Advertisement
 
Data Backup
Subscribe to Data Backup

The Lead

Feds Shut Down Background Check Database over Flaw

June 30, 2015 11:20 am | by Ken Dilanian, Associated Press | News | Comments

 The federal personnel agency whose records were plundered by hackers linked to China says it has temporarily shut down a massive database used to update and store background investigation records. The agency says a newly discovered flaw left the system vulnerable to hackers.

Cyber Threats Not Stopping Any Time Soon

June 25, 2015 11:23 am | by Joe Shust, Editor | Blogs | Comments

It has been an interesting couple of weeks in the realm of cyber security, particularly for...

US Personnel Office Not the Worst for Weak Cyber Security

June 25, 2015 11:07 am | by Ken Dilanian, Associated Press | News | Comments

The federal government has for years failed to take basic steps to protect its data from hackers...

Agency Chief: Contractor's Credential Used to Breach System

June 25, 2015 11:00 am | by Deb Riechmann and Ken Dilanian, Associated Press | News | Comments

The head of the government agency that suffered two massive cyber attacks said a hacker gained...

View Sample

FREE Email Newsletter

Weekly news and features for business continuity professionals

Cyber Theft Adds to US-China Tensions Ahead of Upcoming Talks

June 23, 2015 11:39 am | by Matthew Pennington, Associated Press | News | Comments

Tensions between the U.S. and China are growing over its island-building in the South China Sea and over suspicions that Beijing was behind a massive hack into a federal government server that resulted in the theft of personnel and security clearance records of 14 million employees and contractors.

Brand Tarnished, Cardinals Likely to Avoid Economic Damage

June 23, 2015 11:29 am | by Jim Salter, Associated Press | News | Comments

The St. Louis Cardinals have been the toast of their Midwestern city for generations, a source of civic pride as one of baseball's most successful and cherished franchises.  Suddenly, they're an embarrassment, under federal investigation for allegedly hacking into the computer database of an opponent, the Houston Astros, whose general manager, Jeff Luhnow, is a former Cardinals executive.

Data Breach About More Than Just Baseball

June 17, 2015 4:01 pm | by Joe Shust, Editor | Blogs | Comments

It’s not often that sports are discussed in the business continuity community, especially with so many of its members working with large, multi-national firms.  However, a recent high profile data breach involving two Major League Baseball teams is worth watching.

Advertisement

Fed Agency Blames Giant Hack on 'Neglected' Security System

June 17, 2015 3:43 pm | by Ken Dilanian, AP Intelligence Writer | News | Comments

The agency that allowed hackers linked to China to steal private information about nearly every federal employee — and detailed personal histories of military and intelligence workers with security clearances — failed for years to take basic steps to secure its computer networks, officials acknowledged to Congress.

Cardinals Stand Accused of Hacking Astros Player Database

June 17, 2015 3:25 pm | by R.B. Fallstrom and Kristie Rieken, AP Sports Writers | News | Comments

Federal law enforcement authorities are investigating whether the Cardinals illegally accessed a computer database of the Houston Astros. The aim was obtaining information from a front office headed by a former top aide who helped transform St. Louis' scouting operation to a sabermetrics-based system, a person familiar with the situation told The Associated Press.

Vast Data Warehouse Raises HealthCare.gov Privacy Concerns

June 15, 2015 4:05 pm | by Ricardo Alonso-Zaldivar | News | Comments

A government data warehouse that stores information indefinitely on millions of HealthCare.gov customers is raising privacy concerns at a time when major breaches have become distressingly common.  Known as MIDAS, the system is described on a federal website as the "perpetual central repository" for information collected under President Barack Obama's health care law.

Continuing to Operate After a Breach

June 11, 2015 10:45 am | by Joe Shust, Editor | Videos | Comments

Pete O'Dell, Founder of Swan Island Networks, discusses how companies can continue to operate after a data breach and why it is critical for continuity and eventual recovery from cyber attacks.  This is the second in a two part series of videos.

Preparing for and Preventing Cyber Attacks

June 9, 2015 11:41 am | by Joe Shust, Editor | Videos | Comments

Pete O'Dell, Founder of Swan Island Networks, discusses the potential for cyber attacks, why companies often fall victim to those attacks and what they can do to detect and prevent them.  This will be the first in a two part series of videos.

Advertisement

After Hacking, Government Workers Warned of Potential Fraud

June 9, 2015 11:25 am | by Ted Bridis, Ken Dilanian and Eric Tucker, Associated Press | News | Comments

An immense hack of millions of government personnel files is being treated as the work of foreign spies who could use the information to fake their way into more-secure computers and plunder U.S. secrets.  Federal employees were told in a video to change all their passwords, put fraud alerts on their credit reports and watch for attempts by foreign intelligence services to exploit them.

IRS Hack Puts Renewed Focus on Cyber Security

May 28, 2015 11:28 am | by Joe Shust, Editor | Blogs | Comments

Authorities are still investigating a hack that led to the theft of personal information from more than 100,000 taxpayers at the Internal Revenue Service (IRS).  This isn’t the first time the IRS, or any government institution, has been hacked, but each time it happens it seems to renew the discussion on the importance of cyber security.

Takeaways on Cyber Security from CIMC 2015

May 21, 2015 10:12 am | by Jenny Chen, Senior Certified Expert IT Consultant, IBM | Blogs | Comments

Jenny Chen, Senior Certified Expert IT Consultant for IBM, discusses her experience at the 2015 Continuity Insights Management Conference, including her takeaways about the state of cyber security and the good, bad and ugly ways in which BC pros deal with it.

