Info & Support: 800-558-9568
Implementing a BCM Program (Part 3)

Implementing a BCM Program (Part 3)

Implementing a Business Continuity Management Program 1. Establish the BCM Ownership. 2. Align BCM Program to organizational Strategic Goals. 3. Develop the BCM Policy – Standards & Guidelines In many cases the BCM policy and approaches are driven by...
Ransomware and DR Strategies

Ransomware and DR Strategies

By now, most of us are aware of the rising occurrence of ransomware-style cyber attacks.    Malicious code is introduced into the enterprise through phishing or some other means, and propagated quickly to infect networks, servers, PC/laptops and other devices. No...
Implementing a BCM Program (Part 2)

Implementing a BCM Program (Part 2)

Implementing a Business Continuity Management Program In order for the BCM program itself to be resilient, we must tangibly justify and validate the BCM effort.  It is often that this part of the BCM program is neglected. Before even attempting to define the BCM...
BCM and Cybersecurity

BCM and Cybersecurity

Cybersecurity is a critical part of business continuity management because it helps protect an organization’s information and systems from security threats. A breach of cybersecurity can have significant consequences for an organization, such as the loss of...
Implementing a BCM Program (Part 1)

Implementing a BCM Program (Part 1)

The purpose of Business Continuity Management (BCM) is to attain comprehensive operational continuity (ability to continue critical operations during a disruption) and resilience (planning, preparedness and protection over the long-term.)  ref:...