As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.

Please reset your password to access the new
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In

Create new account
(it's completely free). Subscribe

Six months ago, a major U.S. health insurance leader was breached by hackers who stole access to records of upwards of 80 million customers. The stolen data comprised of names, birth dates, social security numbers, home addresses, email addresses, and employment history and other personal information. This attack was reportedly linked to Chinese hacking campaigns. The cyber attacks could have been occurring for a long period of time, exactly how long is unclear, but some estimate for months. Very alarming, but as in much situations of data breach, it can take a while to weave through the bits. The highly-skilled…

November 13, 2019 – Staffing the Expertise you need at the Right Time and Cost Flexibility


October 30, 2019 – Orchestrating a Disaster Recovery Test


October 23, 2019 – BCP Software or BCP Consultants? What is best for you?


‘Please Change Your Password’
Have you ever received an e-mail similar to this from your security team? “Your network/domain password must be changed to...
The Devil’s in the Details When it Comes to Data Protection – What SMBs Need to Know About Building a Complete Strategy
The road to ensuring comprehensive and reliable data protection and recovery is fraught with complexity, expense, and often confusion. For...
Filling in the Resiliency Matrix
How many of you have ever played the game Tetris? I have it on my iPhone, as some of you...
What’s in a Name?
Business continuity, business resumption, contingency planning, disaster recovery, continuity of operations – why so many terms? Is there any difference?...