article thumbnail

Get Cyber Smart: How to Make Sure Recovery Plans Align with Information Security Needs  

MHA Consulting

Related on MHA Consulting: Be a Hard Target: Train Your Employees in Security Awareness A Uniquely Vulnerable Time In the context of business continuity, the recovery period is a vulnerable one for any organization. Ideally, this group will be aware of the need to integrate cyber security and business recovery.

article thumbnail

The Ultimate Guide to Residual Risk  

MHA Consulting

Inherent risk is the danger intrinsic to any business activity or operation. Residual risk is the amount of risk that remains in an activity after mitigation controls are applied. Putting it in mathematical terms: (Inherent risk) – (the risk eliminated by your mitigation controls) = residual risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BCM Basics: the Difference Between Business Continuity and Disaster Recovery

MHA Consulting

They soon find the field contains an abundance of specialist terms such as inherent risk , mitigation controls , and recovery time objective. However the most important terms to learn at the outset are surely business continuity and IT disaster recovery since they speak to the principal division of the entire field.

article thumbnail

The Human Factor: BCM Team Roles and Skill Requirements 

MHA Consulting

As the program matures, various other roles will be needed, possibly including the following: Building Maintenance or Facilities Manager: This individual can provide information on what mitigation steps are already in place for the facility, such as fire suppression and electrical service. Business and Disaster Recovery.

BCM 91
article thumbnail

Gone With the Wind: 12 BCM Practices That Have Become Outdated 

MHA Consulting

At the same time, a new need has developed: one for a place remote workers can go if they are no longer able to work at home (due to a power outage or whatever it might be). Nowadays BC is usually a unit unto itself, and in progressive organizations, it tends to be part of the Risk department (since BC is all about risk mitigation).

BCM 87
article thumbnail

Tips for Managing Third-Party Risk in Health Care

Reciprocity

The pain is felt by the healthcare organization when a vendor has an outage because of ransomware or another cybersecurity intrusion. Adopting a zero-trust approach to network and data access by third parties is the best way to mitigate such risks. In addition to weak control policies, this increases the risk of cyberattacks.

article thumbnail

Business Continuity Guide for Smaller Organizations

Stratogrid Advisory

The AHRA is defined as " An approach for prevention, mitigation, preparedness, response, continuity, and recovery that addresses a full range of threats and hazards, including natural, human-caused, and technology-caused " - NFPA 1600 Standard. Decision points are to build, lease or procure an additional site.