Posts tagged [data breaches]

How to protect your key assets

How to protect your key assets

Data hackers often go after key assets and information. Being able to track assets is a vital tool in identifying and protecting data and a crucial tool in business continuity planning. .


Cyber attacks and your business continuity plans


Business continuity planning is not just about recovering from events like earthquakes, but planning for and being able to withstand any event or trigger that can cause disruption. With recent rumblings in the media industry regarding online security and the ever increasing new methods being made every day, cyber security has come to the fore as the top threat facing companies today. Cyber criminals do exist and can possess the ability to cripple entire networks and hold companies to ransom. It’s not an option anymore not to have proper and current online security. 

Read more