Disaster recovery plan

Get started

  • How to prevent ransomware or recover from a ransomware breach

    Ransomware, the latest malware threat with which information security professionals must grapple, is spreading, according to many authorities. This TechGuide explores the nature of the threat and the latest ransomware trends. But it does more than merely raise the alarm: Included in this primer on ransomware is also actionable intelligence on both ransomware prevention and recovery. It outlines several steps information security pros should take now in order to heighten their company's resistance and prevent ransomware attacks. It also guides information security pros through recovery steps if they are indeed victims of a ransomware attack.

    Readers of this guide will gain a deeper insight into the nature of ransomware and how it's changing and spreading. But they will also be better equipped to prevent ransomware attacks and possess crucial knowledge to guide them in the event of a ransomware attack on their corporate systems.

    Continue Reading

  • SMB mobile strategies hit roadblocks

    "Go big or go home" is a common battle cry for people taking on a new challenge, but when it comes to enterprise mobility, some organizations just have to go small. Small and medium-size businesses don't have the capital to buy expensive mobility services, hire in-demand developers or recover from major security breaches. Fortunately, there are some products out there that can help -- and an SMB mobile strategy should focus on security capabilities first and foremost.

    Meanwhile, many larger companies are looking to the top enterprise software vendors for guidance when mobilizing their core business apps. In his column this month, Eric Klein explores how SAP, Oracle, IBM and Microsoft are making moves to help IT tailor essential software for smartphones and tablets. The next steps are ensuring that mobile application code is secure and threat detection software is in place, which Maribel Lopez tackles in her column. This issue's Device Spotlight takes a look at a 2-in-1 tablet from Huawei as the company gains a foothold in the United States. We also look ahead to a few conferences end-user computing pros should consider attending in the final months of the year.

    Continue Reading

  • DevOps and security? Here's how

    The automation of development and operations processes, known as DevOps, is catching on in project teams and business units across industries. The missing component in many of these high-risk scenarios? Security. To make DevOps and security work together, CISOs need to have ongoing collaboration with developers, automating security checks early in the process and providing them with visibility and feedback. In this issue, early adopters of the DevOps and security model share tips on how to defend the cloud's continuous improvement model.

    Retailers, led by Wal-Mart Stores, Home Depot and the National Retail Federation, contend that the two-factor authentication provided by chip and PIN card technology offers the highest level of security. Financial institutions, led by Visa, MasterCard and the American Bankers Association, say it's the microchip embedded in the card that matters because it combats counterfeit fraud. We look at both sides of the chip and PIN card debate.

    The consequences of a company's failure to stay apprised of data protection laws and to implement best practices can be dire. Organizations may find themselves not only targets of post-breach lawsuits, but on the receiving end of the Federal Trade Commission's scrutiny. By pooling the collective knowledge of the legal and IT security organizations, and by staying on top of requirements and updating them as appropriate, CISOs can cover all of their bases in a comprehensive way. We tell you how to set up the swim lanes of a legal partnership.

    Continue Reading

  • A look at the cloud migration challenges enterprises could face

    One of the most common problems facing organizations is dealing with many cloud migration challenges. Expert Dave Shackleford discusses the challenges and how to deal with them.Continue Reading

  • CISO challenges: Addressing cybersecurity blind spots

    Every enterprise has cybersecurity blind spots that it fails to recognize and address. Sean Martin explains what they are and how they create more CISO challenges.Continue Reading

  • IT security service provider taps Kaseya to deliver cloud offerings

    Internet & Telephone, a managed service provider, is offering its customers cloud-based IT security services through Kaseya's IT management platform tech.Continue Reading

  • To prep for OCR HIPAA audits, try tech risk assessment

    Weighing technology risks can help healthcare organizations stay ahead of 2016 HIPAA audits by the Department of Health and Human Services' Office for Civil Rights.Continue Reading

  • The adoption of cloud in healthcare from a CIO's view

    CIO Harun Rashid discusses the adoption of cloud in healthcare as well as the barriers and concerns many health IT professionals have when it comes to cloud computing.Continue Reading

  • Information Governance and Security: Protecting and Managing Your Company's Proprietary

    In this excerpt of Information Governance and Security, authors John G. Iannarelli and Michael O'Shaughnessy offer tips for establishing guidelines for all departments or sectors of a business.Continue Reading

  • Before tackling secure texting in healthcare, change culture

    Experts say that while lip service for secure communications technology is great, the first step is convincing leaders and clinicians to recognize the risks to health data.Continue Reading

  • How should CISOs present a security assessment report?

    CISOs regularly have to present a security assessment report to the board of directors. Expert Mike O. Villegas has some tips to make it more engaging.Continue Reading

  • A disaster recovery/business continuity plan for the data breach age

    As we become 'digital by nature,' a good enterprise disaster recovery/business continuity plan must put data first, says Harvey Koeppel. He lays out 10 tips.Continue Reading

  • Five essential network security topics and trends to watch

    With a constant drumbeat of security and data breaches in 2015, it's no wonder networking pros have questions and concerns about network security topics. These five stats can get you started.Continue Reading

  • Data protection requirements start with firm grasp of GRC needs

    Corporate data protection requirements are complex, but determining a company's unique GRC needs is an essential first step to information security.Continue Reading

  • What executives must know about data breaches in healthcare

    The U.S. Department of Health and Human Services Office for Civil Rights' investigations into healthcare data breaches produced information that can help stop future leaks.Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close