The word “asymmetric” is most typically associated with “asymmetric terrorism” in today’s emergency management vocabulary. However, I see the word “asymmetric” as being helpful in defining what we ...
A plan for duplicating computer operations after a catastrophe occurs, such as a fire or earthquake. It includes routine off-site backup as well as a procedure for activating vital information systems ...
For over 20 years, I’ve been involved in enterprise-level IT. I know the processes and procedures that allow companies to be always-on, always-available, and always-able to weather any unforeseen ...
In today's digital world, data is the lifeblood of businesses. Losing it can lead to significant financial losses, operational disruptions, and damage to a company's reputation. To safeguard against ...
The cyber threat landscape is growing more complex and unforgiving with each passing year. In 2025, outdated disaster recovery (DR) plans will leave businesses alarmingly vulnerable to increasingly ...
According to ISO 27031 Section 7.5, “A coordinated program should be implemented to ensure that processes are in place to regularly promote ICT DR awareness in general, as well as assess and enhance ...
See the text below that I read earlier this morning. Most of this is on the money in my book. I'm reading American Dunkirk: The Waterborne Evacuation of Manhattan on 9/11 by James M Kendra and Tricia ...
The members of the Sungard ASVoice team are production and recovery information technology experts, focused on managed application services, cloud and managed services, and data center and ...
Disaster management is often defined as the organisation and management of resources and responsibilities for dealing with all humanitarian aspects of emergencies, particularly preparedness, response, ...