article thumbnail

The Human Factor: BCM Team Roles and Skill Requirements 

MHA Consulting

Knowing what roles should be represented on the business continuity management (BCM) team and what kind of people should fill them is an overlooked key to success in making organizations resilient. The roles that should be represented on a company’s BCM team change over time depending on the maturity of the program.

BCM 91
article thumbnail

BCM Basics: the Difference Between Business Continuity and Disaster Recovery

MHA Consulting

This post is part of BCM Basics, a series of occasional, entry-level blogs on some of the key concepts in business continuity management. For business continuity newcomers, few topics are as confusing as the difference between business continuity and IT disaster recovery.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Write or Wrong: Five Common BCM Documentation Mistakes 

MHA Consulting

Recovering from a cyber incident such as a ransomware attack will require recovery of data and/or data processing equipment and devices. These may be different than the workarounds used in a non-cyber application outage. Due to the intricacies of this type of recovery, doing it ad hoc is to be avoided.

BCM 101
article thumbnail

Gone With the Wind: 12 BCM Practices That Have Become Outdated 

MHA Consulting

Most of these have had demonstrable impacts on the practice of business continuity management (BCM), rendering some traditional practices obsolete and ushering in new concerns and techniques. It’s interesting to look at BCM practices that have fallen into disuse or are no longer regarded as beneficial or sufficient.

BCM 87
article thumbnail

Recovering Right: How to Improve at IT Disaster Recovery

MHA Consulting

Far from relieving organizations of the responsibility of recovering their IT systems, today’s cloud-based and hybrid environments make it more important than ever that companies know how to bring their systems back up in the event of an outage. Moreover, cloud-services providers are themselves susceptible to outages and failed recoveries.

article thumbnail

Get Cyber Smart: How to Make Sure Recovery Plans Align with Information Security Needs  

MHA Consulting

Related on MHA Consulting: Be a Hard Target: Train Your Employees in Security Awareness A Uniquely Vulnerable Time In the context of business continuity, the recovery period is a vulnerable one for any organization. Ideally, this group will be aware of the need to integrate cyber security and business recovery.

article thumbnail

The Ultimate Guide to Residual Risk  

MHA Consulting

An organization that can undergo an outage of five days at no great cost is justified in having a high risk tolerance. An organization that would suffer a large impact as the result of an outage of two hours should be willing to tolerate very little risk. Where risk tolerance is high, controls can be relaxed.