Romania Turns Hacking Crisis into Advantage, Helping Ukraine

May 14, 2015 10:45 am | by Alison Mutler, Associated Press | News | Comments

Romania, known more for economic disarray than technological prowess, has become one of the leading nations in Europe in the fight against hacking. The reason: the country's own battle against Internet renegades and a legacy of computing excellence stemming from Communist dictator Nicolae Ceausescu's regime.

State Department Concerned China Behind Cyber Attack on U.S. Sites

May 12, 2015 10:29 am | by Matthew Pennington, Associated Press | News | Comments

State Department spokesman Jeff Rathke's comments follow complaints from anti-online censorship group Greatfire.org that Chinese authorities carried out denial-of-service attacks in late March that intermittently shut down San Francisco-based Github, a U.S.-based computer-code sharing site that hosts some of Greatfire's data. Greatfire.org said it was a direct target of similar attacks earlier that month.

Advertisement

It's All About Restoration, Not Backup! … Or is it?

May 7, 2015 11:28 am | by Joe Starzyk, Senior Business Development Executive, IBM Resiliency Services | Blogs | Comments

Joe Starzyk, Senior Business Development Executive for IBM Resiliency Services, discusses the importance of focusing on data backup, different ways organizations should back their data up and how it can and will lead to faster recovery times in the long run.

Could Growing Cyber Focus be a Boon for Business Continuity?

May 5, 2015 11:20 am | by Joe Shust, Editor | Blogs | Comments

A new program, co-funded by the National Science Foundation (NSF) and National Security Agency (NSA), is looking to create an interest in cyber security for the next generation. Called GenCyber, the program establishes camps and courses for teenagers that provide instruction about various tech and cyber security topics.  The program is relatively new and sparsely funded at this point, but increasing demand may change that very soon. 

Summer Camps with a Mission: To Create Cyber Security Experts

May 5, 2015 11:13 am | by Wilson Ring, Associated Press | News | Comments

The camps are part of an expanding but modestly funded program called GenCyber that is funded by the National Science Foundation and National Security Agency. The agencies are taking the long view in fulfilling an insatiable need for cyber security experts, both in government and private industry.

A Good Lesson in Continuous Availability

April 30, 2015 11:11 am | by Michael Puldy, IBM | Blogs | Comments

Michael Puldy, Service and Solution Executive for IBM Resiliency Services North America, discusses continuous availability, cyber resilience, protecting your reputation and the importance of effective social media messaging for businesses.

Dealing with Disasters at Dell: Lessons Learned and Solutions Found

April 28, 2015 2:33 pm | Webinars

The presenters will discuss the many “oops and gotchas” of Disaster Recovery, along with several lessons learned. For example, given the critical importance of email communication, learn how Dell ensures Email Availability and communication regardless of the outage or interruption. 

Top Five Plenary Speaker Quotes from CIMC2015

April 28, 2015 11:30 am | by Joe Shust, Editor | Articles | Comments

The 2015 Continuity Insights Management Conference featured sessions by business continuity professionals from every area of the industry, from emergency management to IT/disaster recovery. Here are the top five quotes from our three plenary speakers.

Starbucks Stores Reopen After Computer Glitch

April 27, 2015 11:51 am | News | Comments

 Starbucks was back in business after a computer outage forced thousands of its stores to close early last week.  The glitch affected registers at 7,400 company-operated stores in the U.S. and 1,000 in Canada, and prompted some stores to give away drinks.

O'Dell Discusses Cyber Security to Kick Off CIMC 2015

April 21, 2015 1:15 pm | by Joe Shust, Editor | Articles | Comments

The 2015 Continuity Insights Management Conference got underway Monday, April 20 as Pete O’Dell, founder of Swan Island Networks and author of Cyber 24-7: Risks, Leadership and Sharing, spoke to a capacity crowd about the risks and impacts of cyber attacks.

Researcher Denied Airline Flight after Tweet About Hacking

April 21, 2015 12:30 pm | by Jack Gillum, Associated Press | News | Comments

United Airlines stopped a prominent security researcher from boarding a California-bound flight  following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked.  The researcher, Chris Roberts, attempted to board a United flight from Colorado to San Francisco to speak at a major security conference there this week.  

As Data Concerns Grow, Can DRaaS Help Business Continuity Professionals?

April 16, 2015 11:54 am | by Joe Shust, Editor | Articles | Comments

As organizations gather more data and turn to cloud-based solutions to store it, disaster recovery has become an even bigger focus.  Some companies have turned to disaster recovery as a service (DRaaS) solutions in an effort to find a balance between cost efficiency and security.

NIST Framework Can Help Business Continuity Professionals Prepare for Cyber Attacks

April 14, 2015 11:37 am | by Joe Shust, Editor | Articles | Comments

Serious, targeted cyber attacks are a relatively new threat that have become more and more dangerous as organizations rely more on technology to store their data and operate their business on a day-to-day basis. The National Institute of Standards and Technology (NIST) Framework contains a set of guidelines and best practices to help prevent and defend against cyber attacks.

Hackers Keep Trying New Targets in Search of Easy Data

April 14, 2015 11:03 am | by Brandon Bailey, AP Technology Writer | News | Comments

The health care sector has become the hot target for hackers in recent months, according to researchers at Symantec, a leading cyber security company that says it's also seeing big increases in "spear-phishing," ''ransomware" and efforts to exploit newly discovered vulnerabilities in software used by a wide range of industries.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading