Blog Posts Tagged with "Disaster Recovery"


The Apocalypse Cycle: Preparing for Infrastructure Failure

November 02, 2011 Added by:Infosec Island Admin

The snow storm in October made me once again ponder my own readiness with regard to how to handle infrastructure failures. These same events have shown me just how clueless all too many people are about how to survive when their infrastructure goes down for any extended period of time...

Comments  (1)


Activation Procedures for Business Continuity Plans

October 10, 2011 Added by:Dejan Kosutic

Having a business continuity plan is nice, but if you don't know when and how to start using it, the money you've invested in it was spent in vain. Even worse, you'll likely lose quite a lot of money because your business operations will be disrupted...

Comments  (0)


Smarter Security Steps Part 2: Information Management

September 08, 2011 Added by:Brian McGinley

Make sure your company has a policy and operational execution against that policy that looks at data protection, remote access and computer account privileges during terminations that provide for securing company property, password changeovers within the company and outside vendors...

Comments  (0)


Social Media During a Crisis

August 26, 2011 Added by:Joel Harding

Without electricity most of us are going to be hosed, we won't have access to social media to communicate with family and friends. We won't be able to check the latest news and information from the government from websites and once everybody has moved to the cell phone networks, they'll crash...

Comments  (1)


DHS: Hurricane Irene Critical Infrastructure Conference Call

August 25, 2011 Added by:Headlines

Friday, August 26, 2011 from 12:00 p.m. – 1:00 p.m. EDT: The purpose of the call is to update partners on DHS IP Hurricane Irene planning and preparation activities, procedures, and capabilities should the hurricane make landfall and significantly impact critical infrastructure operations...

Comments  (0)


Twenty-One Steps to Smarter Security

August 22, 2011 Added by:Brian McGinley

Whatever your business, Security Risk Management should be in that pie chart—as an integrated slice of your business. Integration is tenet number one, and as a security professional in your company, your main job is to be a business enabler and evangelist to make this so...

Comments  (0)


Getting Started with the New Red Hat 5 STIG

August 18, 2011 Added by:Jamie Adams

The generic UNIX STIG supported numerous UNIX and Linux distributions but never addressed Red Hat Enterprise Linux 5. For many years, this lack of support was a source of frustration for system administrators. I've completed my initial review and I want to share some of my findings and tips...

Comments  (2)


Using Trust Maps to Manage Critical Systems

August 04, 2011 Added by:Brent Huston

The purpose of a trust map is to graphically demonstrate trust between components of your organization. It is a graphic of how authentication occurs, what systems share accounts and what systems trust other systems in an environment. Done properly, they become a powerful tool with a real payoff...

Comments  (0)


On Disaster Recovery for SMBs

July 27, 2011 Added by:Ben Kepes

There really is no excuse for not having a good DR strategy in place – having come through a serious earthquake myself, and having to relocate businesses several times – I’ve seen the pain caused by a reliance on physical hardware that isn’t replicated elsewhere...

Comments  (0)


Evaluating the Cloud-Based Services Option

June 06, 2011 Added by:Mike Meikle

Keep a local copy of your data. If Google Apps one day decides to die because of “data corruption” you do not want to be stuck without access to important documents. The potential for an incident like this is moderately high since Google has already had a similar situation with Gmail...

Comments  (3)


Business Continuity for SMB's – A Necessity or Not?

April 13, 2011 Added by:Dejan Kosutic

There is no difference between large organizations and small with regard to business continuity framework - they both have to think in detail what preparations they need to perform in order to survive a disaster. The difference is SMB's can do it with very little investment...

Comments  (0)


Report: Data Centers Not Prepared for Disaster Recovery

March 31, 2011 Added by:Headlines

“When it comes to disaster recovery, the survey results are indicative of the investment activity we have seen in data centers throughout the recession—focus on immediate needs with business continuity and disaster recovery planning considered a luxury..."

Comments  (0)


SMBs, the Cloud and Disaster Recovery

March 09, 2011 Added by:Ben Kepes

Despite organizations identifying recovery time as a critical aspect of DR, and despite them estimating the cost of extended downtime at a very high rate, only 55% of respondents actually have any faith that their data will be completely restored within hours of an outage...

Comments  (0)


SMBs and Disaster Recovery Planning

January 31, 2011 Added by:Ben Kepes

Mozy estimated that more than 50% of SMBs that suffer a major data loss will be out of business in 12 months. If one accepts these assumptions, then clearly some education beyond simply creating a pseudo data loss situation will go a long way to encourage SMBs to think about disaster recovery...

Comments  (0)


Disaster Recovery vs Business Continuity

November 10, 2010 Added by:Dejan Kosutic

The best way to organize the implementation of BC is for the business side to lead such a project - this is how you achieve greater awareness and acceptance of all parts of the organization. The IT department should play its role - a key role - to prepare disaster recovery plans...

Comments  (1)


Disaster Recovery Options in SharePoint 2010

October 27, 2010 Added by:Global Knowledge

With SharePoint taking on a more critical role in the information infrastructure, it is important to understand the options for Disaster Recovery and High Availability. This webinar will cover the available techniques for assuring information continuity in the case of disaster. High availability techniques and disaster recovery techniques will be identified and compared...

Comments  (0)

Page « < 1 - 2 - 3 > »