CATEGORY: Cyber Incident Analysis and Response
21.4 – Disaster Recovery & Business Continuity
Disaster recovery and business continuity planning Preventive measures and disaster recovery planning ensure business continuity. The main question is, “What if a hacker gains access and makes an organization’s operations impracticable?” Whether the break in business continuity is for a short or long time, this is where an organization’s disaster recovery plans play a key […]
21.3 – Planning Risk Management
Planning Risk management No organization can probably eliminate all the financial, physical or material threats that might come across in a given project or plan. Nonetheless, these threats can be reduced with proper planning. A good risk management plan assists you to have clarity on potential threats before they become real issues, to cost you […]
21.2 – Planning Cybersecurity Incident Response
Planning Cybersecurity Incident response There are two common reasons why many organizations still fail to appropriately prepare for possible cyber attacks. Some organizations consider that the incident response plan they already have in place is adequate enough to handle risks, while the other portion incorrectly considers that they are not at threat of such an […]
21.1 – Planning & preparing for Cyber Incident
Planning & preparing for Cyber Incident Every organization that uses the Internet is vulnerable to cyber incidents. You may have taken every possible step to protect your network, but resolute cyber criminals could still locate a way in. For this reason, IRP (Incident Response Plan) is an important element of your cybersecurity toolkit. When the […]
21.0 – Cybersecurity Incident & Risk
Cybersecurity incidents are now firmly at the top of international agenda because high profile breaches raise panics that hack attacks, and other security failures, could pose danger to global wealth. Home Depot and Equifax are among several recent organizations that have lost consumer data to cyber-criminals. In some organizations, cyber hackers stole money from user […]


