Business Continuity

Home/Tag:Business Continuity

What’s ISCM? (NIST SP 800-137)

2020-09-02T05:40:16+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , , , , , |

First of all, it's better to talk about what NIST is and why the content published by NIST is important. The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. This Institute develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations [...]

Amazon VPC

2020-09-02T05:40:25+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , |

Amazon Virtual Private Cloud (VPC) is a commercial cloud computing service that provides a virtual private cloud, by provisioning a logically isolated section of Amazon Web Services (AWS) Cloud. This service enables customer to launches AWS resources into a virtual network that he/she/it has defined. So, a customer has complete control over his/her/its virtual networking [...]

Cryptolocker Attack

2020-09-24T12:42:32+00:00Categories: Network Security|Tags: , , , , , , , , , , , , |

The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. It is believed that the operators of CryptoLocker successfully extorted a total of around $3 million from victims of the trojan. It propagated via infected email attachments, and via an existing Gameover ZeuS botnet. [...]

Offsite Backup

2020-09-02T05:32:47+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , |

No matter how efficient a computer system appears to be, there is always the possibility of a malfunction wiping out valuable data. For this reason, many companies have set up backup systems, designed to recover lost data. It is very important that an organization have at least two backup. a backup in local (onsite backup) [...]

Disaster Recovery and Business Continuity

2020-09-23T13:21:48+00:00Categories: Computer & Network Concepts, Network Administration|Tags: , , , , , , |

How an organization responds to a cyber security incident or any other event that causes the loss of operations or data. We have provided detailed training on these two topics in the CISSP Training Course. In recent years, Disaster Recovery, and business continuity have more important role in enterprise computing budgets. Disaster recovery is the [...]

Participate in Business Continuity Planning (BCP) and Exercises

2020-07-16T07:33:26+00:00Tags: , , , , , , , , , , , |

Participate in Business Continuity Planning (BCP) and Exercises Business continuity focuses on a business operating with minimal or no downtime. At result, It also includes disaster recovery. We can say that business continuity is a strategy while disaster recovery is a tactic. In this section of this tutorial, we'll take a look at business [...]

Business Continuity Requirements

2020-07-16T05:34:41+00:00Tags: , , , , , , , , , , , , , , , , |

Business Continuity Requirements Business continuity requirements, ensures the continuity of IT operations that is maintained from the primary or alternate locations during an incident or disastrous events.Business continuity requirements are based on the business continuity planning (BCP). Develop and Document Scope and Plan Business Continuity Planning (BCP) BCP aims to prevent interruptions to operations [...]

Go to Top