US cities would be so overwhelmed by a dirty bomb or nuclear bomb attack that they would invariably rely upon the federal government for recovery, but agencies like the Federal Emergency Management Agency (FEMA) have not yet completed their planning for delivering such assistance, congressional investigators warned.
Continue reading Recovery From Dirty Bomb Would Fall on Feds – But Are They Ready?
Tornadoes create risks that differ in key ways from those in a hurricane area. Cancer Treatment Centers of America showcases a study BC/DR plan for dealing with tornadoes.
Business and technology environments are more complex than ever and the reliance on information technology is firmly entrenched in the success factors of most organizations. Being prepared to respond to situations – both planned and unexpected – that threaten to disrupt essential business systems and processes, is a major corporate concern.
The Business Continuity Institute (BCI) has produced two new Business Continuity training DVDs:
Practice Makes Perfect: exercising made easy – a comprehensive guide to exercising Business Continuity plans
Understanding Your Business: How to do a Business Impact Analysis.
Congratulations — you’ve been assigned to implement your firm’s disaster recovery plan. Data backed up offsite? Check. Distributed data center? Check. Recovery procedures tested? Check. What’s missing? People.
This primer (compiled from articles in CSO magazine) explains the basic concepts of business continuity planning and also directs you to more CSO magazine resources on the topic.
There are two things that are obvious about disaster recovery (DR) testing: everybody with a DR plan should test, and most don’t test frequently enough.
Your hard drive might crash. Thieves might steal your laptop at a café. You might realize on Friday that you desperately need the now-departed Wednesday version of an important document that you significantly altered on Thursday.
A new security assessment of the nation’s private-sector computer networks from the Department of Homeland Security says some of the most worrisome vulnerabilities reflect the open structure of the Internet itself.