Generic filters
Generic filters


Cybersecurity is a critical component of an organization’s business continuity plan (BCP), and policies and processes relating to core technologies and the protection of sensitive data must be taken into consideration.

Frequently Asked Questions

  • Business Continuity
  • Why Is Business Continuity Planning (BCP) Important?

    Businesses are prone to a host of disasters that vary in degree from minor to catastrophic and BCPs are an important part of any business. BCP is typically meant to help a company continue operating in the event of threats and disruptions. This could result in a loss of revenue and higher costs, which leads to a drop in profitability. And businesses can't rely on insurance alone because it doesn't cover all the costs and the customers who move to the competition.

  • What is a risk assessment process?

    Risk Identification: It is the process of determining risks that could potentially prevent the program, enterprise, or investment from achieving its objectives. It includes documenting and communicating the concern.

    Risk Analysis: Risk Analysis involves examining how project outcomes and objectives might change due to the impact of the risk event. Once the risks are identified, they are analysed to identify the qualitative and quantitative impact of the risk on the project so that appropriate steps can be taken to mitigate them.

    Risk Evaluation: Risk Evaluation is the process used to compare the estimated risk against the given risk criteria to determine the significance of the risk.

  • Why is an IT Disaster Recovery Plan important?
    Key reasons why a business would need a detailed and tested DRP include:
    • To minimize interruptions to normal operations
    • To limit the extent of disruption and damage
    • To minimize the economic impact of the interruption
    • To establish alternative means of operation in advance
    • To train personnel with emergency procedures
    • To provide for quick restoration of service




    BCI Simulation Game

    Four players are required in the roles of Incident Manager, Head of IT, Head of Communications and Managing Director. Then, using a realistic virtual desktop with familiar communications channels, players must communicate with stakeholders, read and reply to emails, take phone calls, monitor breaking news and social media, and more.

    Read more


    Hot Backup Strategy

    A hot site may be a backup facility which represents a mirrored copy of the first production center. A hot site is provided with all the required hardware, software, and network connectivity, which allows you to perform near real-time backup or replication of the critical data. This way, the assembly...

    Read more
    Free Ratings Report

    Streamline information and remove blind spots Continually monitor and prioritize organization vulnerabilities Understand the risks posed by any third party in the supply chain Gain access to critical insights to negotiate the best cyber-insurance pricing and plans Benchmark and compare best practices alongside industry peers

    Read more


    5 Podcast about Business Continuity

    Business continuity planning (BCP) is the process involved in creating a system of prevention and recovery from potential threats to a company. The plan ensures that personnel and assets are protected and are able to function quickly in the event of a disaster. Disaster recovery (DR) is an organization’s method...

    Read more


    ”Standard online backup is no longer…”

    Standard online backup is no longer a safe approach. Organizations have spent millions in recent years moving from tape backup to online backup, but if it is attached to your network, nowadays you have got to assume that it will be hit – therefore, it can’t be a backup if...

    Read more

    Welcome Back!

    Login to your account below

    Retrieve your password

    Please enter your username or email address to reset your password.

    Add New Playlist