Five Advantages of Moving Disaster Recovery to the Cloud

Until the advent of the cloud, protecting crucial business applications and workloads traditionally required building and maintaining a second on-prem data center which was a costly commitment and a massive operational exercise. Disaster Recovery-as-a-Service (DRaaS) solutions can now extend data centers into the cloud at a fraction of the costs. The latest DRaaS report from … Read more

What is Phishing and How Does it Work?

Phishing remains one of the most common types of cyberattacks. It’s a firm favorite of cybercriminals because of its simplicity, effectiveness and high rate of profitability. Phishing has certainly evolved from its infancy of scamming people impersonating a Nigerian prince in need of emergency medical treatment. Phishing today is increasingly sophisticated with specific targets and … Read more

Five Cyber Threats that Security Teams Should Pay More Attention to

Ransomware has been a major threat to organizations for the last couple of years and is one of the most publicised threats online. But it is by no means the only cyberthreat your organization will face. Preparing to face these threats head on can facilitate increased security while preparing IT risk managers to improve their strategy’s … Read more

Security vs Productivity: When Secure Becomes too Secure?

For companies around the world, cyber-attacks are a constant threat, one which they attempt to avoid at all costs. According to the World Economic Forum, being concerned about cyber-attacks it is one of the top ten things that keep executives awake at night even more so than a fear of terrorist attacks. In Canada, cyber-attacks were the … Read more

eBook Launch: A Comprehensive Guide to Business Continuity and Recovery Planning

Data loss, whether intentional or accidental, is not only inconvenient but can have severe financial implications and indeed cost you your business. Our aim with this eBook is to prepare for those instances when disaster strikes by providing you with guidance in respect of disaster recovery and business continuity. The aim is to ensure you … Read more

Finding the Right Business Continuity Service Provider: Five Questions You Should Ask

You have made the important decision to roll out business continuity within your organization. Your next step is to engage a specialist business continuity service provider to help turn that decision into actionable steps.   By asking the five questions below you should be able make an informed decision. 1. Cost Most organizations are primarily concerned … Read more

Cybercrime tactics are changing yet again. Here’s three trends to watch out for in 2019

Cybercrime continues to increase, and cyber criminals are continuously changing their tactics. Just as the security industry seems to get on top of the latest cybercrime threat, a new, more sophisticated threat emerges. With ransomware dominating 2017 and cryptomining malware becoming popular with hackers throughout 2018, it seems e-crime is the latest trend in cybercrime … Read more

First Half of 2019: Business Continuity Trends and Challenges

In a survey conducted by Continuity Central, respondents were asked: “What level of changes do you expect to see in the way your organization manages business continuity during 2019?” From the answers collected, the top five change trends that emerged were the following:  22% of the respondents indicated that they will be making major revisions … Read more

Five Reasons Why Organizations Don’t Test Their Disaster Recovery Plans Despite the Major Risks Involved

It is a well-established fact that disaster recovery is a crucial part of any organization. In a study conducted by Spiceworks, 95% of the 700 respondents indicated that they do have a disaster recovery plan, but 23% of the respondents admitted to not testing their disaster recovery plan. When presented with the question why these … Read more

What is Network Recovery as a Service (NRaaS) and why do I need it?

Network recovery is the process of recovering and restoring business operations on a computer network. It is similar in scope to disaster recovery to the extent that both services are tailored to prepare organizations for disasters that could disrupt, amongst others, network services. Network recovery as a service, together with an organization’s business continuity plan, … Read more