy-two...
PARIS – Orange Business Services is strengthening its hybrid network offering with software-defined wide area network (SD-WAN) technology from its partner Riverbed Technology. The new solution will enable Orange customers to simplify the management of their...
NEW YORK & SAN FRANCISCO – Accenture (NYSE:ACN) and Docker today announced an expanded global alliance and the availability of container services within the Accenture Cloud Factory, providing industrialized solutions for enterprises to accelerate their...
HONG KONG, CHINA – This March marks one year since Trend Micro Incorporated (TYO: 4704) (TSE: 4704), a global leader in cybersecurity solutions, closed the acquisition of TippingPoint from Hewlett Packard Enterprise. In the first year of integration, Trend...
4C Strategies 4C Strategies has been chosen to be part of the delivery of the new Unit Based Virtual Trainer (UBVT) to the British Army. UBVT will enable units to collectively practice fire and manoeuvre, command and control, and tactics, techniques and procedures in...
TEL AVIV, Israel – Atidot announces the launch of the first SaaS (software as a service)-based predictive analytics platform specifically designed to address the needs of the life insurance sector. Atidot’s innovative Big Data modelling and decision making...
Jim Tagliaferri CMO and Blog editor for Strategic BCP Strategic BCP’s software innovators, enterprise consultants, customers, and partners will soon be heading to sunny Orlando for DRJ Spring World 2017 at Disney’s Coronado Springs Resort. We are...
(TNS) – York and Cumberland counties are under a blizzard warning as a massive nor’easter arrives in Maine with blustery winds and snow. Snow started falling before dawn Tuesday in York County, part of a potentially crippling storm stretching from...
Can you describe the differences and benefits of the BIA and Risk Assessment? Today’s short blog may help you provide answers when the questions arise. You just spent time completing a Business Impact Analysis (BIA), taking 2 to 3 hours per department. Now...
BATON ROUGE, La. — In the 12 months since the March severe storms pummeled and flooded much of Louisiana, the Federal Emergency Management Agency (FEMA) has helped thousands of people begin to recover. Along with its federal and state partners, the agency has...
DENTON, Texas ––New flood maps for Grant County will become effective July 18, 2017. County residents are encouraged to view the maps before the effective date to understand their flood risk. Most property insurance policies do not cover the...
Passwords are the most common authentication tool used by enterprises, yet passwords are notoriously insecure and easily hackable. End users tend to be careless with passwords, frequently reusing or sharing their passwords. This is true even among technologists, with...
New software for monitoring the probability of earthquakes in a targeted location could help energy companies determine where they can operate safely. The free tool, developed by Stanford University’s School of Earth, Energy & Environmental Sciences,...
Most likely snowfall for #Blizzard2017 in the NY/NJ metro area now looks like this, per the National Weather Service New York: While major cities in the Northeast may have been spared blizzard conditions, a strong winter storm is still unfolding and inland areas are...
The Business Continuity Institute Identity fraud has hit the highest levels ever with 172,919 identity frauds recorded in 2016, more than in any other previous year. The study by Cifas showed that identity fraud now represents over half of all fraud recorded in...
Ensures “Life is On” across Israel with early warning notification of equipment problems to reduce unscheduled downtime Monitoring and Diagnostics Services Center offers best practice advice and start up services for ease of rollout LAKE FOREST,...
Rise in nation-state and ransomware attacks seen as increasing risk to national critical infrastructure, according to new research from Trend Micro DALLAS – Latest research from Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in...
New Engine Delivers 300% Performance Increase and Dynamic Mobile Alerting Based on Proximity to Critical Events BURLINGTON, Mass – Everbridge, Inc. (NASDAQ: EVBG), a global software company that provides critical event management and enterprise safety...
Does Your Business Continuity Program Measure Up? Audience Those with business continuity management program experience, internal auditors, and consultants. Wondering how your BCM program aligns to ISO 22301? Looking for a way to...
