Eficiencia Gerencial y Productividad S.A.C. © 1983 – 2022
The Top Fifteen Features Articles Published by Continuity Central in 2018
During 2018 Continuity Central published more than 600 business continuity, enterprise risk management, and resilience articles; but which were the most popular? Here are the top fifteen…
- Understanding Windows Server cluster quorum options
David Bermingham looks at ways to ensure that business critical information held within SQL Server deployments can be protected via cluster quorums, including looking at the role of various ‘witness’ options.
- Business continuity trends and challenges 2018
For the past four years Continuity Central has conducted an online survey asking business continuity professionals about their expectations for the year ahead. This article provides the results of the most recent survey, conducted in Q4 2017. It identifies some interesting changes from previous years…
- Why business continuity needs to change…
Martin Caddick, FBCI, recently retired from PwC. In this article he reflects on the experience gained in managing teams that delivered well over a thousand business continuity projects. Martin looks at what isn’t working, and what needs to change to improve business continuity.
- How to prepare your organization for a terrorist attack
Terrorism is never far from the headlines and while the impact on human lives is, of course, the biggest and most important consequence of a terrorist incident, it is not the only one; businesses need to prepare for the potential impacts. Jonathan Hemus looks at five areas to focus on.
- Cyber attacks: five key steps for an effective response
Cyber incident response preparation is often a weak area in many organizations. In this article, Peter Alexander looks at how to develop an effective incident response plan and overviews five steps that should be taken during an incident.
- Ten cyber security trends for organizations to consider
David Ferbrache, chief technology officer in KPMG’s cyber security practice, highlights ten cyber security trends we can look out for in 2018…
- Crisis recovery case study: Samsung 18 months on from the explosive S7 Note
In August 2016 the Samsung faced what was possibly the biggest crisis of its corporate history. In this article Robert McAllister looks at the causes of the incident, how Samsung reacted and the lessons that can be learned.
- Lessons from the five biggest data breaches of 2017
With organizations becoming increasingly cyber security aware, what can we learn from the top five breaches of 2017 as businesses look to enhance their security posture for 2018 and beyond? Luke Potter makes some suggestions…
- What is the difference between a cyber and a ‘normal’ business continuity incident?
There are some significant differences between a cyber incident and the usual type of incidents that business continuity professionals are involved in managing. Charlie Maclean Bristol looks at what the differences and why they may affect how the incident is managed.
- Exploring the potential impacts of a pandemic
Pandemic planning has gone into hibernation for most organizations says Geary W. Sikich. In this article he looks at the impacts of a future pandemic on individual organizations, specific sectors and on the wider economy; emphasizing why organizations cannot afford to ignore the threat.
- ISO 22330 Guidelines for People Aspects of Business Continuity reviewed
Earlier in June ISO published ISO 22330, its latest business continuity standard. In this article, Dr Liz Royle explains what the new standard is, why it was needed, and what it contains.
- Complexity is the enemy of security
According to recent findings from the Ponemon Institute, a considerable 83 percent of respondents believe their organization is at risk because the intricacy of business and IT operations. Andrew Lintell looks at the issue and how organizations can improve security in complex networks.
- Culture, psychology and crisis management
Do cultural differences have an influence on reactions to incidents? Charles Boffin uses an example of a significant Internet backbone incident in Australia to explore differing psychological reactions to the same crisis.
- Incident messaging for cyber attack response
Cyber breaches don’t just impact on internal systems they can quickly escalate into major reputational crises; so how can your business prepare to respond when under attack? Chris Butler provides some pointers…
- Implementing enterprise risk management
In this article by Alberto G. Alexander, some foundations will be provided for initiating the implementation of an enterprise risk management (ERM) process in an organization and the design of an ERM development model.