Advertisement
 
IT Disaster Recovery
Subscribe to IT Disaster Recovery

The Lead

Business Continuity Professionals Faced with Increasing Technology Challenges

September 26, 2014 11:37 am | by Joe Shust, Editor | Articles | Comments

Technology is a critical part of business continuity planning and many of the challenges the BC community faces when it comes to that technology are very similar.  In such a connected world, business continuity professionals need to be aware of any number of technology disruptions, as well as new products to help in planning.  

Banks Preparing to Re-Issue Debit, Credit Cards to Home Depot Breach Victims

September 26, 2014 10:26 am | by Associated Press | News | Comments

Some lenders are...

Sandwich Chain Believes Customer Data was Stolen from 216 Stores

September 26, 2014 9:55 am | News | Comments

Jimmy John's sandwich chain said that it believes...

Department of Homeland Security Offers Advice on Preventing Data Breaches

September 22, 2014 2:09 pm | by Associated Press | News | Comments

Data breaches at retailers aren't going away but...

View Sample

FREE Email Newsletter

Weekly news and features for business continuity professionals

Nine Charged with Fraud in Alleged Hack of Bank's Card Payment System

September 22, 2014 12:02 pm | by Associated Press | News | Comments

A Spanish judge charged nine people with fraud Sunday for allegedly participating in the theft of $45 million after a massive hacking of a bank's card payments system.  Judge Eloy Velasco of Spain's National Court said the suspects include seven Romanians and two Spaniards, who allegedly fraudulently extracted money from ATMs.

Scaling Backup Capacity the Easy Way

September 19, 2014 11:36 am | by Chris Schin, VP of Products, Zetta.net | Blogs | Comments

Chris Schin, Vice President of Products for Zetta.net, discusses storage capacity, how it is increasing and the difficulty that causes when backing up data.  He discusses using cloud-based storage as a way to alleviate the ever-increasing amount of data most companies are faced with.

Senate Investigators Accuse Chinese Military of Spying

September 19, 2014 11:19 am | by Associated Press | News | Comments

China's military hacked into computer networks of civilian transportation companies hired by the Pentagon at least nine times, breaking into computers aboard a commercial ship, targeting logistics companies and uploading malicious software onto an airline's computers, Senate investigators said.

Advertisement

Investigation Finds HealthCare.gov Has 'Significant Security Flaws'

September 19, 2014 11:04 am | News | Comments

HealthCare.gov, the health insurance website serving more than 5 million Americans, has significant security flaws that put users' personal information at risk, nonpartisan congressional investigators have concluded.  The Government Accountability Office said the Obama administration must resolve more than 20 specific security issues.

Results of Unitrends Data Governance Survey are In

September 16, 2014 9:11 am | by Joe Shust, Editor | Articles | Comments

Results of the Unitrends and Continuity Insights Data Governance Survey show that resilience professionals are in agreement on why they have programs and what they are attempting to achieve through business continuity plans.  Topics covered include mertrics, standards and the Cloud. 

Justice Department Seeking Ways to Combat Credit Card Fraud Overseas

September 16, 2014 8:20 am | by Associated Press | News | Comments

Justice Department officials are seeking a tougher law to combat overseas credit card trafficking, an increasingly lucrative crime that crosses national boundaries.  Authorities say the current statute is too weak because it allows people in other countries to avoid prosecution if they stay outside the United States when buying and selling the data and don't pass their illicit business through the U.S.

Security Clearance Company to Lose Government Contract After Data Breach

September 10, 2014 2:04 pm | by Associated Press | News | Comments

The federal Office of Personnel Management plans to terminate its massive contracts with USIS, the major security clearance contractor targeted last month by a cyberattack, agency, congressional and company officials say. The computer network intrusion compromised the personal files of as many as 25,000 government workers.

In Re-Routing of Plane, Lines Blurred Between Digital World and Reality

September 4, 2014 2:38 pm | by Associated Press | News | Comments

 The boundary between the online and physical worlds got blurry last week when Sony's PlayStation Network was disabled by an online attack, while simultaneously an American Airlines passenger jet carrying a Sony executive was diverted due to a bomb threat on Twitter.  Experts say that's a wakeup call for a world still coming to grips with cybersecurity: What goes down online can be equally if not more disruptive in the real world.

Advertisement

Home Depot Investigating Major Data Breach

September 3, 2014 1:48 pm | by Associated Press | News | Comments

Atlanta-based home Depot  is working with both banks and law enforcement to investigate "unusual activity" that would point to a hack.  Hackers have broken security walls for many retailers in recent months, including Target, grocery store chain Supervalu, P.F. Chang's and the thrift store operations of Goodwill.

The Importance of the Cyber Supply Chain in Business Continuity

September 2, 2014 9:13 am | by Ken Simpson, MBCI, CORP | Articles | Comments

Ken Simpson discusses the importance of the "cyber supply chain" in preparing for cyber threats and how business continuity and logistics can go hand-in-hand for organizations looking to prevent such threats.  He also discusses sharing the critical cyber threats with senior management. 

Account Numbers, Expiration Dates Compromised in Grocery Store Data Breach

August 19, 2014 10:43 am | by Associated Press | News | Comments

The grocery chain Supervalu said Friday that it may have suffered a data breach at stores in as many as five states.  Hackers accessed a network that processes store transactions. Account numbers, expiration dates, cardholders' names and other information may have been stolen, the company said.

