article thumbnail

How to write a business continuity plan: the easy way

IT Governance BC

You’ll rarely get advance warning about disruptions, so you need to prepare for whatever might come your way with a BCP (business continuity plan). In this blog, we explain how a BCP works, what it covers and how to create one. An organisation’s staff is often its biggest security weakness. What is a business continuity plan?

article thumbnail

Supply Chain Risk in Action

KingsBridge BCP

Department of Homeland Security study found that a six-month closure of the Poe [lock] would result in a complete shutdown of Great Lakes steel production. Automobile and transportation equipment production would essentially end in North America, with 11 million jobs lost and a $1.1 But the risks are real. iron ore mining.

BCP 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Server

BCP Builder

From a security, operational and legal perspective – what issues does the cloud raise? Feeback from BCP Builder Community on LinkedIn : Data in Triplicate If your data is not in 3 places then it doesn’t exist. On the security front, we will likely see many more destructive attacks against cloud infrastructure.

BCP 52
article thumbnail

Cloud Server

BCP Builder

From a security, operational and legal perspective – what issues does the cloud raise? Feeback from BCP Builder Community on LinkedIn : Data in Triplicate. ISO 27001 (for information security – basically to make sure they are doing their utmost to keep your data and information safe). ISO Certifications.

BCP 52
article thumbnail

Business Continuity Planning and Remote Work Challenges

Stratogrid Advisory

Transport Canada recently announced that telework is here to stay, and it will be a preferred way of working for many of their employees. It doesn't mean that everyone at Transport Canada will be working from home going forward, but many will. Security Considerations – data and access security were always a challenge.