The Perils of Paying Ransoms
Ransomware attacks have been in the news for years, with many stories about organizations making the difficult choice of losing their data, or paying to have their data unlocked. But as of October 1, 2020, [...]
40+ Years of Change: One Trailblazer Who Shaped the Journey
The HUB is pleased to share an interview with 43-year industry pioneer, Pat Corcoran, Global Strategy Executive, IBM Business Resiliency Services. Pat exemplifies what the Risk and Resilience HUB is all about -- vision, passion, [...]
Why Is It So “Darn” Hard to Engage an IT Organization in BC Efforts?
To be successful and effective, Business Continuity Planning must be an organization-wide activity. It involves the collaboration of all business functions and all departments. So why is it so darn hard to engage an Information Technology [...]
Research: Top Criteria for Selecting a Data Center Provider
A recent survey conducted by US Signal (www.ussignal.com) of IT decision-makers showed that disaster recovery (DR), data backup and security are the top priorities of data center managers when selecting a data center location, edge [...]
The Evolution of Cyber Attacks, Evolving With the Times
Quote: “Whether the cybercrime is holding data at ransom prior to release of encryption keys, or laying in wait for a time to execute a worm or virus, one certainty is that these events will [...]
CIOs Want to Know – When Are We Done with IT Disaster Recovery?
“When are we done with IT Disaster Recovery?” “How much is good enough?” Chief information officers, and the boards of directors that they report to, want to know when they can stop spending money to [...]
Designing an Exercise to Prepare for a Cyber Attack
Introduction It seems there isn’t day that goes by without another story of a cyber attack or breach. It has almost become a “breach a day!” Not only is there confidential company or customer information [...]
Seven Keys to Success When Working with Information Security Professionals
As they relate to IT, the functions of business continuity and information security have one common goal. That is to minimize the losses and maximize the uptime of the organization's information systems before, during, and [...]
Cyber Resilience in the Cognitive Age
From Security to Cyber Resilience Cyber resilience is a concept that over the past five years has been evolving as information security, business continuity and risk management disciplines continue to converge. Today, cyber resilience methods [...]
Role of Senior Management and Technology/IS Department In A Cyber Breach Exercise
There are two things you must have in place before you begin planning a cyber breach exercise to ensure that the exercise will go smoothly. Both are critically important. You need senior management commitment and [...]
Secure E-Mail: Critical Business Applications May Be Wide Open to Attack
All it takes is one weak link in your network or e-mail environment for corporate correspondence to become fair game to anyone with network access. Not only is e-mail an important business tool; it’s a [...]
You Can’t Afford To Overlook Security Incident Response
Incident response – the art and science of responding to computer and network security breaches – is an often overlooked component of business continuity. For whatever reasons, the procedures associated with handling network intrusions and [...]