Security policy

Disaster recovery plan News

View All News

Disaster recovery plan Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Disaster recovery plan Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Disaster recovery plan

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Disaster recovery plan Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Forming a DR/BC plan for the inevitable data breach

    According to one statistic, as of July 2015 there were, in total, almost 4 million applications available on the app stores of Amazon, Apple, BlackBerry, Google and Windows. This figure is only one reflection of how the technologies that enable our digital selves -- like mobile computing, cloud and social media -- have not only transformed the way we work, but also how we live. In light of the fact that we also now live in an increasingly cyberthreat-filled landscape, having a comprehensive DR/BC plan is no longer optional for enterprises, says SearchCIO columnist and former CIO Harvey Koeppel.

    In this SearchCIO handbook, Koeppel offers a list of DR principles CIOs can follow to help them design and implement a solid DR/BC plan that will protect both business and personal data when the next disaster strikes. In our second piece, CTO Niel Nickolaisen shares advice on how to get the most value out of DR testing -- without risking damage to your organization. In our last article, writer Mary K. Pratt gathers tips from DR experts on how to craft a DR/BC plan that can tackle any type of disaster, including data breaches. Continue Reading

  • How can I manage hardware redundancy costs in my DR plan?

    Adding redundant hardware to your disaster recovery strategy doesn't have to break the bank. Here are three tips that can help to protect your data at a more reasonable price. Continue Reading

  • Eight-step data breach plan for the IT organization

    A data breach plan that addresses the many variations a hack can take should consider these eight points. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchNetworking

SearchUnifiedCommunications

SearchTelecom

SearchSDN

Close