Omry Farajun first got into the online storage game before there really was much of an online storage game to speak of. When he launched Toronto-based Storage Guardian in 1999, Farajun recalls how converting a sale meant convincing customers in the value of backing up...
HATTIESBURG, Miss. – If you’re a survivor of the severe storms and tornadoes in January, you have two weeks to register for possible disaster assistance and to return applications for low-interest disaster loans to the U.S. Small Business Administration....
A recent CyberEdge survey of 1,100 IT security decision makers and practitioners across 15 countries found that fully 61 percent of respondents’ organizations were victimized by ransomware last year. Among those hit by ransomware, 33 percent paid the ransom to...
Replacement program to extend the service life of capacitors for Liebert® Series 600T/610 UPS units COLUMBUS, Ohio – Vertiv™, formerly Emerson Network Power, today announces a joint effort with SBE Inc., a leading developer of film capacitor...
Cisco Application Centric Infrastructure (ACI) provides powerful policy-based, programmable automated architecture SAN JOSE, Calif. – Cisco (NASDAQ: CSCO) announced that Navisite, LLC., a part of Spectrum Enterprise and an international provider of managed...
Warning: this article may upset some conservative risk managers. Risk management in modern nonfinancial companies is very different compared to, say, five years ago. The level of risk management maturity, for lack of a better word, has grown significantly. As...
With big data, analytics, social, mobility, cloud and IoT driving the move to Digital Transformation–also known as DT, digitalization, DX, DE (Digital Everything) and Industry 4.0–IT is moving from the back office to business enabler. However, all the...
Enterprises looking to scale out their own data infrastructure quickly run into a problem: While more computing and networking capacity can be squeezed out of existing hardware, storage cannot. Sure, you can make improvements to I/O, IOPS, management capabilities and...
When most people think of product contamination and recalls, the first thing that comes to mind is food poisoning cases from bacteria such as e-coli and listeria. Food and drug companies, however, are experiencing malicious and intentional product tampering that can...
Technical Alliances Program Extends the Successful Zerto Alliance Partner Program to Tech Companies – with Tools and Resources to Help Grow Mutual Customer Base BOSTON – Zerto, an award-winning provider of cloud IT resilience solutions, today announced its...
The Business Continuity Institute Implementing a Business Continuity Management System which meets and exceeds ISO 22301 is a challenging, but important undertaking for an organization committed to business continuity. I have recently been leading a project...
KEMP, Texas – Larson Electronics, a company that specializes in industrial grade lighting equipment, has announced the release of a Class II LED strobe beacon equipped with a motion sensor that has a user adjustable time delay. The SLEDB-110V-MS LED strobe...
(TNS) – Yellow fever has broken out in the jungles outside Brazil’s most densely-populated cities, raising a frightening but still remote possibility: an epidemic that could decimate that country’s population and spread throughout the Americas,...
If you already belong to a high-performing DevOps organization and you are working on leveraging opensource for monitoring to drive feedback loops, or delivering better security with DevSecOps, or making sure you are understanding continuous testing then you...
Everyone from the CEO to the mail room wants the same thing from IT—quality services, delivered reliably. More and more that means that IT operations must rely on automated tools to support ITSM processes within the organization. Let’s take a look at...
DALLAS – For Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, the saying is true, “everything is bigger in Texas.” Today, the company announces the opening of the newest Trend Micro office in Austin for its...
STAMFORD, Conn. – Pitney Bowes Inc. (PBI: NYSE), a global technology company that provides innovative products and solutions to power commerce, today introduced a new data practice to help businesses accelerate their digital transformation initiatives. This new...
HARRIS COUNTY, Texas – The Emergency Management Association of Texas (EMAT) honored the Harris County Office of Homeland Security & Emergency Management (HCOHSEM) with the Excellence in Emergency Management Award at its annual symposium held this week in San...
The new data economy isn’t about data; it is about insights. How can I increase the availability of my locomotive fleet? How can I extend the longevity of my new tires? How can I improve my on-time-in-full rate? Which subscribers are most likely to churn in the...
