Call us on 03450 21 21 51

SRM Solutions
Finagle’s Law and the importance of business continuity plan testing
The SRM Blog

Business Continuity Planning

Filter by category
Finagle’s Law and the importance of business continuity plan testing

Finagle’s Law and the importance of business continuity plan testing

When it comes to Business Continuity Plan testing, we should all consider Finagle’s Law. Similar to Murphy’s Law, Finagle’s agrees that anything that can go wrong will go wrong...

The evolution of cyber crime

The evolution of cyber crime

Ever since Charles Darwin introduced the theory of evolution in 1859 we have been aware of the continual process of change in the natural world. Things are no different..

PR: how a well-managed data breach can help limit the impact on your reputation

PR: how a well-managed data breach can help limit the impact on your reputation

We have all seen the headlines about data breaches. They make for uncomfortable reading. Even more uncomfortable, however, is the fact that it’s often through these sensational headlines that..

A reactive mindset is today’s biggest threat to data security

A reactive mindset is today’s biggest threat to data security

What constitutes a cyber-mature organisation? Here’s a clue: it has nothing to do with size or age, sector or niche specialism, whether it is online or has a physical..

The Industrial Revolution v4.1: with increased opportunity comes increased vulnerability

The Industrial Revolution v4.1: with increased opportunity comes increased vulnerability

If history teaches us one thing it is that there is no going back. It started with the First Industrial Revolution which used water and steam power to mechanise..

The A to E of cyber maturity

The A to E of cyber maturity

In a recent report, the Philippine government’s Department of Information and Communications Technology (created in 2016) outlined a scale of cyber resilience based on an A to E grading..

Business Continuity – what we can all learn from the NHS response to WannaCry

Business Continuity – what we can all learn from the NHS response to WannaCry

To be truly resilient against potential attacks, it is not enough to simply look at patching the last one, but to anticipate the next. When commenting on the news..

Three stages to building a robust defence against external threats

Three stages to building a robust defence against external threats

The news has been full of concerns that foreign powers are using state-sponsored hacking as a means to undermine the infrastructure of foreign powers. While it is irresponsible to..

The NIS Directive: who does it apply to and what will it mean?

The NIS Directive: who does it apply to and what will it mean?

May 2018 is a big month for cyber security. Not only will the EU General Data Protection Regulation (GDPR) come into effect but a new UK Data Protection Act..

Coinhive attacks and how to prepare for the (almost) inevitable

Coinhive attacks and how to prepare for the (almost) inevitable

This week’s report that more than 5,000 websites, including that of the Information Commissioner’s Office (ICO) have been hacked, shows that it really can happen to anyone. Other affected..

The flaw in the plan: business continuity management

The flaw in the plan: business continuity management

When is a plan not a plan? When it is an out-of-date plan. The latest research from the industry-respected Ponemon Institute, reveals that 26 per cent of IT and..

Cyber Security Accountability Does Pay

Cyber Security Accountability Does Pay

Cybercrime in 2015 was nothing short of epic. No one could have anticipated headline news stories such as Sony Pictures Entertainment hacked by a group allegedly sponsored by North..