article thumbnail

Get Cyber Smart: How to Make Sure Recovery Plans Align with Information Security Needs  

MHA Consulting

Recovery plans and strategies cannot be created in a silo. Instead, they should be developed in coordination with the cybersecurity department to ensure that recovery measures do not inadvertently create vulnerabilities that can be exploited by hackers. During recovery, attack bots can sniff out these gaps and pour through them.

article thumbnail

Gone With the Wind: 12 BCM Practices That Have Become Outdated 

MHA Consulting

At the same time, a new need has developed: one for a place remote workers can go if they are no longer able to work at home (due to a power outage or whatever it might be). approach to cybersecurity. In the early days of networked computing, virtually no one worried about cybersecurity. The “What, Me Worry?”

BCM 87
article thumbnail

Tips for Managing Third-Party Risk in Health Care

Reciprocity

Such valuable data creates immense cybersecurity risks in healthcare. The pain is felt by the healthcare organization when a vendor has an outage because of ransomware or another cybersecurity intrusion. Despite HIPAA regulations, cybersecurity attacks and data breaches targeting healthcare remain a severe and increasing threat.