Salt has been around since the beginning of time. A preservative, a food enhancer and in early times was as valuable as precious metals and even drove humans to war! And now, new research suggests that salt may be heading towards a new life…a star...
Riverbed helps global manufacturer set a new standard in application and network performance SAN FRANCISCO – Riverbed Technology today announced that Switzerland-based BOBST Group, a leading global supplier of equipment and services to the packaging and...
Rackspace brings Fanatical Support to Google Cloud Platform Customers SAN ANTONIO, Texas – Rackspace® today announced a strategic relationship with Google Cloud to become its first managed services support partner for Google Cloud Platform (GCP). Google...
Highest Ranking to Date at No. 12 as Firm Marks 120th Anniversary NEW YORK – KPMG LLP, the U.S. audit, tax, and advisory firm, tops the Big Four public accounting firms for the third consecutive year on FORTUNE Magazine’s 100 Best Companies to Work...
MIMIX for AIX family offers enhanced replication, easier management and monitoring, and expanded platform support IRVINE, Calif. – Vision Solutions, a leading provider of business resilience solutions for IBM Power Systems, announced today the availability of...
Challenge Enables Unprecedented Access to Data and Tools from Leading Companies to Generate New Climate Solutions NEW YORK – Global Pulse, the United Nations innovation initiative on big data, and Western Digital Corporation (NASDAQ:...
Continuous monitoring of user activity and data access provided by Netwrix Auditor enables Palmer College to comply with HIPAA, PCI DSS and FERPA regulatory standards IRVINE, Calif. – Netwrix Corporation, the first vendor to introduce a visibility and governance...
The Business Continuity Institute The impact of extreme natural disasters is equivalent to a global $520 billion loss in annual consumption, and forces some 26 million people into poverty each year, a new report from the World Bank and the Global Facility...
Those of us with feet on the ground understand the value BIA (Business Impact Analysis) data brings when it comes to strategy development and prioritization, but how can we convince resource/financial decision makers and project stakeholders to approve a BIA? Almost...
What used to be IT sourcing at the physical system level is turning into an exercise at the virtual cloud level, but with a new actor, the cloud broker. In theory, the cloud solves many IT sourcing problems, of which one of the most obvious is the requirement for...
DURHAM, N.C. – Severe weather can happen any time of the year. In North Carolina, the first full week of March is designated as Severe Weather Preparedness Week, a time when residents are urged to develop or review and update their family emergency plan....
At a loss of more than $6 billion annually, experts have found fraud occurs in most organizations, but 80% of respondents to a recent survey by ACL believe their organization has “medium to no” exposure. The 2017 Fraud Survey of more than 500...
DENVER – There’s a hidden threat that strikes countless unprepared Americans each year – flooding. Unlike fire, wind, hail or most other perils, flood damage is not covered by a homeowners’ policy. An uninsured flood loss can undo a...
BATON ROUGE, La. — If your home or business was substantially damaged in the August flooding, you may qualify for additional assistance, Increased Cost of Compliance (ICC), to elevate a structure to meet local floodplain-management regulations. Your National...
The working world has tipped the balance in favor of flexibility DALLAS – Latest research commissioned by Regus, the flexible workspace provider, shows that over half of workers in the United States now work from outside their company’s main offices for...
Permabit delivers on its promise to maximize density and lower TCO for on-premises and cloud-based deployments CAMBRIDGE, Mass – Permabit Technology Corporation today announced General Availability (GA) of Permabit Virtual Data Optimizer (VDO) Release 6 for its...
Not all emergency communication software is created equal. Here are four tips to help you choose the best system for your organization There are several emergency notification software vendors who offer a variety of features and functionalities that organizations can...
The Business Continuity Institute The effects of ransomware attacks on organizations can cause unquantifiable financial cost and immeasurable data loss. Yet, despite this, there is a lack of awareness when it comes to being prepared. A study conducted by Timico...
BATON ROUGE, La. — The August floods that upended the lives of tens of thousands of families across 26 declared parishes also washed away the landmarks of their communities. Critical infrastructure like roads, bridges, public buildings and schools proved as...
