Are you following Best Practice in your Disaster Recovery and Business Continuity preparation?

Best practice Disaster Recovery (DR) and Business Continuity (BC) Planning. A man with Asian features prepares for a disaster. He has a bandanna and a military backpack. He is holding a keyboard in one hand and wearing a business suit and tie as well.

Disaster Recovery and Business Continuity are two much-discussed topics, with universal agreement among executives as to their importance.  In practical terms, however, most organisations’ DR and BC plans are not regularly reviewed for their currency or stress-tested for their ease of implementation in an emergency.

Here’s our guide to the best practice in setting, reviewing and regularly testing your DR and BC plan.

How safe is your network? You won’t know until you run an Information Security Audit

white collar criminal hiding behind acting mask

This week, reports ComputerWorld, an IT Consultant named Steven Oakes was jailed for 3 years for spying on the communications of a share recommendation firm called Port Phillip Publishing (PPP).  In a period from 2012 to 2016, the Victorian man used a device known as a Wi-Fi packet sniffer to copy and then decrypt messages

The Rise of the Guest Network. How we Predict Threats and Restrict Information Access based on Device Types and Users

Network Design and Network Security

20 years ago, it was easy to create and administer your own company network. You cabled the computers (typically desktops) in a daisy chain or to a central switch, connected to a modem and accessed the early wonders of Internet and email. There was no such thing as ransomware, data theft was confined to government

Be aware when travelling – malware is set to strike

Business email compromise - a female executive

As reported in IT News, malware that has a very specific purpose has been found lurking in the Google Play store. It’s called Overseer, and it’s designed to target business travellers going overseas. It steals lots of information for a very specific purpose. Once installed on a user’s Android device, Overseer collects and sends back