2025

article thumbnail

DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 2025

DRI Drive

New York, NY Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience training, has published its 10th Annual Predictions Report resilience predictions for the profession, by the profession. The report provides an in-depth look ahead to major global issues that resilience professionals may deal with in the coming year. […] The post DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 202

article thumbnail

Downtime Will Cost You: Why DRaaS Is No Longer Optional

Pure Storage

Downtime Will Cost You: Why DRaaS Is No Longer Optional by Pure Storage Blog Summary Unforeseen disruptions like natural disasters, cyberattacks, or hardware failures can pose a significant threat to companies and their financial and reputational health. Investing in disaster recovery as a service (DRaaS) can help businesses stay resilient. In todays digital economy, constant uptime is crucial to maintaining productivity, revenue, and customer trust.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Cybercriminals Are Leveraging AI to Build Better Attacks

NexusTek

How Cybercriminals Are Leveraging AI to Build Better Attacks January 23, 2025 Paul Barrett VP, Sales Enablement With decades of experience in the IT and cybersecurity space, Ive had the privilege of guiding midsize businesses through the complexities of an ever-changing technology landscape. In recent years, artificial intelligence (AI) has emerged as both a transformative force for innovation and a potent tool for cybercriminals.

Malware 111
article thumbnail

Please Support This Site

Recovery Diva

If you like this site, please donate to help the Diva get the occasional technical support she needs to keep it going. This is the 14th year she has donated her time and resources to provide information about disaster recovery and related topics. Use the Donate Now button in the right hand column. Thank you.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Anti-Patterns vs. Patterns: What Is the Difference?

BMC

Jargon permeates the software development industry. Best practices. Artifacts. Scope creep. Many of these terms are so common as to be called overused, and it is easy to assume we understand them because they seem so obvious. Still, we sometimes find new depth when we examine them closely. In this post, let us muse on pattern, and its somewhat lesser known counterpart, the anti-pattern.

More Trending

article thumbnail

Considerations for Disaster Recovery – Part 3: Networking

Zerto

In todays hyper-connected digital landscape, downtime is not merely an inconvenienceit is a threat to business survival. From lost revenue to reputational damage, the cost of operational interruptions can be staggering. To navigate these challenges, organizations must adopt a comprehensive disaster recovery (DR) strategy. At the heart of any successful DR plan lies a robust networking infrastructure.

article thumbnail

The 6 Best Veeam Training Courses and Certifications for 2025

Solutions Review

The editors at Solutions Review have compiled this list of the best Veeam courses and online training for 2020. Veeam Backup & Replication is a data protection and disaster recovery solution for virtual environments of any size. It provides fast, flexible, and reliable recovery of virtualized applications and data. The provider unifies backup and replication in a single solution, increases the value of backup, and reinvents data protection for VMware VSphere and Microsoft Hyper-V virtual env

article thumbnail

Top Architecture Blog Posts of 2024

AWS Disaster Recovery

Well, its been another historic year! Weve watched in awe as the use of real-world generative AI has changed the tech landscape, and while we at the Architecture Blog happily participated, we also made every effort to stay true to our channels original scope, and your readership this last year has proven that decision was the right one. AI/ML carries itself in the top posts this year, but were also happy to see that foundational topics like resiliency and cost optimization are still of great int

article thumbnail

Transforming Disaster Management: The Promise and Challenges of AI in Wildfire Damage Assessment

National Center for Disaster Prepardness

The aftermath of a major wildfire presents a grim landscape: communities devastated, homes reduced to ash, and recovery teams racing against time to assess the extent of the damage. In the U.S., a preliminary damage assessment supports a request for federal assistance through a Stafford Act Presidential Disaster Declaration. This often involves labor-intensive, on-the-ground fieldwork, requiring significant time and resources.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Conducting a Threat Risk Assessment: A Step-by-Step Guide

KingsBridge BCP

The Essential Guide to Conducting a Threat Risk Assessment (TRA) The ability to identify and manage risks is the foundation of any resilient business. In todays fast-paced and unpredictable world, businesses face a wide range of threatsfrom natural disasters to cyberattacks. The question isnt if these threats will occur, but when. Thats why a Threat […] The post Conducting a Threat Risk Assessment: A Step-by-Step Guide appeared first on KingsBridgeBCP.

article thumbnail

DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 2025

DRI Drive

New York, NY Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience training, has published its 10th Annual Predictions Report resilience predictions for the profession, by the profession. The report provides an in-depth look ahead to major global issues that resilience professionals may deal with in the coming year. […] The post DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 202

article thumbnail

What Are Air Gaps and Are They Effective Data Security Strategies?

Pure Storage

What Are Air Gaps and Are They Effective Data Security Strategies? by Pure Storage Blog This is part one in a series about air gaps and resiliency architectures. Read part two: Without A Tiered Backup Architecture, Are You Truly Resilient? Ransomware attackers are ruthless opportunistsbut that doesnt mean we should make their jobs any easier. Take the attack on Colonial Pipelines back offices.

article thumbnail

The Latest Microsoft Ignite and I’m Not Mad About It

NexusTek

The Latest Microsoft Ignite and Im Not Mad About It January 10, 2025 JP Pilkin Vice President, Advanced Solutions Group This years event in Chicago was packed with insights on how Microsoft plans to leverage its massive user base, drive AI adoption, address security challenges, and continue leading innovation in the cloud. Here are my top observations: 1.

Strategic 105
article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Radio Discussion of FEMA – via Scholar’s Circle

Recovery Diva

Scholars Circle Reforming Federal Emergency Management Agency of USA The Diva was one of three participants i this discussion.

article thumbnail

RFP Definition, Steps & Template for Requests for Proposals

BMC

No matter your industry, the time will come when you must submit a Request for Proposalknown simply as an RFP. At some point, your company must purchase a product or service from a third-party vendor. The RFP is a solicitationyou ask vendors whether and how they can solve your problem and support your project. Although RFPs are a prevalent standard in the business world, they still lead to a lot of confusion for many.

article thumbnail

Business Process Automation: What It Is and How to Use It

LogisManager

Business Process Automation: What It Is and How to Use It Last Updated: January 14, 2025 Business process automation (BPA) is critical in a constantly advancing landscape. With increasing regulatory pressures and a need for operational agility, your role as a risk manager becomes more complex and essential. There’s where BPA steps in as a game-changer, automating processes to save time, reduce costs and enhance efficiency across your organization.

article thumbnail

Why Cyber Vaults are Essential to a Bulletproof Cyber Resilience Strategy

Zerto

With the help of UserEvidence, we recently surveyed more than 100 Zerto users to learn why they purchased their Zerto solution, whats their approach to cyber resilience, and what they are looking for in a cyber vault. Here are some of our key findings. Why our customers purchased Zerto Zerto combines ransomware resilience , disaster recovery , and multi-cloud mobility into one solution.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Security Industry Association Welcomes New Leadership of SIA Perimeter Security Subcommittee

Security Industry Association

Christa Decker of Whitman, Requardt & Associates and Amy Dunton of Ameristar will oversee the subcommittees efforts to support the protection of crowded spaces, critical infrastructure and government facilities. SILVER SPRING, Md. The Security Industry Association (SIA) has named two industry leaders Christa Decker, vice president of the Protective Design Group at Whitman, Requardt & Associates (WRA), and Amy Dunton, business development specialist at Ameristar to serve as co-chairs o

article thumbnail

Acronis names Gerald Beuchelt as Chief Information Security Officer

Acronis

Acronis has named Gerald Beuchelt as its new CISO. He will play a pivotal role in expanding Acronis' influence in the cybersecurity community. Beuchelt will lead new research, reports and threat intelligence initiatives from the Acronis Threat Research Unit (TRU).

article thumbnail

LA Fire Disaster: Protecting Children in Physical and Psychological Harm’s Way

National Center for Disaster Prepardness

The massive fire catastrophe in LA will be remembered as one of the most devastating disasters in modern U.S. history. Having worked on the prevention of, response to, and recovery from megadisasters for many years, I have watched how the devastation of such events impacts communities and people, especially people with important vulnerabilities like chronic illnesses, mobility challenges, and other conditions, including people who are economically fragile.

article thumbnail

The Long Tail of Cyber Incidents – A Comhairle nan Eilean Siar (Western Isles Council) Case Study

Plan B Consulting

In todays bulletin, Charlie looks at the cyber attack that has affected Comhairle nan Eilean Siar and discusses the impacts of the attack. This week, I conducted an exercise with a client in the financial sector. At the end of the exercise, we discussed how long it would take the organisation to recover all its systems after the attack we had used in our scenario.

Audit 52
article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

DRI International Awards ‘Resilient Enterprise’ Designation to ADCMC

DRI Drive

The first accredited emergency center worldwide to receive this DRI accreditation New York, NY February 5, 2025 Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience education and certification, is pleased to announce that The Abu Dhabi Crisis Management Center (ADCMC) has received the DRI accreditation of Resilient Enterprise […] The post DRI International Awards ‘Resilient Enterprise’ Designation to ADCMC appeared first

article thumbnail

Turning Setbacks into Strengths: How Spring Branch ISD Built Resilience with Pure Storage and Veeam

Pure Storage

Turning Setbacks into Strengths: How Spring Branch ISD Built Resilience with Pure Storage and Veeam by Pure Storage Blog Summary Spring Branch Independent School District in Houston experienced an unplanned outage. Preparation and planning were key to their recovery, as well as the integrated Pure Storage and Veeam solutions, which enabled them to restore large amounts of data quickly and efficiently.

article thumbnail

The Future of Cybersecurity in 2025: Navigating Challenges for the Midsize Market

NexusTek

The Future of Cybersecurity in 2025: Navigating Challenges for the Midsize Market January 14, 2025 Paul Barrett VP, Sales Enablement The world of cybersecurity is shifting fast, and midsize businessesmaybe like yoursare feeling the pressure. Cyber threats are evolving, becoming sharper and more focused, and the defenses you relied on last year might not be enough to protect you tomorrow.

Marketing 103
article thumbnail

New CRs Report on the Disaster Relief Fund

Recovery Diva

New Report from the Congressional Research Service: Disaster Relief Fund State of Play: In Brief (15 pp)

100
100
article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Vendor Onboarding Best Practices: Reducing Risk from Day One 

Reciprocity

Third-party vendor risk begins at onboarding. Manual processes create security gaps through scattered documentation and missed compliance checks. ZenGRC transforms this process with automated workflows and centralized risk assessment, enabling secure vendor relationships from day one. Schedule a demo to see how ZenGRC can strengthen your vendor onboarding process.

article thumbnail

Risks Associated With Business Task Automation and How to Mitigate Them

LogisManager

Risks Associated With Business Task Automation and How to Mitigate Them Last Updated: January 14, 2025 If your business is investing in task automation, you’ll benefit from increased efficiency and reduced manual tasks. While business task automation (BTA) offers companies a new way to manage workflows, it also comes with new risks. Risk managers need to understand their IT processes so they can find and prevent security threats for everyone.

article thumbnail

Unlocking the Power of Integrations with Zerto

Zerto

The ability to seamlessly integrate various IT systems and applications is more critical than ever. Organizations need robust solutions that can adapt to their unique environments, ensuring data protection , disaster recovery , and business continuity. Zerto, a Hewlett Packard Enterprise company, stands out in this arena with its powerful integration capabilities.