The Audit After: Compliance and Disaster Recovery

We all know the story. Calamity, large or small, befalls data center. IT scrambles to save the day by ensuring systems fail over rapidly and functionally. Nowadays, modern IT DR systems are, to a great extent, cloud-based. So the failover happens five seconds later to a data center at the cloud in, say, Houston. After… Continue reading The Audit After: Compliance and Disaster Recovery

The IT, Data Loss, High Availability Relationship

Information technology provides enormous value for organizations, but it can also represent a tremendous point of weakness. No matter your industry, data drives your business. And when markets are global, employees work around the clock and business is effectively always on. Any interruption to application availability can quickly lead to lost revenue, lost productivity, lost… Continue reading The IT, Data Loss, High Availability Relationship

Be Wary of Being Arbitrary When Choosing RTOs

Few business continuity (BC) tasks exceed the importance or visibility of determining the recovery time objective (RTO). Unfortunately, dysfunctional practices can creep into this process and cause “arbitrary” RTOs to be created. Three key examples of arbitrary RTOs include those which are “calculated,” “open-ended,” and “elongated.” For an arbitrarily calculated RTO, a BC planner uses… Continue reading Be Wary of Being Arbitrary When Choosing RTOs

Make A Connection

It’s not what you know but who you know. This business mantra has been around since the mid-1900s. Yes, way back before conferences, social media, e-mail, professional organizations, LinkedIn, instant messaging, and “friending” – savvy folks recognized that having a strong network is a key to success. Gone are the days of opening the Yellow… Continue reading Make A Connection

Ownership: Where Do Our Responsibilities Begin and End as Business Continuity Professionals?

One of the latest threats to organizations is something termed “ransomware.” Commonly defined as a type of malware that blocks access to an application and its data until the victim pays a predetermined amount of money. You may have read about two recent attacks, one targeting the Hollywood Presbyterian Medical Center and the other targeting… Continue reading Ownership: Where Do Our Responsibilities Begin and End as Business Continuity Professionals?