The Seven Essential Practices for Effective BC Management
This white paper describes a tested approach for successfully evolving business continuity into an organization-wide, integrated program. The seven essential practices described in the paper provide a roadmap for elevating BCM to the enterprise risk management level and improving consistency across your business units and geographies.
The Risks of "Do It Yourself" Disaster Recovery
For many, the response has been to take outsourced disaster recovery services and bring them back “in-house,” although many did so without fully understanding the costs and implications of the decision. This Technology Adoption Profile explores the ways in which enterprises are sourcing their disaster recovery implications today, and implications of an “in-house” model.
Insurance companies face strict business uptime, data management and data protection requirements, and as a result, these businesses need data backup and disaster recovery (BDR) and business continuity solutions that fulfill these needs.
However, managed service providers (MSPs) can offer data BDR and business continuity solutions with image-based backup to help insurance companies back up files, programs and other important information quickly and easily.
The Sony hacking and subsequent threats to the company and its supply chain, has become the biggest information story of 2014; in a year of many high profile incidents. What started out as ‘yet another breach story’ a few weeks ago rapidly developed into a very real business continuity and reputation threatening incident.
On December 19th the FBI published an update on the Sony cyber attack. The highlights include:
WatchGuard Technologies is urging organizations to use the nearly epic scale of the Sony cyber attacks to spur their companies into action versus panicking about potential risks.
"A year ago, we predicted major state-sponsored attacks may bring a Hollywood movie hack to life that exploits a flaw against critical infrastructure – we just didn't predict it would happen to Hollywood itself," said WatchGuard's Global Director of Security Strategy, Corey Nachreiner. "It's important that IT pros use this opportunity to upgrade what is often five-year-old technology to defend against five-day-old threats."
"The FBI is right when it says that less than 10 percent of companies could survive an attack like the one on Sony," continued Nachreiner. "And, unfortunately, it's not a question of if, but when for these kinds of attacks."
Nachreiner recommends five immediate actions that organizations can take to make sure they have the best possible chance of preventing attacks, and seven actions to minimize damage if cyber criminals do get in:
2015 will be the year that agile data warehouse (DW)/business intelligence (BI) takes off. Traditional strategies for DW/BI have been challenged at best, with the running joke being that a DW/BI team will build the first release and nobody will come. On average, Agile strategies provide better time to market, improved stakeholder satisfaction, greater levels of quality, and better return on investment (ROI) than do traditional strategies. The DW/BI community has finally started to accept this reality, and it is now starting to shift gears and adopt agile ways of working. My expectation is that 2015 will see a plethora of books, case studies, and blog postings describing people’s experiences in this area.
Efficiency in the data center is a big thing now, with organizations of all sizes working to develop both the infrastructure and the practices that can help lower the energy bill. But while analysis of data flows and operating characteristics within equipment racks is fairly advanced, the ability to peek under the covers to see how energy is actually being used is still very new.
To be sure, there is a variety of tools on the market these days, from simple measurement devices to full Data Center Infrastructure Management (DCIM) platforms, but more often than not the question revolves around not only what to measure, but how.
Without adequate insight into what is going on, it is nearly impossible to execute an effective energy management plan, says UK power efficiency expert Dave Wolfenden. Many standard tests, in fact, fail in this regard because they attempt to gauge the upper capabilities of power and cooling equipment, not how to maintain maximum efficiency during normal operation. New techniques like computational fluid dynamics (CFD) can help in this regard, but they must be employed with proper baselines in order to give a realistic indication of actual vs. projected results.
In 2015, almost every CIO will be tasked with assessing their organizations and technology to ensure data and confidential information is protected.
Target, Home Depot, Staples, who’s next? These are just the most recent retail outlets that made the news. What is not making the headlines are the multitude of private- and public-sector organizations that have been hacked and lost data and information — many times totally unaware until after the fact.