Advertisement
 
Data Backup
Subscribe to Data Backup

The Lead

Takeaways on Cyber Security from CIMC 2015

May 21, 2015 10:12 am | by Jenny Chen, Senior Certified Expert IT Consultant, IBM | Blogs | Comments

Jenny Chen, Senior Certified Expert IT Consultant for IBM, discusses her experience at the 2015 Continuity Insights Management Conference, including her takeaways about the state of cyber security and the good, bad and ugly ways in which BC pros deal with it.

Romania Turns Hacking Crisis into Advantage, Helping Ukraine

May 14, 2015 10:45 am | by Alison Mutler, Associated Press | News | Comments

Romania, known more for economic disarray than technological prowess, has become one of the...

State Department Concerned China Behind Cyber Attack on U.S. Sites

May 12, 2015 10:29 am | by Matthew Pennington, Associated Press | News | Comments

State Department spokesman Jeff Rathke's comments follow complaints from anti-online censorship...

It's All About Restoration, Not Backup! … Or is it?

May 7, 2015 11:28 am | by Joe Starzyk, Senior Business Development Executive, IBM Resiliency Services | Blogs | Comments

Joe Starzyk, Senior Business Development Executive for IBM Resiliency Services, discusses the...

View Sample

FREE Email Newsletter

Weekly news and features for business continuity professionals

Could Growing Cyber Focus be a Boon for Business Continuity?

May 5, 2015 11:20 am | by Joe Shust, Editor | Blogs | Comments

A new program, co-funded by the National Science Foundation (NSF) and National Security Agency (NSA), is looking to create an interest in cyber security for the next generation. Called GenCyber, the program establishes camps and courses for teenagers that provide instruction about various tech and cyber security topics.  The program is relatively new and sparsely funded at this point, but increasing demand may change that very soon. 

Summer Camps with a Mission: To Create Cyber Security Experts

May 5, 2015 11:13 am | by Wilson Ring, Associated Press | News | Comments

The camps are part of an expanding but modestly funded program called GenCyber that is funded by the National Science Foundation and National Security Agency. The agencies are taking the long view in fulfilling an insatiable need for cyber security experts, both in government and private industry.

A Good Lesson in Continuous Availability

April 30, 2015 11:11 am | by Michael Puldy, IBM | Blogs | Comments

Michael Puldy, Service and Solution Executive for IBM Resiliency Services North America, discusses continuous availability, cyber resilience, protecting your reputation and the importance of effective social media messaging for businesses.

Advertisement

Dealing with Disasters at Dell: Lessons Learned and Solutions Found

April 28, 2015 2:33 pm | Webinars

The presenters will discuss the many “oops and gotchas” of Disaster Recovery, along with several lessons learned. For example, given the critical importance of email communication, learn how Dell ensures Email Availability and communication regardless of the outage or interruption. 

Top Five Plenary Speaker Quotes from CIMC2015

April 28, 2015 11:30 am | by Joe Shust, Editor | Articles | Comments

The 2015 Continuity Insights Management Conference featured sessions by business continuity professionals from every area of the industry, from emergency management to IT/disaster recovery. Here are the top five quotes from our three plenary speakers.

Starbucks Stores Reopen After Computer Glitch

April 27, 2015 11:51 am | News | Comments

 Starbucks was back in business after a computer outage forced thousands of its stores to close early last week.  The glitch affected registers at 7,400 company-operated stores in the U.S. and 1,000 in Canada, and prompted some stores to give away drinks.

O'Dell Discusses Cyber Security to Kick Off CIMC 2015

April 21, 2015 1:15 pm | by Joe Shust, Editor | Articles | Comments

The 2015 Continuity Insights Management Conference got underway Monday, April 20 as Pete O’Dell, founder of Swan Island Networks and author of Cyber 24-7: Risks, Leadership and Sharing, spoke to a capacity crowd about the risks and impacts of cyber attacks.

Researcher Denied Airline Flight after Tweet About Hacking

April 21, 2015 12:30 pm | by Jack Gillum, Associated Press | News | Comments

United Airlines stopped a prominent security researcher from boarding a California-bound flight  following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked.  The researcher, Chris Roberts, attempted to board a United flight from Colorado to San Francisco to speak at a major security conference there this week.  

Advertisement

As Data Concerns Grow, Can DRaaS Help Business Continuity Professionals?

April 16, 2015 11:54 am | by Joe Shust, Editor | Articles | Comments

As organizations gather more data and turn to cloud-based solutions to store it, disaster recovery has become an even bigger focus.  Some companies have turned to disaster recovery as a service (DRaaS) solutions in an effort to find a balance between cost efficiency and security.

NIST Framework Can Help Business Continuity Professionals Prepare for Cyber Attacks

April 14, 2015 11:37 am | by Joe Shust, Editor | Articles | Comments

Serious, targeted cyber attacks are a relatively new threat that have become more and more dangerous as organizations rely more on technology to store their data and operate their business on a day-to-day basis. The National Institute of Standards and Technology (NIST) Framework contains a set of guidelines and best practices to help prevent and defend against cyber attacks.

Hackers Keep Trying New Targets in Search of Easy Data

April 14, 2015 11:03 am | by Brandon Bailey, AP Technology Writer | News | Comments

The health care sector has become the hot target for hackers in recent months, according to researchers at Symantec, a leading cyber security company that says it's also seeing big increases in "spear-phishing," ''ransomware" and efforts to exploit newly discovered vulnerabilities in software used by a wide range of industries.