Hattiesburg, Miss. – While Mississippi survivors could not stop the January 20-21 severe storms and tornadoes from hammering Forrest, Lamar, Perry and Lauderdale counties, there is plenty those with losses can do – with the help of state and federal...
In this age of big data, business analytics are likely to form an increasingly large part of business continuity planning and management. By querying different data sources, internal and external to an enterprise, BC managers can hope to identify current risk,...
Recently, I have been attending quite a few meetings regarding contingencies required for the implementation of a large project initiative. Because it’s a new initiative and many users aren’t even assigned an ID yet to use these new systems and...
New Release of DataSphere Software Automates the Flow of Data to Maximize Performance and Savings Across Scale-out NAS Workloads, Easily Integrates Existing Storage with the Cloud, and Provides File and Client Visibility Across Different Vendors’ Storage Systems...
The Business Continuity Institute It has been just over two years since I was featured in the Business Continuity Institute’s ’20 in their 20s: The future of business continuity’ publication, so I thought it might be useful to look through what...
Fully 47.48 percent of all phishing attacks last year were aimed at stealing victims’ money, a 13.14 percent increase over 2015, according to Kaspersky Labs’ Financial Cyberthreats in 2016 report. Of almost 155 million attempts to visit phishing pages that...
(TNS) – Nearly two years after a rash of earthquakes rattled the sensibilities of North Texas residents and state lawmakers, a meticulously designed network of seismographs is being rolled out to determine if the tremors are occurring naturally or can be linked...
India was ranked 40th in the latest Corruptions Perceptions Index report by Transparency International. It appears that the recent reforms and regulatory actions did not have an impact on the perceptions influencing India’s CPI rankings. With Indian...
When Violin Memory, a pioneer in sold state storage arrays, made a Chapter 11 bankruptcy filing and announced an asset sale in December it marked another milestone in the company’s slow decline. At its IPO in 2013 the company was valued at $162 million,...
The Business Continuity Institute – Mar 06, 2017 14:23 GMT The majority (68%) of small business owners in the United States don’t have a written disaster recovery plan, even though about half (49%) said it would take their business at least three...
Andrew ScottSenior Communications Manager at the Business Continuity Institute (BCI) What are the threats facing your organization? As a business continuity or resilience professional, what is it that concerns you the most? For the majority of people, it is the...
Realtime Disaster Protection: Instant Disaster Recovery AUBURN, Calif. — ioSafe, a leading provider of data storage and business continuity solutions, today announced the release of the ioSafe Server 5: the industry’s first fireand waterproof server...
BATON ROUGE, La. — More than $1.78 million in federal assistance has been approved by FEMA to help survivors of the February tornadoes recover from the devastation. While assistance is tax-free and grants don’t have to be repaid, FEMA urges you to use the...
Many of our clients have migrated to the cloud and one of their first reasons for doing that is reliability and security. But nothing is perfect and you still need a solid recovery strategy regardless. The recent Amazon outage reinforces that strategy....
You defend your home, you defend your car, and it’s important you do the same for your network and all the resources it encompasses. How to defend your network? The most basic defensive tools include anti-virus and anti-malware software, which should be present...
(TNS) – Residents of communities in north-central Illinois on Wednesday determinedly began the process of putting their towns and lives back together after tornado-producing storms a day earlier left one man dead, several injured and dozens of buildings leveled....
A recent BigPanda survey of more than 1,500 IT professionals across a wide range of industries found that 82 percent of respondents said successfully hiring and retaining qualified staff members is a key concern for the coming year. While 53 percent of respondents...
On February 28, 2017, many internet sites and business services suffered disruptions. Some early speculation that it was another hack like the October DDOS attack on Dyn. The reality was less nefarious but nonetheless far-reaching. Amazon’s AWS unit soon...
A while ago, we asked in this blog if World Backup Day was really a good idea. Our logic? If everybody focuses on one day in the year to get their backups right, then spends the other 364 days ignoring the issue, things won’t change for the better. National...
