Companies are afraid that going public would damage their reputations, sink stock prices or spark lawsuits.
For businesses that depend on secure Internet transactions, attacks to their Web services over Secure Socket Layer (SSL) protocol can knock servers offline resulting in lost revenue and decreased consumer trust.
Paragon Drive Backup 11 is a reliable, high-performance, imaging software solution designed for workstation and server data protection and comprehensive business continuity.
A British banking group says it has almost fully cleared up a weeklong banking glitch which delayed posting credits and debits to millions of customers with its NatWest and Royal Bank of Scotland accounts.
LulzSec has claimed responsibility for assaults on sites run by the Central Intelligence Agency, the U.S. Public Broadcasting Service, and media mogul Rupert Murdoch's News International.
Infineta Announces Performance Breakthrough For Critical Data Center Applications Traversing Congested WANsJune 19, 2012 9:56 am | News | Comments
FlowTune enables enterprises to meet their recovery point objective and recovery time objective goals while utilizing the WAN at full capacity, running multiple applications over the WAN, and making use of cost-effective WAN alternatives for overall OpEx reduction.
Technology has transformed the way we do business and that transformation puts the data center directly into the domain of the business-oriented BCM practitioner because the data center is the largest source of operational risk in any organization. If BCM really wants to make a strong, significant contribution to mitigate risk then the data center is precisely where the practitioner needs to place focus.
Business social network LinkedIn said it is investigating reports that more than six million passwords have been stolen and leaked onto the Internet.
The Obama administration is warning American businesses about an unusually potent computer virus that infected Iran's oil industry even as suspicions persist that the United States is responsible for secretly creating and unleashing cyberweapons against foreign countries.
Double-Take 6.0 helps companies protect profitability and reputation by providing affordable real-time asynchronous data replication, enabling immediate recovery from any system outage.
Continuity Insights New York is the long-awaited return of a dedicated business continuity event to the Northeast. Commissioner Jerome Hauer from the New York State Department of Homeland Security and Commissioner Joseph Bruno from the New York City Office of Emergency Management will open the event with a plenary session on The State of Preparedness.
In January 2011, Australia's third-largest city came to a standstill when torrential rains caused the Brisbane River to burst its banks and flood much of the CBD and surrounding suburbs. Bryn Orr and Alem Saric, Emergency Management Consultants at Trimevac, speak with Continuity Insights about the level of preparedness prior to the floods, recovery efforts, lessons learned and the shark that was spotted on a suburban street.
SunGard has also established a partnership with The Carnegie Mellon Software Engineering Institute to use their Resilience Management Model CERT-RMM, a management model for operational resilience.
A massive, data-slurping cyberweapon is circulating in the Middle East, and computers in Iran appear to have been particularly affected, according to a Russian Internet security firm.
By enabling 24/7 access to critical patient information, NetSafe ensures that CHE hospitals maintain uninterrupted patient care during a system or network downtime.
Version 3.2SP1 of the QuorumLabs disaster recovery solution features Windows Share Restore for the point-in-time recovery of shared network files in a familiar Windows folder interface as well as the ability to restore email in minutes from a Microsoft Exchange mail store or data from a SharePoint database.
The complexities of maintaining mobility and wireless capabilities during the event of a disaster or security threat has become an increasing aspect of importance for businesses as they consider business continuity planning. Fully 67 percent of executives surveyed have included wireless network capabilities as part of their business continuity plans, while 52 percent will be investing in new telecom technologies to support their IT infrastructures.
VirtualSharp Software announced that its ReliableDR disaster recovery assurance solution now supports customers running VMware Virtual Infrastructure with Oracle Pillar Axiom storage systems.
The company’s approach to business continuity consulting is “prudent preparation results in practical planning.” Stouffer has an extensive IT background and over 17 years experience in providing continuity services.
Sensitive data that was compromised in a massive health records breach had been lingering on state computers for months, contrary to the standard procedure that it be erased within a day of being submitted.
TrustSphere Uses Security Intelligence To Uniquely Counter Social Attacks Against Organizations & ExecutivesMay 7, 2012 10:04 pm | News | Comments
TrustSphere, a pioneer of digital communication integrity solutions, today announced the availability of TrustVault, a trust-based technology solution that protects organizations from some of today's most difficult to handle email-based threats.
Kelly McDonough, President/CEO of First Alliance Credit Union, talks about how to scare your C-level executives into supporting your BCM program, how credit unions do more with less, the “end point” for business continuity, and why cloud will make businesses and families more resilient.
In order to overcome the numerous challenges associated with the recovery, Convergys employed workload transition, work-at-home implementation, mobile work-area-recovery, alternate site identification and build-out, and satellite connectivity. Additionally, a tiered incident command team was used to assess the impacts of the flooding and administer the solutions.
The bill would encourage companies and the federal government to share information collected on the Internet to help prevent electronic attacks from cybercriminals, foreign governments and terrorists.
Microsoft and the banking industry on Monday provided a detailed, behind-the-scenes account of an operation they said disrupted a major cybercrime operation that used malicious software to allegedly steal $100 million from consumers over the last five years.