Organizations are changing cybersecurity providers in wake of Crowdstrike outage

More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber resilience – and sometimes that means changing cybersecurity providers. T… Continue reading Organizations are changing cybersecurity providers in wake of Crowdstrike outage

How to Get the Most Out of Your Cloud Disaster Recovery Plan

Cloud disaster recovery is a complex field which requires careful diligence to execute properly. Learn some considerations and tips from industry experts.
The post How to Get the Most Out of Your Cloud Disaster Recovery Plan appeared first on TechRepub… Continue reading How to Get the Most Out of Your Cloud Disaster Recovery Plan

The key differences between a business continuity plan and a disaster recovery plan

In this Help Net Security video, Chip Gibbons, CISO at Thrive, illustrates the differences between a business continuity plan and a disaster recovery plan. While these terms are often used interchangeably, there are important differences and it’s criti… Continue reading The key differences between a business continuity plan and a disaster recovery plan

A checklist to help healthcare organizations respond to a serious cyberattack

How should organizations in the healthcare sector respond to outage due to a serious cyberattack? The Healthcare and Public Health Sector Coordinating Council’s (HSCC) Cybersecurity Working Group (CWG) has released a tactical checklist aimed at h… Continue reading A checklist to help healthcare organizations respond to a serious cyberattack

Disaster recovery is critical for business continuity

Business continuity (BC) and disaster recovery (DR) efforts go hand in hand in this digitized world of ours. The former is focused on maintaining business operations rolling despite various problems, the latter is focused keeping the IT side of things … Continue reading Disaster recovery is critical for business continuity

The importance of crisis management in the age of ransomware

Cybersecurity crises are becoming commonplace. With the massive surge in ransomware attacks in the last few years, businesses can’t afford to ignore the increasing possibility of facing one, and should invest money and effort into crisis manageme… Continue reading The importance of crisis management in the age of ransomware

A Journey in Organizational Cyber Resilience Part 3: Disaster Recovery

Moving along our organizational resilience journey, we focus on disaster recovery (DR), the perfect follow-up to business continuity (BC) The two go hand-in-hand, often referenced as BCDR, and both are key to your cyber resilience planning. If you recall from the previous piece, NIST SP 800-34 calls out a separate disaster recovery plan, as it […]

The post A Journey in Organizational Cyber Resilience Part 3: Disaster Recovery appeared first on Security Intelligence.

Continue reading A Journey in Organizational Cyber Resilience Part 3: Disaster Recovery

High Availability: What It Is and How You Can Achieve It

While it is impossible to completely rule out the possibility of downtime, IT teams can implement strategies to minimize theRead More
The post High Availability: What It Is and How You Can Achieve It appeared first on Kaseya.
The post High Availabilit… Continue reading High Availability: What It Is and How You Can Achieve It

Can Your Data Protection Software Recover from Modern Ransomware?

Your nightmare has come true. Your organization was just attacked by ransomware. They have crippled your networks, corrupted your Active Directory, encrypted business critical documents, and disabled production databases. Now the recovery clock starts… Continue reading Can Your Data Protection Software Recover from Modern Ransomware?

Reaching Strategic Outcomes With an MDR Service Provider: Part 5

This is the fifth in a five-part blog series on managed detection and response (MDR) as it drives strategic security outcomes for businesses. Now that you’ve reached part five of this series, you’ve seen how MDR services help organizations. They can help achieve their goals through the context of four key strategic outcomes. You’re familiar […]

The post Reaching Strategic Outcomes With an MDR Service Provider: Part 5 appeared first on Security Intelligence.

Continue reading Reaching Strategic Outcomes With an MDR Service Provider: Part 5