Advertisement
 
IT Disaster Recovery
Subscribe to IT Disaster Recovery

The Lead

Scaling Backup Capacity the Easy Way

September 19, 2014 11:36 am | by Chris Schin, VP of Products, Zetta.net | Blogs | Comments

Chris Schin, Vice President of Products for Zetta.net, discusses storage capacity, how it is increasing and the difficulty that causes when backing up data.  He discusses using cloud-based storage as a way to alleviate the ever-increasing amount of data most companies are faced with.

Senate Investigators Accuse Chinese Military of Spying

September 19, 2014 11:19 am | by Associated Press | News | Comments

China's military hacked into computer networks of...

Investigation Finds HealthCare.gov Has 'Significant Security Flaws'

September 19, 2014 11:04 am | News | Comments

HealthCare.gov, the health insurance website serving...

Results of Unitrends Data Governance Survey are In

September 16, 2014 9:11 am | by Joe Shust, Editor | Articles | Comments

Results of the Unitrends and Continuity Insights...

View Sample

FREE Email Newsletter

Weekly news and features for business continuity professionals

Justice Department Seeking Ways to Combat Credit Card Fraud Overseas

September 16, 2014 8:20 am | by Associated Press | News | Comments

Justice Department officials are seeking a tougher law to combat overseas credit card trafficking, an increasingly lucrative crime that crosses national boundaries.  Authorities say the current statute is too weak because it allows people in other countries to avoid prosecution if they stay outside the United States when buying and selling the data and don't pass their illicit business through the U.S.

Security Clearance Company to Lose Government Contract After Data Breach

September 10, 2014 2:04 pm | by Associated Press | News | Comments

The federal Office of Personnel Management plans to terminate its massive contracts with USIS, the major security clearance contractor targeted last month by a cyberattack, agency, congressional and company officials say. The computer network intrusion compromised the personal files of as many as 25,000 government workers.

In Re-Routing of Plane, Lines Blurred Between Digital World and Reality

September 4, 2014 2:38 pm | by Associated Press | News | Comments

 The boundary between the online and physical worlds got blurry last week when Sony's PlayStation Network was disabled by an online attack, while simultaneously an American Airlines passenger jet carrying a Sony executive was diverted due to a bomb threat on Twitter.  Experts say that's a wakeup call for a world still coming to grips with cybersecurity: What goes down online can be equally if not more disruptive in the real world.

Advertisement

Home Depot Investigating Major Data Breach

September 3, 2014 1:48 pm | by Associated Press | News | Comments

Atlanta-based home Depot  is working with both banks and law enforcement to investigate "unusual activity" that would point to a hack.  Hackers have broken security walls for many retailers in recent months, including Target, grocery store chain Supervalu, P.F. Chang's and the thrift store operations of Goodwill.

The Importance of the Cyber Supply Chain in Business Continuity

September 2, 2014 9:13 am | by Ken Simpson, MBCI, CORP | Articles | Comments

Ken Simpson discusses the importance of the "cyber supply chain" in preparing for cyber threats and how business continuity and logistics can go hand-in-hand for organizations looking to prevent such threats.  He also discusses sharing the critical cyber threats with senior management. 

Account Numbers, Expiration Dates Compromised in Grocery Store Data Breach

August 19, 2014 10:43 am | by Associated Press | News | Comments

The grocery chain Supervalu said Friday that it may have suffered a data breach at stores in as many as five states.  Hackers accessed a network that processes store transactions. Account numbers, expiration dates, cardholders' names and other information may have been stolen, the company said.

Data Generated by DDoS Attacks Almost Impossible for Websites to Withstand

August 19, 2014 10:40 am | by Dr. Bill Highleyman | Articles | Comments

Dr. Bill Highleyman, Managing Editor of the Availability Digest, will be presenting a paper on Distributed Denial of Service (DDoS) attacks at the Continuity Insight’s Regional Business Continuity Conference to be held at the Wyndham Hotel in New York City on October 7 and 8, 2014.

Déjà Vu All Over Again: In Project-Based IT Accounting, History is Repeating Itself…

August 5, 2014 11:20 am | by By Don Boxley, Co-Founder and CEO, DH2i | Blogs | Comments

For many organizations, the project-based accounting approach, in which departments “buy” datacenter utilization based on specific project needs, is getting out of hand for both IT and the business units it serves. Virtualization should have made project-based IT simple and cost-effective. Instead, the four vCPU minimum required by Microsoft’s SQL Server licensing means history is repeating itself.

Advertisement

Chinese National Charged in Alleged Conspiracy to Steal Patented Seeds from U.S. Companies

July 21, 2014 4:42 pm | News | Comments

Patented seed allegedly stolen from U.S. seed corn companies as part of what prosecutors say was a conspiracy involving seven employees of a Chinese agriculture biotechnology company to steal trade secrets could be worth as much as $500 million, federal prosecutors said last week.

All That Glitters is No Longer Gold:Shylock Trojan Gang Hit by Takedown

July 21, 2014 2:39 pm | by Symantec | Symantec Corp. | Blogs | Comments

An international law enforcement operation has struck a major blow against the gang behind Shylock, one of the world’s most dangerous financial Trojans. The takedown, which was led by the UK National Crime Agency, resulted in the seizure of a command and control (C&C) servers, in addition to domains that Shylock uses for communication between infected computers.

