Classic Patrick, he spilled coffee on the breaker panel after blowing a fuse
Classic Patrick, he spilled coffee on the breaker panel after blowing a fuse. Goodbye office power! Accidents happen, so often in fact that power outages are a leading cause of downtime.
Working with robots? Then your data might be safe
Working with robots? Then your data might be safe. If you work with humans, then you should give me a call about protecting your data from the guy sitting next to you. #dataloss
Business Impact Analysis
Business Impact Analysis You have heard of a business continuity plan, but you may hear less frequently about one of its important components: the business impact analysis. A business impact analysis is the step where you make an inventory of the what business functions or assets would be impacted by any major negative events that […]
Risk Assessment
Risk Assessment Before you can begin making any specific plans to handle a major event which threatens your firm’s capacity to do business, an analysis of the threats and hazards in the environment needs to be put together. This first step is known as a risk assessment. It details the hazards that have the potential […]
Signs You Aren’t Budgeting Enough for IT
Many businesses looking to bounce back from the pandemic are struggling with tight budgets. Still, technology can improve remote work, increase productivity, and enhance customer satisfaction.
What is a business continuity plan?
What is a business continuity plan? You may hear a lot about business continuity plans and may even hear them incorrectly referred to as disaster recovery plans. What is a business continuity plan?A business continuity plan is a total blueprint for how a business or organization ensures that its output–products or services–will continue to be […]
ZTNA Is Possible for Small Businesses
Developed in 2010, zero trust security sees trust as a vulnerability. Trust undermines vigilance, according to ZTNA’s creator.
Everyone Plays a Role in Cybersecurity
Phishing remains a primary way to attack. A scammer sends an email that looks legitimate, and an unsuspecting victim clicks on a malicious link. They might download malware or end up on a webpage that looks credible but is set up to gather their personal data.
The threats out there: Have you considered their impact?
The threats out there: Have you considered their impact? Oct 28, 2012–Hurricane Sandy hit New York, America’s largest city. The consequences were disastrous and resulted in a shutdown of a city of 8.6 million people. Places that weren’t supposed to ever close, such as major hospitals, had to be evacuated. It was from the intense […]
Business Continuity vs. Disaster Recovery: What’s the Difference?
It’s important to plan for business continuity and disaster recovery, and to do so in advance so you’re prepared for the worst.