Cloud providers are quickly scaling up their serverless computing capabilities in their efforts to capitalize on the growing demand for enterprise-class services. But is this something the enterprise should embrace to a significant degree? And are there risks to...
Lone Worker Safety – What Does it Mean? Not every employee has the benefit of working with peers. Some are lone workers who do their jobs pretty much solo without coworkers or even supervisors nearby. Contractors, field workers, home health care nurses, social...
Emergency Notifications Then and now If we are old enough, we can think back to the time when emergency notifications at work were fire alarms, overhead speaker alerts, and possibly a phone call with an automated message. These are also the days when most of us drove...
Some 70% of companies have experienced at least one supply chain interruption during the past year, with an unplanned IT or telecommunications outage the leading cause, according to the eighth edition of the Business Continuity Institute’s (BCI) Supply Chain...
Learn to select from today’s wide range of DRaaS providers, including what questions to ask and how to be sure they fit into your overall recovery strategy The use of various “cloud” technologies is becoming increasingly popular and is often part of...
Together we can do more, so the saying goes. Collaboration with other organizations or people can be a powerful tool to achieve great things in business. A new standard has just been published to help businesses do just that. The benefits of collaboration, in...
DENVER – As winter comes to a close, communities look forward to the coming of spring and a return to the warm outdoors. But it’s also a time to be aware of the threat of Mother Nature, meaning severe storms and flooding. Rapid snowmelt or a couple...
Florida has opened its market to private flood insurance, and there has been some activity in that area. Most plans have been National Flood Insurance Program (NFIP) clones in that they mimic how the NFIP prices risk but introduce a lot of underwriting rules to...
You never want to read about an internet security company that “accidentally leaked” sensitive data but that is apparently what happened. Cloudflare, Inc. is a U.S. company that provides a content delivery network, security as a service, Internet security...
Sometimes, IT can teach business a thing or two. In a recent survey on private cloud computing use, there was a statistic on the use of multipathing. Based on data collected from more than 100 private cloud environments, the statistic showed that 96% of the...
by Tom Jackson, Senior Training Advisor, CDC Division of Strategic National Stockpile Tom Jackson touring proposed medical material storage site in Yaounde, Cameroon in March 2015. In the United States, most of us take it for granted that if we need...
Achieves Certification to Further Mitigate Risk in Third Party Privacy, Security and Compliance for New and Existing Healthcare Customers SAN ANTONIO, Texas – Rackspace® today announced that it has earned Certified status for information security by the...
With the active shooter threat increasing in recent years, it has never been more important for organizations to be prepared. What’s the best way to prepare for an emergency? Run exercises and drills. In this white paper, Designing an Active Shooter...
Companies to Provide Validated Docker Solutions on Cisco UCS and Container Automation with Open Source Cisco Contiv SAN JOSE, Calif. – Today, Cisco (NASDAQ: CSCO) and Docker Inc. announced a strategic alliance for worldwide engineering, sales and support to...
Case Study: Black Hills Energy As a natural gas and electric utility, Black Hills Energy requires 24/7 access to critical IT/business systems to deliver trusted service to over 1.2 million customers across eight states in the Midwest and Mountain West. The company...
The company leads the industry training more than 400 Technology Partner Technicians and over 6,000 Public Safety Professionals Airbus DS Communications, a leading public safety communications provider, announces the opening of its new training center in the...
ISO 22301 Lead Auditor is a 5-day instructor-led course that teaches the principles and practices of independent auditing of a BCMS and guides the student through the audit process using a balance of formal instruction and practical case study activities. ...
Riverbed SteelFusion surpasses 1,000 customers and delivers more flexibility to help IT organizations manage the complexity of hybrid cloud architectures SAN FRANCISCO – Riverbed Technology today announced Riverbed® SteelFusion™ 5.0, which includes new...
ISO 31000:2009 on risk management is intended for people who create and protect value in an organization by managing risks, making decisions, setting and achieving objectives and improving performance. The standard’s revision process discovers the virtues of...
Recent Comments