This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
This post is part of BCM Basics, a series of occasional, entry-level blogs on some of the key concepts in business continuity management. For business continuity newcomers, few topics are as confusing as the difference between business continuity and IT disaster recovery.
Knowing what roles should be represented on the business continuity management (BCM) team and what kind of people should fill them is an overlooked key to success in making organizations resilient. The roles that should be represented on a company’s BCM team change over time depending on the maturity of the program.
Recovering from a cyber incident such as a ransomware attack will require recovery of data and/or data processing equipment and devices. These may be different than the workarounds used in a non-cyber application outage. Due to the intricacies of this type of recovery, doing it ad hoc is to be avoided.
Most of these have had demonstrable impacts on the practice of business continuity management (BCM), rendering some traditional practices obsolete and ushering in new concerns and techniques. It’s interesting to look at BCM practices that have fallen into disuse or are no longer regarded as beneficial or sufficient.
Far from relieving organizations of the responsibility of recovering their IT systems, today’s cloud-based and hybrid environments make it more important than ever that companies know how to bring their systems back up in the event of an outage. Moreover, cloud-services providers are themselves susceptible to outages and failed recoveries.
An organization that can undergo an outage of five days at no great cost is justified in having a high risk tolerance. An organization that would suffer a large impact as the result of an outage of two hours should be willing to tolerate very little risk. Where risk tolerance is high, controls can be relaxed.
Related on MHA Consulting: Be a Hard Target: Train Your Employees in Security Awareness A Uniquely Vulnerable Time In the context of business continuity, the recovery period is a vulnerable one for any organization. Ideally, this group will be aware of the need to integrate cyber security and businessrecovery.
Related on MHA Consulting: Sounds Like a Plan: The Elements of a Modern Recovery Plan Everyone reading this blog will know that the business continuity (BC) recovery plan is something organizations create to help them quickly restore their essential operations in the event of an outage, minimizing the impact on the company.
Unprecedented outages occur all the time. Be prepared for pushback by people who say there’s no point in rehearsing a workaround because the primary method for doing that particular task will never go down. You might need to put on your teacher hat to help your colleagues understand why practicing manual workarounds is important.
We recognize that many business continuity planning terms and industry-leading methodologies can be foreign to your organization. It can be overwhelming if your organization has never implemented a robust business continuity program. It requires a budget and long-term commitment (hence why it is a BCM Program).
We recognize that many business continuity planning terms and industry-leading methodologies can be foreign to your organization. It can be overwhelming if your organization has never implemented a robust business continuity program. Section 2 - Business Continuity Management (BCM) Program Implementation.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content