This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The businesscontinuity management roadmap is a simple but powerful tool that can help organizations strengthen their BCM programs and enhance their resilience. In today’s post, we’ll lay out an eight-step process your company can use to create its own, customized BCM roadmap. This is what a BCM roadmap is and does.
In today’s post we’ll look at the top 10 free or almost free resources businesscontinuity management professionals can utilize to help them raise their BCM skills and effectiveness to ninja level. However, there is one aspect of doing BCM that is much better and easier than it was when I was getting started 25 years ago.
Read on for a list of a dozen businesscontinuity practices that have fallen into disuse or are no longer recommended. Related on MHA Consulting: All About BIAs: A Guide to MHA Consulting’s Best BIA Resources The past twenty-five years have seen a lot of changes in the world especially as pertains to business.
Vulnerability management is the practice of identifying and mitigating the weaknesses in an organization’s people, processes, and technology. I like doing vulnerability assessments. I think vulnerability management is bigger than that. Identifying and mitigating such situations is what vulnerability management is all about.
BCM Trends for 2020! The Disaster Recovery Institute (DRI) recently released its 4th Annual BCM Trends and Predictions Report , which provides predictions for resilience trends in 2019/2020. Businesscontinuity planners must always be on the lookout for such trends to ensure that their plans stay effective over time.
Businesscontinuity professionals need to be sure their recovery plans and strategies are fully adapted to the new reality. Businesscontinuity management (BCM) professionals hustled to adapt their recovery strategies and plans to the new workplace model. The answer is yes. Hybrid adds complexity.
The year 2022 saw the tapering off of the pandemic, the invasion of Ukraine by Russia, an ongoing wave of cyberattacks, continuing supply chain woes, and a renewed focus by organizations on identifying and protecting their most essential business processes. Read on to learn about the BCM year in review.
Those ‘breakup’ lines may apply to your BusinessContinuity Management software or your latest paramour. You’ve invested countless hours and piles of capital (both monetary and political) populating your current BCM software. If all you care about are Plans, don’t invest in BCM software – use word processing.Be
Businesscontinuity professionals who want to make their organizations more resilient should make a conscious effort to become gap hunters. I agree—and in today’s blog I’m going to build on Michael’s post by laying out some of the common vulnerabilities I often see in working with clients of ours.
Instead, they should be developed in coordination with the cybersecurity department to ensure that recovery measures do not inadvertently create vulnerabilities that can be exploited by hackers. The best way to do this is by making sure businesscontinuity is integrated into a robust information security governance framework.
Any organization that invests time and effort into improving its resilience is to be commended, but unfortunately many companies prioritize the wrong things in their businesscontinuity endeavors. In businesscontinuity, the “three to get ready” are: Information technology. Business processes.
In today’s post, we’ll lay out what these domains are, reveal which ones tend to get overlooked, and explain how knowing about the domains can help businesscontinuity professionals reduce their organizations’ risks and bolster their resilience. Risk management is not one-size-fits all.
Although share prices showed signs of recovery within a couple of days, more than £1 billion was wiped off the stock market value of the firm, as investors worried that retailers may be less keen to buy into the automated warehouse technology having seen that there is a potential vulnerability.*. Businesscontinuity management.
also brings an increased level of vulnerability. The latest report by Kapersky (2018) provides some statistics around the global cost of data breaches, revealing that the average business now spends 27 per cent of its IT budget on cyber defence. Or read more: The flaw in the plan: businesscontinuity management.
Reducing risk is at the heart of everything we do as businesscontinuity professionals. Residual Risk There are two main kinds of risk when it comes to organizational activities and businesscontinuity: inherent risk and residual risk. Inherent risk is the danger intrinsic to any business activity or operation.
Related on MHA Consulting: Driving Blind: The Problem with Skipping the Threat and Risk Assessment The Need for Threat Intelligence Traditional businesscontinuity methodology leans heavily on the threat and risk assessment or TRA, in which the organization identifies potential threats and ranks them in terms of likelihood and potential impact.
Within BusinessContinuity circles there is ongoing debate about the relevance and role of Risk Assessment in developing a BCM program. Traditional, formalized Risk Assessment aims to identify the threats to which our organization is vulnerable. Next, the impact of the threat happening must be assessed.
Most organizations recognize the importance of having a sound businesscontinuity recovery plan, but many plans are undermined by the presence of overlooked weaknesses. However, while it’s true that having a remote-capable workforce increases resilience in some ways, remote work has vulnerabilities of its own.
Try a Dose of Risk Management As a businesscontinuity professional, I tip my hat to any organization that makes a serious effort to reduce its risks. A haphazard approach to bolstering tech security can leave a host of vulnerabilities. Related on MHA Consulting: Global Turmoil Making You Ill? I wish it were true.
There are four main strategies for mitigating risk : · Risk acceptance: Making a conscious decision to remain vulnerable to a potential harm, usually based on a cost-benefit analysis. These definitions are taken from our recent free ebook, Strong Language: The MHA Guide to Essential BusinessContinuity Terminology.
As a businesscontinuity consultant, I dislike risk and spend half my time trying to get my clients to reduce their risks. Finally, look at the technology you depend on—everything you use to measure, manage, and monitor the business from a technical perspective.
This article will address the importance of the Risk Assessment as a general business tool, as well as in the context of BusinessContinuity Planning. Unsurprisingly, a Risk Assessment is one of the most important components of BusinessContinuity Planning (BCP). What are the steps to assess risk?
This article will address the importance of the Risk Assessment as a general business tool, as well as in the context of BusinessContinuity Planning. Unsurprisingly, a Risk Assessment is one of the most important components of BusinessContinuity Planning (BCP). BusinessContinuity Management.
IT/DR is the part of businesscontinuity that deals with restoring computing systems, applications, and data following a disruption.) Factors such as hybrid setups, Software as a Service connections, and the vulnerability of cloud-services providers make it essential for responsible organizations to develop comprehensive IT/DR plans.
In fact, service providers are also vulnerable to vendor … The post What Service Providers Need to Know About Supply Chain Risk Management appeared first on MHA Consulting. Many service providers tune out talk about supply chain risk management since they think the issue only affects manufacturers and retailers.
The risk maturity model is a key component of businesscontinuity. In today’s post, we’ll look at how such a model can help an organization understand its risks, mitigate the risks that threaten its core services, and integrate businesscontinuity with enterprise risk management, thus boosting resilience overall.
The risk maturity model is a key component of businesscontinuity. In today’s post, we’ll look at how such a model can help an organization understand its risks, mitigate the risks that threaten its core services, and integrate businesscontinuity with enterprise risk management, thus boosting resilience overall.
He supports our clients’ use of BCMMETRICS TM and innovates to continuously enhance the platform’s capabilities and improve the customer experience. Coming into compliance with businesscontinuity regulations and standards—whether motivated by a desire to avoid penalties or a wish to boost resilience—is a massive challenge.
By understanding your impact tolerance, you can better understand the impact single points of failure and vulnerabilities could have on your organization. Impact tolerance is an important component of an operational resilience strategy. Tips to Set Impact Tolerance.
Because technology is vulnerable to disruption—and disruptions are on the rise—every organization should devise manual workarounds for its critical business processes. An Eye-Opening Exercise Earlier this week I did a two-hour mock disaster exercise with a healthcare client.
Because technology is vulnerable to disruption—and disruptions are on the rise—every organization should devise manual workarounds for its critical business processes. The retro revolution in businesscontinuity is about documenting, practicing, and/or rebuilding the ability to conduct critical business processes manually.
It’s enough to make an organization leader or businesscontinuity professional feel unwell. It’s certainly on mine, not only in my role as a businesscontinuity consultant but also as a business owner and CEO. Ongoing mitigation is necessary because if you don’t take action, you remain vulnerable.
Healthcare organizations are uniquely vulnerable to hackers and are subject to more than their share of cyberattacks. Two Types of Attacks Looking at the issue of healthcare cybersecurity from the businesscontinuity perspective, there are two types of attacks to consider: data breaches and ransomware attacks.
Companies should also consider crafting policies that address employees’ digital hygiene, the goal being to reduce the organization’s vulnerability to cyberattack. Another issue that might be addressed is whether and when employees must use a VPN.
BIA On-Demand provides everything you need to conduct a world-class business impact analysis, and the BIA is the foundation of a sound businesscontinuity program. A good businesscontinuity team can then use the reports and the data in them to lay a solid foundation and begin building the program from the ground up.
Even companies that do not use AI tools are likely to be vulnerable because suppliers of theirs almost certainly do use them. How can you as a businesscontinuity professional help protect your organization against these threats? A detailed discussion will have to wait.
Having a businesscontinuity plan [BCP] is invaluable, but you can’t foresee every type of event. So, for businesscontinuity management [BCM] purposes, it’s better to come at it from the other direction: What processes [business activities] are critical to your organisation? And if so, how? It’s tricky.
Herrera Unplugged is an occasional series in which MHA Consulting CEO Michael Herrera shares his candid views on current hot-button businesscontinuity topics. You might think that a company spending a substantial sum for the advice of a businesscontinuity consultant would do everything it could to make the collaboration a success.
In addition, technology is a potential source of vulnerability as well as a means of reducing it. Myth 47: Businesscontinuity management only applies to the private sector. There is thus no reason why BCM should not apply to public bodies. Reality: The problem of disasters is largely a social one. It is not so.
BusinessContinuity Planning Guide for Smaller Organizations Last Updated on June 4, 2020 by Alex Jankovic Reading Time: 26 minutes We all live in an unpredictable world. We recognize that many businesscontinuity planning terms and industry-leading methodologies can be foreign to your organization.
BusinessContinuity Planning Guide for Smaller Organizations. We recognize that many businesscontinuity planning terms and industry-leading methodologies can be foreign to your organization. It can be overwhelming if your organization has never implemented a robust businesscontinuity program.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content