article thumbnail

Get Cyber Smart: How to Make Sure Recovery Plans Align with Information Security Needs  

MHA Consulting

Instead, they should be developed in coordination with the cybersecurity department to ensure that recovery measures do not inadvertently create vulnerabilities that can be exploited by hackers. The best way to do this is by making sure business continuity is integrated into a robust information security governance framework.

article thumbnail

Weathering the Storm: Tips for Coping with a Disrupted Climate

MHA Consulting

These checklists should address such matters as securing facilities and assets, protecting employees, and conducting emergency shutdown procedures (of production lines, IT systems, power, and so on). In this way, they can ensure that even as the weather becomes more and more erratic their organization’s future remains secure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Write or Wrong: Five Common BCM Documentation Mistakes 

MHA Consulting

4: Not figuring out and documenting the integration between the recovery plan and the organization’s other plans. The recovery plan does not live in a vacuum. It typically exists alongside plans for crisis management, security response, and other areas. Common Mistake No.

BCM 101
article thumbnail

Why is so hard to engage an IT Organization???

Stratogrid Advisory

Are we again in the Business vs IT turf wars? IT is (always) busy! We all know that IT is busy. They are delivering new projects, firefighting with IT issues (sometimes daily), patching applications, servers and IT security gear at some wee hours (when the business is getting their beauty sleep).

BCM 52
article thumbnail

Why is so hard to engage an IT Organization???

Stratogrid Advisory

Are we again in the Business vs IT turf wars? IT is (always) busy! We all know that IT is busy. They are delivering new projects, firefighting with IT issues (sometimes daily), patching applications, servers and IT security gear at some wee hours (when the business is getting their beauty sleep).

BCM 52
article thumbnail

The 7 critical elements of a business continuity plan

Online Computers

Business recovery strategies Your BCP must include strategies and techniques to recover and restore critical business functions and processes affected by the disruption. This means having backup and recovery plans, alternative work locations, and methods for restoring data and systems.

article thumbnail

Gone With the Wind: 12 BCM Practices That Have Become Outdated 

MHA Consulting

The threat was minimal and security was light. These days worry about cyberattacks is one of the things that keeps BC, IT, and Information Security professionals awake at night. Concern with vendor security has followed a trajectory similar to that of cybersecurity. The “What, Me Worry?” approach to third-party management.

BCM 87