Thank you for visiting! This site is dedicated to my clients, peers, friends, and others interested in keeping up on some of the articles, news, and trends in continuity management and related professions that have caught my interest.

In preparing for battle I have always found that plans are useless,
but planning is indispensable.
– Dwight D. Eisenhower

Business Continuity and Crisis Management | Centre for Security Failures Studies

by Stephen Langley
Centre for Security Failures Studies, UK

‘Crisis Management, Disaster Response, Emergency Management, Business Continuity Management: these are all names for the same process.’ Discuss the validity of this statement, referring to the theoretical models and the literature. Throughout the assignment you should discuss the practical implementation of strategies, plans and procedures.

This question requires the terms ‘crisis management, disaster response, emergency management, and business continuity management’ to be defined and also discuss how they interact and if at all they do. The author believes that Crisis Management, Disaster Response, Emergency Management are all overarched by Business Continuity Management (BCM). This can be demonstrated by the hypothesis that crisis is divided into three events: emergencies, crisis and disaster. These three events are sub-disciplines with the overarching response being dictated by the BCM. This statement is therefore stating that neither of them have any independence but are all internally involved within the newly evolving discipline BCM to which they follow.

Full Article

How Federal Flood Maps Ignore the Risks Of Climate Change | Business of Disaster | FRONTLINE | PBS

MAY 26, 2016 / by SARAH CHILDRESS Senior Digital Reporter, FRONTLINE Enterprise Journalism Group • KATIE WORTH Tow Journalism Fellow, FRONTLINE/Columbia Journalism School Fellowships

Overwhelming scientific evidence shows climate change is leading to rising sea levels and more extreme storms. But you might not know it by looking at the federal government’s flood hazard maps.

The Federal Emergency Management Agency maps flood plains across the country. The maps are intended to show which areas are likely to flood so that local governments can better plan for disasters. They also determine who must buy flood insurance, and at what rates.The problem is, many of them aren’t up to date. And even the latest maps don’t take into account the anticipated effects of climate change, which will dramatically impact the potential for flooding.

Full Article

How to remove ransomware: Use this battle plan to fight back

A combination of common sense, backup, proactive protection, and automated removal tools is a solid defense against the growing scourge of ransomware.

By Senior Editor, PCWorld | MAR 13, 2017 3:30 AM PT

Ransomware doesn’t sneak into your PC like ordinary malware. It bursts in, points a gun at your data, and screams for cash—or else. And if you don’t learn to defend yourself, it could happen again and again.

Armed gangs of digital thieves roaming the information superhighway sounds like an overwrought action movie, but the numbers say it’s true: Ransomware attacks rose from 3.8 million in 2015 to 638 million in 2016, an increase of 167 times year over year, according to Sonicwall—even as the number of malware attacks declined. Why steal data when you can simply demand cash?

Full Article

Amazon shows why you shouldn’t put all your tech eggs in one cloud basket

On one really bad day, Amazon Web Services went haywire, and so did millions of users

By  | Computerworld | MAR 6, 2017 8:50 AM PT

BC/DR Strategies within a Cloud Environment – Disaster Recovery Journal

Written by  OLAY LADEJI
Wednesday, 01 February 2017

The modern day CIO is under constant pressure to implement new technologies that empower the business, while simultaneously keeping critical data, applications, and processes readily available. In today’s “new normal” economy, organizations of all sizes must seek affordable ways to deliver reliable and consistent IT services to customers and employees.

Source: BC/DR Strategies within a Cloud Environment – Disaster Recovery Journal

The Evolving Challenge of Cybersecurity – Disaster Recovery Journal

Written by  DICK CSAPLAR
Tuesday, 10 January 2017

Cybersecurity has evolved greatly over the last 20 years and, in fact, nothing about it is the same as when the concept of cybersecurity first emerged. Need proof? Even dictionaries have not kept pace with the growth with many still promoting the idea that cybersecurity is primarily building walls, “Cybersecurity is defined as measures taken to protect a computer or computer system against unauthorized access or attack.” Today, the meaning of every operative word in the definition – measures, computer systems, access, and attack – has broadened well beyond what was originally intended.

Source: The Evolving Challenge of Cybersecurity – Disaster Recovery Journal