New York Breaches Have Exposed 23 Million Private Records in Past Eight Years

July 15, 2014 10:29 am | by Michael Virtanen, Associated Press | News | Comments

Nearly 23 million private records of New Yorkers have been exposed in data security breaches reported by more than 3,000 businesses, nonprofits and governments over the past eight years.  Deliberate hacking was responsible for 40 percent of the 5,000 incidents.

Man Hacked Hundreds of Retail Businesses, Authorities Said

July 14, 2014 2:31 pm | by Associated Press | News | Comments

Authorities say a 30-year old Russian man recently arrested on bank fraud and other charges was also found to have hacked into computers at restaurants in Western Washington, hundreds of other retail businesses and even the Phoenix Zoo.   

Video:The Critical Importance of Cyber Preparedness

July 14, 2014 8:56 am | Videos | Comments

Steve Ross, Executive Principal for Riskmasters Inc., discusses the importance of being prepared for interruptions caused by cyber attacks and why business continuity professionals should put more effort into planning for such attacks   

Advertisement

Germany, U.S. Concerned About Chinese Spying

July 7, 2014 4:14 pm | by Associated Press | News | Comments

German Chancellor Angela Merkel criticized industrial spying Monday while on a visit to China, which Germany and other governments have cited as a global center for economic espionage.  The United States and other governments complain China's military, a leader in cyber warfare, steals foreign trade secrets to help the country's vast state-owned industrial sector.

Hackers Target Major League Baseball Squad

July 7, 2014 3:29 pm | by Associated Press | News | Comments

The Houston Astros said Monday that they have been the victims of hackers who accessed their servers and published months of internal trade talks on the Internet.  The team is working with the FBI and Major League Baseball security to try who was responsible for the breach.

Study Shows Impact of Credit Card Fraud

June 30, 2014 1:33 pm | by Associated Press | News | Comments

A global fraud study of more than 6,100 consumers across 20 countries revealed that one in four consumers is a victim of card fraud in the last five years.  Nearly 25 percent of consumers changed financial institutions due to dissatisfaction after experiencing fraud.

U.S. Wants to Resume Discussions on Hacking With China

June 30, 2014 10:38 am | by Matthew Pennington, Associated Press | News | Comments

The United States will urge China to resume discussions on cyber security that were abruptly suspended after the Americans charged five Chinese military officers with hacking into U.S. companies to steal trade secrets.  After the indictments against the five officers were unsealed in May, Beijing pulled the plug on the group that had been set up a year ago in what Washington.

Video: All Recoveries are Not Equal:Print and Mail Operations Often Require Additional Consideration

June 23, 2014 9:18 am | Videos | Comments

Chris Durfee, Director of Sales and Marketing for MailGard, discusses why some items, like print and mail operations, sometimes require extra consideration during recovery and why not all recovery projects are created equal.      

Target Glitch Not a Data Security Issue

June 16, 2014 11:54 am | by Associated Press | News | Comments

Target Corp. said a glitch in its system caused delays at checkout registers at some of its U.S. stores but it wasn't due to a data security issue or a hacker. Customers across the country took to social media to report long check-out lines Sunday night due to registers not working.

Video:Leveraging Remote Workplace Alternatives

June 16, 2014 9:24 am | Videos | Comments

Recent incidents have prompted Kimberly Hirsch, Senior Business Partner with Target Corporation, to leverage remote workplace alternatives in the event of facility outages.  Hear her thoughts in this week’s video installment.   Stay tuned for next week’s video where Chris Wright with Amgen, emphasizes the importance clear roles and responsibilities during your exercises.

Continuity Q&A:The Cloud

June 16, 2014 9:10 am | Articles | Comments

Continuity Insights spoke with Mark Carroll, Senior Vice President and Business Risk Officer at Income Research + Management, to discuss the cloud, its various business applications and some of the risk factors it brings for business continuity professionals.

Avalution Releases New Educational Video Series: Business Continuity Management 101

June 6, 2014 1:53 pm | by Avalution | Avalution Consulting | News | Comments

Avalution Consulting – a leading provider of business continuity consulting and software solutions – announced today the release of the Business Continuity Management (BCM) 101 educational video series. The six videos in BCM 101 provide straightforward answers to the most common business continuity-related questions

US Disrupts Hacking Schemes That Stole Millions

June 3, 2014 1:56 pm | by Joe Mandak, Eric Tucker, Associated Press | News | Comments

A band of hackers implanted viruses on hundreds of thousands of computers around the world, secretly seized customer bank information and stole more than $100 million from businesses and consumers, the Justice Department said Monday in announcing charges against the Russian man accused of masterminding the effort.

China Calls On U.S. to Stop 'Unscrupulous' Spying

May 27, 2014 12:29 pm | by Associated Press | News | Comments

The report by China's Internet Media Research Center, cited Tuesday by the official Xinhua News Agency, mentioned media reports of former NSA contractor Edward Snowden's leaks and said a subsequent investigation by Chinese authorities "confirmed the existence of snooping activities directed against China."

Europe's Move to Rein In Google Would Stall in US

May 27, 2014 12:24 pm | by Martha Mendoza, Toby Sterling, Associated Press Writers | News | Comments

"The ruling has significant implications for how we handle takedown requests," Google spokesman Al Verney said. "This is logistically complicated, not least because of the many languages involved and the need for careful review. As soon as we have thought through exactly how this will work, which may take several weeks, we will let our users know."

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading