Business continuity plan News
March 28, 2017
Avaya UC customers are in limbo with the vendor in bankruptcy. Consultants at Enterprise Connect offer Avaya bankruptcy contingency plan steps to prepare for the worst.
February 10, 2017
The hits keep on coming for the airline industry, with several more IT outages that have stranded angry passengers in recent months. Are there any new lessons for IT pros?
January 29, 2016
Successfully reaping the benefits of big data remains a huge challenge for many companies. Big data projects involve not just identifying the right data analyze, but also finding the right people ...
January 08, 2016
Here are the SearchCIO and SearchCompliance articles from this week: Is your company prepared to handle a data breach? In this tip, SearchCIO contributor Mary K. Pratt talks to IT professionals to ...
Business continuity plan Get Started
Bring yourself up to speed with our introductory content
A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event. Continue Reading
When crafting a business continuity and disaster recovery plan, there are a lot of steps and factors to consider. We've compiled the top questions you might be afraid to ask. Continue Reading
Channel partners have a number of options for disaster recovery training and certification, but some execs see greater value in certifying in specific DR technologies. Continue Reading
Evaluate Business continuity plan Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Social media mistakes can bring down an organization as easily as a technical disruption can. It's important to analyze user activity and include it in a business continuity plan. Continue Reading
A data breach plan that addresses the many variations a hack can take should consider these eight points. Continue Reading
Disaster recovery plans for hyper-converged infrastructures have very different considerations than the approaches used in traditional environments. Discover areas to examine. Continue Reading
Manage Business continuity plan
Learn to apply best practices and optimize your operations.
Although HIPAA may not specify how to protect patient data in the event a system goes down, its requirements make it clear data must remain available and secure. Continue Reading
Tackle the business continuity plan process with this checklist of items that details what to include in documents and who to include in planning and emergency situations. Continue Reading
Given the comprehensive nature of business continuity planning, mistakes can happen. Explore some of the most common errors to avoid before a disaster hits. Continue Reading
Problem Solve Business continuity plan Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Machine learning in security is continuing to advance, and many companies now claim to have introduced artificial intelligence techniques into their platforms. With the high volume of data that most security teams have to prioritize, machine learning in security technology is increasingly being adopted as a way to reduce the noise that traditional security products produce.
Smaller companies, such as Keen Footwear, have turned to threat platforms that incorporate machine learning and AI techniques -- and soon automated defense -- to solve a variety of problems. "I don't need to go hire someone dedicated to security," said Clark Flannery, director of IT at Keen's headquarters in Portland, Ore. "It just feels like a whole team back there -- who are way more qualified than [staff] I would be able to pay."
With security professionals in short supply, companies like Keen are relying on these technologies to make it easier to spot and respond to attacks. While machine learning and artificial intelligence are often used interchangeably, the concepts are different. In this issue of Information Security magazine, we discuss the nuances and dive into the current state of the technology. Machine learning in security offers information security analysts more depth of knowledge, helping to detect patterns and related analysis they may not otherwise have known about.Continue Reading
To avoid the disaster recovery safety net, build an IT business continuity plan for your data center. But before you do, weigh the pros and cons of using colocation vs. cloud. Continue Reading
If time constraints and other factors force you to eliminate risk assessment from your business continuity plan, discover how to focus your development efforts more precisely. Continue Reading