article thumbnail

Book Review: Case Studies in Disaster Recovery

Recovery Diva

Review of Case Studies in Disaster Recovery – A Volume in the Disaster and Emergency Management: Case Studies in Adaptation and Innovation Series. Keywords: disaster recovery, adaptation, innovation, resiliency, case studies, Reviewer : Irmak Renda-Tanali, D.Sc. Volume Editor: Jane Kushma, Ph.D. December 2022.

article thumbnail

Evaluating the Safety, Hazards, and Risks in Your Organization’s Physical Environments

Business Resilience Decoded

Episode 144: Evaluating the Safety, Hazards, and Risks in Your Organization’s Physical Environments When was the last time you evaluated the threats to your physical environment? Book Mathews as a speaker Jon Seals, producer Jon Seals is the editor in chief at Disaster Recovery Journal , the leading magazine/event in business continuity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Resources to Help You Become a BCM Ninja 

MHA Consulting

Back then, finding information on how to do anything in BC and IT disaster recovery (IT/DR) was impossible. Contains links to toolkits for preparing for different hazards as well as pages on Emergency Response Plans, Crisis Communications Plans, Incident Management, IT/DR, and much more. Prepare My Business for an Emergency.

BCM 92
article thumbnail

Threat Intelligence: A Key Capability for Our Turbulent Times

MHA Consulting

In recent years, we have entered a uniquely tumultuous period, one characterized by weird weather, global conflict, and heightened supply chain vulnerability, among other challenges. Threats related to natural disasters such as hurricanes, earthquakes, floods, wildfires, heat waves, and pandemics. By creating a funnel.

article thumbnail

Matrix Ransomware

Disaster Recovery

RDP enabled computers that run on Windows are particularly vulnerable. This is a rapidly mutating security hazard with the potential to severely compromise enterprise systems. Carry out frequent vulnerability scans and penetration tests. The Matrix ransomware uses an RIG toolkit to take possession of as many PCs as it can.

article thumbnail

DDoS Attacks

Disaster Recovery

Defining these cyber hazards can be tricky. All online entities are vulnerable to these hazards. The post DDoS Attacks appeared first on Disaster Recovery & Business Continuity Blog. Nevertheless, the impact they can have on your business operations can be devastating. DDoS Attacks.

article thumbnail

10 Disaster Recovery Plan Mistakes to Avoid for Your Business

Erwood Group

That’s a sobering statistic that underscores the importance of having a solid disaster recovery plan in place. However, even with the best intentions, many organizations make common mistakes that can leave them vulnerable to downtime, data loss, and costly recovery efforts.