Federal Agents Accused of Siphoning more than $1 Million in Bitcoins

April 1, 2015 1:42 pm | by Kristin Bender and Paul Elias, Associated Press | News | Comments

Two former federal agents are accused of using their positions and savvy computer skills to siphon more than $1 million in digital currency from the online black market known as Silk Road while they and their agencies operated an undercover investigation into the website.

Most Personal Information Safe After British Airways Hack

April 1, 2015 12:48 pm | by Scott Mayerowitz, Associated Press | News | Comments

Some British Airways frequent flier accounts have been hacked, but the airline says that most personal information is safe.  The London-based airline did not say how many accounts were compromised, but said they have been locked down and can no longer be accessed.

Advertisement

New Cyber Security Bill Could be Coming Soon

March 25, 2015 4:21 pm | by Ken Dilanian, Associated Press | News | Comments

House intelligence committee leaders unveiled a bipartisan cyber security bill  amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.

Washington Announces Investigation Into Premera Cyber Attack

March 25, 2015 2:51 pm | by Derrick Nunnally, Associated Press | News | Comments

Insurance Commissioner Mike Kreidler said he plans to work with his counterparts in Alaska and Oregon to look into operations at Premera, which is based in Mountlake Terrace, Washington. The investigation will explore the cyber attack disclosed by Premera last week, in which hackers accessed the personal information of 11 million consumers, including 6 million in Washington, between last May and the exploit's Jan. 29 discovery.  

Hacker Must Disclose Assets to Federal Judge

March 23, 2015 10:19 am | by Martha Bellisle, Associated Press | News | Comments

A Russian man charged with hacking into U.S. businesses to steal thousands of credit card numbers has two weeks to provide a list of all of his assets to a federal judge, who will then decide if he has to pay for his federal public defender.

Social Security Data Error Raises Red Flags

March 16, 2015 3:36 pm | by Stephen Ohlemacher, Associated Press | News | Comments

Americans are getting older, but not this old: Social Security records show that 6.5 million people in the U.S. have reached the ripe old age of 112.  Social Security does not have death records for millions of these people, with the oldest born in 1869, according to a report by the agency's inspector general.

Dutch Judge Scraps Data Retention Law

March 12, 2015 10:59 am | by Associated Press | News | Comments

 A judge scrapped the Netherlands' data retention law , saying that while it helps solve crimes it also breaches the privacy of telephone and Internet users.  The ruling by a judge in The Hague followed a similar decision in April by the European Union's top court that wiped out EU data collection legislation it deemed too broad and offering too few privacy safeguards.

Journalist Once Again Targeted by Hackers

March 9, 2015 4:16 pm | News | Comments

Internet watchdog group Citizen Lab said in a report  that hackers who attacked a U.S. employee of Ethiopian Satellite Television in 2013 have recently launched a new round of attacks using upgraded espionage software.  Citizen Lab, which is based at the University of Toronto's Munk School of Global Affairs, says the hackers used three booby-trapped emails sent out in November and December.

Air Traffic Control System at Risk of Being Hacked

March 4, 2015 4:16 pm | by Joan Lowy, Associated Press | News | Comments

The Federal Aviation Administration has taken steps to protect the air traffic control system from cyber-based threats, but "significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation," said a report by the Government Accountability Office.

Getting Hacked Could Have Legal Repercussions

February 17, 2015 11:54 am | by Joe Shust, Editor | Articles | Comments

Whether data is hosted on private servers or in a public cloud, every organization faces a litany of legal liability if they are ever victims of a breach.Experienced business continuity professionals understand that recovering from a data breach is expensive and can cause massive down time. They need to work with their organization's IT/DR staff to prevent them.

Can You Trust Your Public Cloud?

February 12, 2015 11:11 am | by Bill Highleyman, Managing Editor, Availability Digest | Blogs | Comments

Bill Highleyman Managing Editor of Availability Digest, discusses placing trust in the public cloud and how specific examples of cloud failures, some by large and well respected companies, demonstrate that the technology still has a long way to go,

New Agency Would Coordinate U.S. Cyber Threat Intelligence

February 12, 2015 10:28 am | by Ken Dilanian, Associated Press | News | Comments

The White House is setting up a new agency designed to coordinate cyber threat intelligence that currently is spread across the U.S. government.  Currently, government expertise in analyzing the various cyber threats resides in a number of agencies, including the FBI, the Department of Homeland Security, the National Security Agency and U.S. Cyber Command.

Cloud Risk – Chance of Showers

February 10, 2015 11:41 am | by Pete O'Dell | Articles | Comments

Cloud computing is an increasingly important IT option for organizations of all sizes.  There are many different ways of sizing, configuring and implementing cloud based solutions and new security methods are continually evolving. Like every legitimate IT option, there are trade-offs and risks associated with the deployment and continued used of a cloud architecture

Health Care Records a Prime Target for Hackers

February 9, 2015 4:09 pm | by Tom Murphy and Brandon Bailey, Associated Press | News | Comments

Those seemingly harmless medical forms everyone fills out before seeing a doctor can lead to identity theft if they get into the wrong hands.  Names, birthdates and — more importantly — Social Security numbers can help hackers open fake credit lines, file false tax returns and create false medical records. And health care businesses can lag far behind banks, credit card companies and retailers in protecting such sensitive information. 

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading