Menu

Call us on 03450 21 21 51

Ensure Continuity in Times of Crisis: Strengthen Your Business Resilience with BCP Test and Exercise
The SRM Blog

Business Continuity Planning

Filter by category
Ensure Continuity in Times of Crisis: Strengthen Your Business Resilience with BCP Test and Exercise

Ensure Continuity in Times of Crisis: Strengthen Your Business Resilience with BCP Test and Exercise

Are you prepared to weather the storm when disaster strikes? Don’t wait until it’s too late. Invest in your business’s resilience with a comprehensive Business Continuity Planning (BCP) Test..

What are the benefits of tabletop exercises for organisations looking to improve their risk posture?

What are the benefits of tabletop exercises for organisations looking to improve their risk posture?

Planning for the unexpected is critical when it comes to ensuring your organisation has what it takes to survive over the long-term. No road to success is entirely smooth,..

How to protect your data from cybercrime when working from home

How to protect your data from cybercrime when working from home

Recent events have caused a seismic shift to the way businesses work. Those that have been able to transition to remote working have, in the most part, done so..

What is the difference between a disaster recovery plan and a business continuity plan?

What is the difference between a disaster recovery plan and a business continuity plan?

Both a disaster recovery plan and a business continuity plan are critical elements of good security. But how do they differ? One of the most common queries we receive..

What needs to be included in a business continuity plan checklist?

What needs to be included in a business continuity plan checklist?

A few months ago, a global pandemic with the capacity to bring the world to a standstill was almost unthinkable. Yet, here we are. Those with high-level business continuity..

An expert eye and an objective view: why get external support with your Business Continuity Planning

An expert eye and an objective view: why get external support with your Business Continuity Planning

Complacency is one of the biggest threats to a business. Whether it’s being happy to coast along and do the bare minimum to turn a profit, neglecting to provide..

Finagle’s Law and the importance of business continuity plan testing

Finagle’s Law and the importance of business continuity plan testing

When it comes to Business Continuity Plan testing, we should all consider Finagle’s Law. Similar to Murphy’s Law, Finagle’s agrees that anything that can go wrong will go wrong...

The evolution of cyber crime

The evolution of cyber crime

Ever since Charles Darwin introduced the theory of evolution in 1859 we have been aware of the continual process of change in the natural world. Things are no different..

PR: how a well-managed data breach can help limit the impact on your reputation

PR: how a well-managed data breach can help limit the impact on your reputation

We have all seen the headlines about data breaches. They make for uncomfortable reading. Even more uncomfortable, however, is the fact that it’s often through these sensational headlines that..

A reactive mindset is today’s biggest threat to data security

A reactive mindset is today’s biggest threat to data security

What constitutes a cyber-mature organisation? Here’s a clue: it has nothing to do with size or age, sector or niche specialism, whether it is online or has a physical..

The Industrial Revolution v4.1: with increased opportunity comes increased vulnerability

The Industrial Revolution v4.1: with increased opportunity comes increased vulnerability

If history teaches us one thing it is that there is no going back. It started with the First Industrial Revolution which used water and steam power to mechanise..

The A to E of cyber maturity

The A to E of cyber maturity

In a recent report, the Philippine government’s Department of Information and Communications Technology (created in 2016) outlined a scale of cyber resilience based on an A to E grading..

Business Continuity – what we can all learn from the NHS response to WannaCry

Business Continuity – what we can all learn from the NHS response to WannaCry

To be truly resilient against potential attacks, it is not enough to simply look at patching the last one, but to anticipate the next. When commenting on the news..

Three stages to building a robust defence against external threats

Three stages to building a robust defence against external threats

The news has been full of concerns that foreign powers are using state-sponsored hacking as a means to undermine the infrastructure of foreign powers. While it is irresponsible to..

The NIS Directive: who does it apply to and what will it mean?

The NIS Directive: who does it apply to and what will it mean?

May 2018 is a big month for cyber security. Not only will the EU General Data Protection Regulation (GDPR) come into effect but a new UK Data Protection Act..

Coinhive attacks and how to prepare for the (almost) inevitable

Coinhive attacks and how to prepare for the (almost) inevitable

This week’s report that more than 5,000 websites, including that of the Information Commissioner’s Office (ICO) have been hacked, shows that it really can happen to anyone. Other affected..

The flaw in the plan: business continuity management

The flaw in the plan: business continuity management

When is a plan not a plan? When it is an out-of-date plan. The latest research from the industry-respected Ponemon Institute, reveals that 26 per cent of IT and..

Cyber Security Accountability Does Pay

Cyber Security Accountability Does Pay

Cybercrime in 2015 was nothing short of epic. No one could have anticipated headline news stories such as Sony Pictures Entertainment hacked by a group allegedly sponsored by North..