Data Generated by DDoS Attacks Almost Impossible for Websites to Withstand

August 19, 2014 10:40 am | by Dr. Bill Highleyman | Articles | Comments

Dr. Bill Highleyman, Managing Editor of the Availability Digest, will be presenting a paper on Distributed Denial of Service (DDoS) attacks at the Continuity Insight’s Regional Business Continuity Conference to be held at the Wyndham Hotel in New York City on October 7 and 8, 2014.

Déjà Vu All Over Again: In Project-Based IT Accounting, History is Repeating Itself…

August 5, 2014 11:20 am | by By Don Boxley, Co-Founder and CEO, DH2i | Blogs | Comments

For many organizations, the project-based accounting approach, in which departments “buy” datacenter utilization based on specific project needs, is getting out of hand for both IT and the business units it serves. Virtualization should have made project-based IT simple and cost-effective. Instead, the four vCPU minimum required by Microsoft’s SQL Server licensing means history is repeating itself.

Advertisement

Chinese National Charged in Alleged Conspiracy to Steal Patented Seeds from U.S. Companies

July 21, 2014 4:42 pm | News | Comments

Patented seed allegedly stolen from U.S. seed corn companies as part of what prosecutors say was a conspiracy involving seven employees of a Chinese agriculture biotechnology company to steal trade secrets could be worth as much as $500 million, federal prosecutors said last week.

All That Glitters is No Longer Gold:Shylock Trojan Gang Hit by Takedown

July 21, 2014 2:39 pm | by Symantec | Symantec Corp. | Blogs | Comments

An international law enforcement operation has struck a major blow against the gang behind Shylock, one of the world’s most dangerous financial Trojans. The takedown, which was led by the UK National Crime Agency, resulted in the seizure of a command and control (C&C) servers, in addition to domains that Shylock uses for communication between infected computers.

New York Breaches Have Exposed 23 Million Private Records in Past Eight Years

July 15, 2014 10:29 am | by Michael Virtanen, Associated Press | News | Comments

Nearly 23 million private records of New Yorkers have been exposed in data security breaches reported by more than 3,000 businesses, nonprofits and governments over the past eight years.  Deliberate hacking was responsible for 40 percent of the 5,000 incidents.

Man Hacked Hundreds of Retail Businesses, Authorities Said

July 14, 2014 2:31 pm | by Associated Press | News | Comments

Authorities say a 30-year old Russian man recently arrested on bank fraud and other charges was also found to have hacked into computers at restaurants in Western Washington, hundreds of other retail businesses and even the Phoenix Zoo.   

Video:The Critical Importance of Cyber Preparedness

July 14, 2014 8:56 am | Videos | Comments

Steve Ross, Executive Principal for Riskmasters Inc., discusses the importance of being prepared for interruptions caused by cyber attacks and why business continuity professionals should put more effort into planning for such attacks   

Germany, U.S. Concerned About Chinese Spying

July 7, 2014 4:14 pm | by Associated Press | News | Comments

German Chancellor Angela Merkel criticized industrial spying Monday while on a visit to China, which Germany and other governments have cited as a global center for economic espionage.  The United States and other governments complain China's military, a leader in cyber warfare, steals foreign trade secrets to help the country's vast state-owned industrial sector.

Hackers Target Major League Baseball Squad

July 7, 2014 3:29 pm | by Associated Press | News | Comments

The Houston Astros said Monday that they have been the victims of hackers who accessed their servers and published months of internal trade talks on the Internet.  The team is working with the FBI and Major League Baseball security to try who was responsible for the breach.

Study Shows Impact of Credit Card Fraud

June 30, 2014 1:33 pm | by Associated Press | News | Comments

A global fraud study of more than 6,100 consumers across 20 countries revealed that one in four consumers is a victim of card fraud in the last five years.  Nearly 25 percent of consumers changed financial institutions due to dissatisfaction after experiencing fraud.

U.S. Wants to Resume Discussions on Hacking With China

June 30, 2014 10:38 am | by Matthew Pennington, Associated Press | News | Comments

The United States will urge China to resume discussions on cyber security that were abruptly suspended after the Americans charged five Chinese military officers with hacking into U.S. companies to steal trade secrets.  After the indictments against the five officers were unsealed in May, Beijing pulled the plug on the group that had been set up a year ago in what Washington.

Video: All Recoveries are Not Equal:Print and Mail Operations Often Require Additional Consideration

June 23, 2014 9:18 am | Videos | Comments

Chris Durfee, Director of Sales and Marketing for MailGard, discusses why some items, like print and mail operations, sometimes require extra consideration during recovery and why not all recovery projects are created equal.      

Target Glitch Not a Data Security Issue

June 16, 2014 11:54 am | by Associated Press | News | Comments

Target Corp. said a glitch in its system caused delays at checkout registers at some of its U.S. stores but it wasn't due to a data security issue or a hacker. Customers across the country took to social media to report long check-out lines Sunday night due to registers not working.

Video:Leveraging Remote Workplace Alternatives

June 16, 2014 9:24 am | Videos | Comments

Recent incidents have prompted Kimberly Hirsch, Senior Business Partner with Target Corporation, to leverage remote workplace alternatives in the event of facility outages.  Hear her thoughts in this week’s video installment.   Stay tuned for next week’s video where Chris Wright with Amgen, emphasizes the importance clear roles and responsibilities during your exercises.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading