Remove BCM Remove Outage Remove Vulnerability
article thumbnail

Top 10 Resources to Help You Become a BCM Ninja 

MHA Consulting

In today’s post we’ll look at the top 10 free or almost free resources business continuity management professionals can utilize to help them raise their BCM skills and effectiveness to ninja level. However, there is one aspect of doing BCM that is much better and easier than it was when I was getting started 25 years ago.

BCM 98
article thumbnail

Gone With the Wind: 12 BCM Practices That Have Become Outdated 

MHA Consulting

Most of these have had demonstrable impacts on the practice of business continuity management (BCM), rendering some traditional practices obsolete and ushering in new concerns and techniques. It’s interesting to look at BCM practices that have fallen into disuse or are no longer regarded as beneficial or sufficient.

BCM 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Get Cyber Smart: How to Make Sure Recovery Plans Align with Information Security Needs  

MHA Consulting

Instead, they should be developed in coordination with the cybersecurity department to ensure that recovery measures do not inadvertently create vulnerabilities that can be exploited by hackers. This can reveal vital information about the heightened vulnerabilities that often arise during recovery. Risk assessment.

Security 103
article thumbnail

Why Every BC Professional Should Become a Gap Hunter

MHA Consulting

Related on MHA Consulting: How to Get Strong: Unlocking the Power of Vulnerability Management The Practice of Vulnerability Management Last week, MHA CEO Michael Herrera wrote a blog about vulnerability management , the practice of identifying and mitigating the weaknesses in an organization’s people, processes, and technology.

article thumbnail

What Was New in ’22: The BCM Year in Review

MHA Consulting

Read on to learn about the BCM year in review. It’s the best way to get a handle on the organization, its culture, what their most important business processes are, the threats they face, and the current state of their BCM program. There’s a lot to be said for ruthless efficiency when it comes to BCM. A new focus on efficiency.

BCM 52
article thumbnail

Recovering Right: How to Improve at IT Disaster Recovery

MHA Consulting

Far from relieving organizations of the responsibility of recovering their IT systems, today’s cloud-based and hybrid environments make it more important than ever that companies know how to bring their systems back up in the event of an outage. Moreover, cloud-services providers are themselves susceptible to outages and failed recoveries.

article thumbnail

The Ultimate Guide to Residual Risk  

MHA Consulting

An organization that can undergo an outage of five days at no great cost is justified in having a high risk tolerance. An organization that would suffer a large impact as the result of an outage of two hours should be willing to tolerate very little risk. Where risk tolerance is high, controls can be relaxed. Risk avoidance.