article thumbnail

Book Review: Case Studies in Disaster Recovery

Recovery Diva

Review of Case Studies in Disaster Recovery – A Volume in the Disaster and Emergency Management: Case Studies in Adaptation and Innovation Series. Paperback ISBN: 9780128095744 eBook ISBN: 9780128095362. Keywords: disaster recovery, adaptation, innovation, resiliency, case studies, Reviewer : Irmak Renda-Tanali, D.Sc.

article thumbnail

Our Latest eBook – Backup & Disaster Recovery Strategies for the New World of Work

OffsiteDataSync

That’s why we created our latest e-book, “ Backup & Disaster Recovery Strategies for the New World of Work.” Data is subject to greater risk outside the corporate firewall and the vulnerabilities are diverse. Finally, you’ll find a Q&A on Disaster Recovery in 2021 with industry influencer, Dave Russell.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware is on the rise, and no industry is safe

OffsiteDataSync

According to Nuspire’s Josh Smith “Really no industry is safe…”, because the hackers will attack anyone they deem vulnerable. Be on the lookout for our upcoming eBook “The Veeam 3-2-1 Data Protection Blueprint: Offsite Backup, Disaster Recovery & The Cloud”. For pricing, click here.

article thumbnail

Top 10 Resources to Help You Become a BCM Ninja 

MHA Consulting

Back then, finding information on how to do anything in BC and IT disaster recovery (IT/DR) was impossible. As an example, our MHA Consulting site is full of articles and ebooks that set forth the same principles and practices we use in working with our Fortune 500 clients, all available for free to anyone who wants them.

BCM 89
article thumbnail

Backup and DR – The Last Line of Ransomware Defense

OffsiteDataSync

Backup and disaster recovery are critical elements in the drive to thwart ransomware. Freedom from malware and/or ransomware : Backup systems are just as vulnerable to compromise as anything else, so they be kept clean. While adequate cybersecurity is the first line of defense, it cannot do the job on its own.

Backup 52
article thumbnail

How to Offload Your Risk to a Third Party

MHA Consulting

There are four main strategies for mitigating risk : · Risk acceptance: Making a conscious decision to remain vulnerable to a potential harm, usually based on a cost-benefit analysis. These definitions are taken from our recent free ebook, Strong Language: The MHA Guide to Essential Business Continuity Terminology.

article thumbnail

What Was New in ’22: The BCM Year in Review

MHA Consulting

For many BC offices, dealing with these losses—and the vulnerabilities they create—will be a key agenda item for 2023. We’ve been talking about this for years; we even wrote an ebook about it. A new focus on efficiency. There’s a lot to be said for ruthless efficiency when it comes to BCM. Supply-chain security is paramount.

BCM 52