Remove BCM Remove Business Recovery Remove Disaster Recovery Remove Vulnerability
article thumbnail

Recovering Right: How to Improve at IT Disaster Recovery

MHA Consulting

Related on MHA Consulting: The Cloud Is Not a Magic Kingdom: Misconceptions About Cloud-Based IT/DR The Cloud Is Not a Plan A common misconception today is that the shift from company-owned data centers toward cloud-based environments means companies can quit worrying about IT disaster recovery (IT/DR). (IT/DR

article thumbnail

Gone With the Wind: 12 BCM Practices That Have Become Outdated 

MHA Consulting

Most of these have had demonstrable impacts on the practice of business continuity management (BCM), rendering some traditional practices obsolete and ushering in new concerns and techniques. It’s interesting to look at BCM practices that have fallen into disuse or are no longer regarded as beneficial or sufficient.

BCM 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Get Cyber Smart: How to Make Sure Recovery Plans Align with Information Security Needs  

MHA Consulting

Instead, they should be developed in coordination with the cybersecurity department to ensure that recovery measures do not inadvertently create vulnerabilities that can be exploited by hackers. The best way to do this is by making sure business continuity is integrated into a robust information security governance framework.

article thumbnail

Business Continuity Guide for Smaller Organizations

Stratogrid Advisory

We recognize that many business continuity planning terms and industry-leading methodologies can be foreign to your organization. It can be overwhelming if your organization has never implemented a robust business continuity program. It requires a budget and long-term commitment (hence why it is a BCM Program).

article thumbnail

Business Continuity Guide for Smaller Organizations

Stratogrid Advisory

We recognize that many business continuity planning terms and industry-leading methodologies can be foreign to your organization. It can be overwhelming if your organization has never implemented a robust business continuity program. Section 2 - Business Continuity Management (BCM) Program Implementation.

article thumbnail

The Ultimate Guide to Residual Risk  

MHA Consulting

A strategy involving a conscious decision to remain vulnerable to a potential harm, usually based on a cost-benefit analysis. The most vulnerable areas tend to be electrical power, data backups, and network connectivity. A related but higher level concept is that of risk mitigation strategies. Risk avoidance. Risk limitation.