Thank you for visiting! This site is dedicated to my clients, peers, friends, and others interested in keeping up on some of the articles, news, and trends in continuity management and related professions that have caught my interest.
In preparing for battle I have always found that plans are useless,
but planning is indispensable. – Dwight D. Eisenhower
by Stephen Langley
Centre for Security Failures Studies, UK
‘Crisis Management, Disaster Response, Emergency Management, Business Continuity Management: these are all names for the same process.’ Discuss the validity of this statement, referring to the theoretical models and the literature. Throughout the assignment you should discuss the practical implementation of strategies, plans and procedures.
This question requires the terms ‘crisis management, disaster response, emergency management, and business continuity management’ to be defined and also discuss how they interact and if at all they do. The author believes that Crisis Management, Disaster Response, Emergency Management are all overarched by Business Continuity Management (BCM). This can be demonstrated by the hypothesis that crisis is divided into three events: emergencies, crisis and disaster. These three events are sub-disciplines with the overarching response being dictated by the BCM. This statement is therefore stating that neither of them have any independence but are all internally involved within the newly evolving discipline BCM to which they follow.
MAY 26, 2016 / by SARAH CHILDRESS Senior Digital Reporter, FRONTLINE Enterprise Journalism Group • KATIE WORTH Tow Journalism Fellow, FRONTLINE/Columbia Journalism School Fellowships
Overwhelming scientific evidence shows climate change is leading to rising sea levels and more extreme storms. But you might not know it by looking at the federal government’s flood hazard maps.
The Federal Emergency Management Agency maps flood plains across the country. The maps are intended to show which areas are likely to flood so that local governments can better plan for disasters. They also determine who must buy flood insurance, and at what rates.The problem is, many of them aren’t up to date. And even the latest maps don’t take into account the anticipated effects of climate change, which will dramatically impact the potential for flooding.
In partnership with: NPR
MAY 24, 2016
In the aftermath of a flood, people may be unpleasantly surprised to find that their home insurance doesn’t cover the damage caused by rising storm waters. It hasn’t since insurance companies decided that floods were too risky to cover.
A combination of common sense, backup, proactive protection, and automated removal tools is a solid defense against the growing scourge of ransomware.
By Mark Hachman
Senior Editor, PCWorld | MAR 13, 2017 3:30 AM PT
Ransomware doesn’t sneak into your PC like ordinary malware. It bursts in, points a gun at your data, and screams for cash—or else. And if you don’t learn to defend yourself, it could happen again and again.
Armed gangs of digital thieves roaming the information superhighway sounds like an overwrought action movie, but the numbers say it’s true: Ransomware attacks rose from 3.8 million in 2015 to 638 million in 2016, an increase of 167 times year over year, according to Sonicwall—even as the number of malware attacks declined. Why steal data when you can simply demand cash?
MIT Technology Review
Mike Orcutt March 3, 2017
A new report starts to quantify the effect that popular encryption products have on law enforcement.
Tue Feb 28, 2017 | 7:23 PM EST
(Reuters) – Web users experienced widespread glitches on Tuesday, from news sites to government services, after Amazon.com Inc’s popular cloud service that hosts their data suffered a technical disruption.
Written by OLAY LADEJI
Wednesday, 01 February 2017
The modern day CIO is under constant pressure to implement new technologies that empower the business, while simultaneously keeping critical data, applications, and processes readily available. In today’s “new normal” economy, organizations of all sizes must seek affordable ways to deliver reliable and consistent IT services to customers and employees.
Source: BC/DR Strategies within a Cloud Environment – Disaster Recovery Journal
Written by DICK CSAPLAR
Tuesday, 10 January 2017
Cybersecurity has evolved greatly over the last 20 years and, in fact, nothing about it is the same as when the concept of cybersecurity first emerged. Need proof? Even dictionaries have not kept pace with the growth with many still promoting the idea that cybersecurity is primarily building walls, “Cybersecurity is defined as measures taken to protect a computer or computer system against unauthorized access or attack.” Today, the meaning of every operative word in the definition – measures, computer systems, access, and attack – has broadened well beyond what was originally intended.
Source: The Evolving Challenge of Cybersecurity – Disaster Recovery Journal
By Lucian Constantin
Romania Correspondent, IDG News Service FEB 14, 2017
Google’s ‘BeyondCorp’ network security model is starting to influence security offerings