Cyber-attacks

Preparation for Cyber Attacks and Disaster Recovery Must Go to “Awareness 2.0”

Organisations have already recognised that people are valuable – often the most valuable – assets. They also know that people represent risk, because of the possibility of human error, negligence, and even deliberate damage. Cybercriminals are well aware of this too. They often prefer to attack using social engineering tactics to learn user and system access codes: it’s easier and faster than trying to break through layers of hardware and software protection. Many enterprises have therefore invested in programs to increase the awareness of their employees about information security in particular, and the need to protect and back up data in general. Now, it’s time to shift gears and change up for “awareness 2.0”. Read more

2015-11-25T13:24:13+11:00By |Disaster Recovery|

Threats and Horizon Scanning with a Bit of Darwin and Cybernetics

What gives business continuity managers sleepless nights? Snowstorms, pandemics, hurricanes and industrial action have all topped the list at one time or another. At the moment, cyber-attacks are the hot item. According to at least one recent report, hackers are considered number one out of the threats potentially affecting enterprises and organisations today. Who will survive? Darwin said that it would be the fittest. He meant those entities best adapted to their environment, and not necessarily the strongest, the fastest or even the smartest. Do Darwin’s ideas translate from the real into the virtual world, and what does it mean for threats and horizon scanning? Read more

2015-04-20T10:01:55+10:00By |Business Continuity|