Information Availability & Security
10 Questions to Ask When Choosing an IT Alerting Vendor
September 2016 | Administrator
article thumbnail

10 QUESTIONS TO ASK WHEN CHOOSING AN IT ALERTING VENDOR By Tommy Rainey Which IT alerting solution is right for you? When dealing with critical IT outages time is of the essence and rapid communication plays a major role in minimizing the imp [ ... ]

IT Complexity and the Risk of IT Failure
July 2016 | Administrator
article thumbnail

IT Complexity and the Risk of IT Failure By Jon Toigo For the past few years, the unabashed enthusiasm around clouds, virtualization and software-defined everything has led to some unfortunate side effects.  One is the suspension of disbelief [ ... ]

The Role of Senior Management and Your Technology and Information Security Department In A Cyber Breach Exercise
April 2016 | Regina Phelps
article thumbnail

  The Role of Senior Management and Your Technology and Information Security Department In A Cyber Breach Exercise There are two things you must have in place before you begin planning a cyber breach exercise to ensure that the exercise will go  [ ... ]

Data Breaches: How To Protect Corporate Reputation And The Bottom Line
February 2016 | Administrator

Expert Interview with Oliver S. Schmidt -- Managing Partner, C4CS, LLC   1. How do you define a data breach, and what industries and companies are affected by data breaches? We define a data breach as the intentional or unintentional access, disclosure, or acquisition of sens [ ... ]

Migrating to Windows 10? Back It Up First!
November 2015 | Jon Toigo

  If you are like me, your office life probably extends into your home, where you not only do some of your office work but also support the computing requirements of your children, spouse and pets. So, while it is nice to get the occasional freebie from your software vendor – [ ... ]

Preparation Before Developing a Cyber Security Incident Response Program
October 2015 | Dr. Michael C. Redmond, PhD

  A Cyber Incident Response Program allows an organization to respond with speed and agility, while empowering businesses to maintain continuous operations. A good program with a documented plan and playbooks can also reduce revenue loss, reduce fines and lawsuits, and protects [ ... ]

The Growing Issue of Cybersecurity and Resilience of the Power Grid
September 2015 | Chloe Demrovsky

  No one can deny that the tech revolution has impacted the nation and created the type of market innovation that stimulates economic growth. By allowing start-ups with small amounts of seed capital to challenge established giants, technology has unleashed innovation that has h [ ... ]

Infiltrate, Exfiltrate, and… Inject?
August 2015 | Ron LaPedis

  This is a blog about spying in the Internet era. While activists would have you believe that it’s all about online personas, there is still a lot of cloak-and-dagger up close and personal spying going on. When Edward Snowden dumped his files, many Western spy agencies had t [ ... ]

If You Want a Sandbox, Why Not Hit the Beach?
June 2015 | Ron LaPedis

Dear Ron, I try to be a good C-level executive but am really getting fed up by my cyber security staff. Every time I ask them if we’re going to get hacked like everyone else, they ask me to buy a sandbox for them. I mean, seriously… a sandbox? I’m trying to keep my comp [ ... ]

How the Loma Prieta Earthquake Pushed Me into the Disaster Recovery Business...and Others Out of Business
March 2015 | Ron LaPedis

By Ron LaPedis A quarter century ago, I got into the disaster recovery business by accident. I was walking through my company’s loading dock and found a huge fireproof safe. When I asked what was in it, I was told, “Reel-to-reel backup tapes of all of the software that we de [ ... ]

The Important Role of a Cyber Security Incident Response Program
March 2015 | Vibhav Agarwal and Michael Redmond

Authored by Vibhav Agarwal, Senior Manager of Product Marketing, MetricStream and Dr. Michael Redmond, FBCI, MBCP, CEM, PMP, MBA, PHD, CEO and Lead Consultant Redmond Worldwide   We live and do business in a whole new world; one marked by increasing cyber attacks, and all new  [ ... ]

Sony Hack: Business Continuity Lessons
January 2015 | Jeffrey Roman

By Jeffrey Roman New comments from the CEO of Sony Pictures Entertainment about the film studio's response in the immediate aftermath of a massive cyber-attack highlight the need for all organizations to ensure their business continuity plans specifically address cyber-attack ri [ ... ]

The WAN’s the Thing
January 2014 | Jon Toigo
article thumbnail

If you want to send chills up the spine of cloud vendors and consumers alike, just say the word Nirvanix. Once declared a comer in the “new” world of infrastructure (storage, backup, archive...) as a service, Nirvanix garnered considerable venture capital ($70 m [ ... ]

Information Security and Public Cloud Computing
January 2014 | Dr. Jim Kennedy
article thumbnail

If you asked a group of ten or more IT practitioners or business people what cloud computing is, they would probably give ten different answers. Each would have an answer consistent with his own specific perceptions. Public cloud computing is a term that has been a [ ... ]

What Answers Do BC Planners Need from Their Cyber Security Team?
January 2014 | Ron LaPedis
article thumbnail

Some experts say there is a thin line between disaster recovery and business continuity planning (BCP). The first is owned by the computer operations or IT department, while the second is usually owned by the line of business. Unfortunately, BCP and cyber security are, more often [ ... ]

Challenges for Continuity Planning 2014
January 2014 | Jon Toigo
article thumbnail

For 2014 and the foreseeable future, trends in business continue to favor increased dependency on information technology. Truth be told, while some of the economic circumstances that accompanied the Great Recession have begun to recede, fewer staff continue to shoul [ ... ]