article thumbnail

Why Every BC Professional Should Become a Gap Hunter

MHA Consulting

Business continuity professionals who want to make their organizations more resilient should make a conscious effort to become gap hunters. Capacity limitations. We often see that efforts to recover critical apps are derailed by limitations in computing or storage capacity.

article thumbnail

An Old Threat Returns…Computer Outage

Plan B Consulting

I think with cyber threats and power outages being the focus of the moment, occupying us business continuity folks, we have forgotten about a good old threat: the computer outage. I’d like to share a few thoughts with you as I reflect on the NATS incident: I never believe anyone who says it couldn’t happen, especially technology personnel.

Outage 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Four Phases of Disaster Recovery

MHA Consulting

For these reasons, it’s important that IT departments (and business continuity professionals) make sure their organizations are capable of restoring their IT services after an outage. Prioritize your services and technologies so you know which to restore first. Test across all the different technologies.

article thumbnail

Business Continuity Guide for Smaller Organizations

Stratogrid Advisory

Regardless of their nature, weather-related events that cause havoc in our communities, pandemics that can wipe us out, or cyber-related incidents that can potentially shut-down our technology, these events require us to be more resilient. Why did we write this guide?

article thumbnail

Business Continuity Guide for Smaller Organizations

Stratogrid Advisory

Regardless of their nature, weather-related events that cause havoc in our communities, pandemics that can wipe us out, or cyber-related incidents that can potentially shut-down our technology, these events require us to be more resilient. Technological disruptions (loss of data centers, data breaches or other IT security-related incidents).