Business Continuity Archive
I’ve talked, for some years, about the disconnect between managements stating that cyber security is on their agenda, or under control, and the rapidly rising number of data breaches, as reported in multiple surveys and reports, as well as increasingly …
As a Google search will quickly demonstrate, newspaper stories about a dispute between Spamhaus and Cyberbunker have proliferated over the last few days and are allegedly the direct cause of many Internet users experiencing slowing connections, degraded online services and …
Midway through International Business Continuity Week, someone asked me when Disaster Recovery Week started. Although, in the Euro area, it appears that Disaster Recovery Week is every week, most people don’t really see what the difference is between ‘business continuity’ and …
While China, unsurprisingly, denies involvement in hacking (China Denies Hacks, Points Finger at U.S), the business focus should be on dealing with the impacts of successful hacks – not only on your own websites and networks, but also on those …
Alan Calder
November 22, 2011
Business and the Economy, Business Continuity, Compliance, Cyber Security, Data Breaches, Data Protection, ISMS, ISO 27001, ISO 27002 (ISO 17999), IT Governance, IT Security, Mobile Devices
We carried out an analysis of the data breach cases which led to the UK’s Information Commissioner extracting an undertaking from the organisation concerned. Over the last 18 months (May 2010 – mid-November 2011), this is the breakdown of 85 …
A recently published study into Global 2000 IT-spending intentions identified that 39% of corporations are spendng more on information security this year, with 37% planning to increase spending in 2012. With cyber security identified as a key strategic threat facing organisations …
Alan Calder
November 11, 2011
Business and the Economy, Business Continuity, Compliance, Cyber Security, Data Breaches, Data Protection, Disaster Recovery, ISMS, ISO 27001, ISO 27002 (ISO 17999), IT Governance, IT Security, PCI DSS, social media
At the end of October, we submitted the manuscript of the 5th Edition of our best-selling book on implementing an ISO27001 Information Security Management System (ISMS) to our external publisher, Kogan Page. It should be in bookshops across the world in Spring …
Among the most common errors of judgement that I see from company directors is the failure to carry out regular and detailed reviews of their business continuity arrangements. For most boards, the whole discussion is boring. It becomes even more boring …
‘Nearly 1in 5 businesses suffer a major disruption every year – and only 28% of them had any form of continuity plan’ – reports Adam Bernstein who continues, in Business Continuity: the small firm view, to provide good, sound advice …
If a hacker issues a statement saying they have broken into your website and stolen 1 million plain text passwords, as well as compromising a whole lot of other information, what would you do? And if you’re the same global corporation that was …