The Perils of Paying Ransoms
Ransomware attacks have been in the news for years, with many stories about organizations making the difficult choice of losing their data, or paying to have their data unlocked. But as of October 1, 2020, [...]
Ransomware attacks have been in the news for years, with many stories about organizations making the difficult choice of losing their data, or paying to have their data unlocked. But as of October 1, 2020, [...]
The HUB is pleased to share an interview with 43-year industry pioneer, Pat Corcoran, Global Strategy Executive, IBM Business Resiliency Services. Pat exemplifies what the Risk and Resilience HUB is all about -- vision, passion, [...]
In today’s increasingly complex world of resilience, particularly as the country manages through the COVID-19 pandemic, compliance with a broad range of standards, regulations and other criteria has grown in importance. Compliance with government-issued mandates, [...]
To be successful and effective, Business Continuity Planning must be an organization-wide activity. It involves the collaboration of all business functions and all departments. So why is it so darn hard to engage an Information Technology [...]
Despite discussions today about repatriating IT data infrastructures from cloud environments to on-site data centers, many organizations still have made a significant investment in cloud technology. In addition to running key applications, it is also [...]
A recent survey conducted by US Signal (www.ussignal.com) of IT decision-makers showed that disaster recovery (DR), data backup and security are the top priorities of data center managers when selecting a data center location, edge [...]
Quote: “Whether the cybercrime is holding data at ransom prior to release of encryption keys, or laying in wait for a time to execute a worm or virus, one certainty is that these events will [...]
“When are we done with IT Disaster Recovery?” “How much is good enough?” Chief information officers, and the boards of directors that they report to, want to know when they can stop spending money to [...]
Introduction It seems there isn’t day that goes by without another story of a cyber attack or breach. It has almost become a “breach a day!” Not only is there confidential company or customer information [...]
As they relate to IT, the functions of business continuity and information security have one common goal. That is to minimize the losses and maximize the uptime of the organization's information systems before, during, and [...]
From Security to Cyber Resilience Cyber resilience is a concept that over the past five years has been evolving as information security, business continuity and risk management disciplines continue to converge. Today, cyber resilience methods [...]
The Cyber Readiness Institute (CRI) works to secure global value chains across sectors by empowering small and medium-sized organizations to improve their cyber readiness. SMEs, with limited resources to dedicate to cyber issues, are often [...]