Skip to content


Business Continuity and IT Disaster Recovery Blogs

types it disaster recovery

3 Main Types of IT Disaster Recovery

What are the Different Types of IT Disaster Recovery? Disaster Recovery (DR) is fundamental for keeping data safe and keeping up with business continuity. With different types of disaster recovery plans that a business can execute, finding all that fit can be overpowering. Every business is unique, so it’s vital to see each of the decisions accessible to you. Along
brmp or cbrm certification

BRMP or CBRM Certification

What is a CBRM certification?  BRMP or CBRM Certification? Over the years, CBRM certification has emerged as one of the top-rated, recommended and in-demand certifications among business professionals. More than 3000 professionals across all major industrial domains in 15+ countries have acquired CBRM certification. They are presently thriving in their profiles and making a difference through their knowledge.   The CBRM
what is disaster recovery plan

What is a Disaster Recovery Plan (DRP)?

A disaster recovery plan (DRP), also known as a disaster recovery implementation plan or an IT disaster recovery plan. It is a documented policy and procedure that helps an organization carry out recovery procedures in the event of a disaster. Thereby, protecting business IT infrastructure and, more generally, fostering recovery. A disaster recovery plans primary goal is to thoroughly outline
business continuity plan 2022

7 Reasons You Need a Business Continuity Plan

What is Business Continuity? Business continuity refers to an organization’s capacity to continue doing critical tasks during and after a crisis. Business continuity planning sets risk management practices and procedures that seek to prevent disruptions of mission-critical services and swiftly and painlessly restore full operation to the company. The most fundamental requirement for business continuity is maintaining critical operations during
blog image

Best Practices for Business Continuity in 2021

Organizational Risk Management – A Case Study in Companies that have won the Brazilian Quatity Award Prize By Luiz Carlos Di Serio1, Luciel Henrique de Oliveira2, Luiz Marcelo Siegert Schuch3 AbstractSupply chain optimization, company interdependency and the establishment of global operating networks have all made companies more susceptible to uncertainty and risk. Literature on the subject lacks analysis of how companies
blog image

Alternate Communications During Times of Disaster

ALTERNATE COMMUNICATIONS DURING TIMES OF DISASTER By Dr. Jim Kennedy, NCE, MRP, MBCI, CBRM We have witnessed over the last three to five years many disasters both in the United States and abroad. Based on what we are hearing from NOAA and the National Weather Service the US is likely to see the same number, if not more, tropical storms
blog image

Critical Infrastructure

CRITICAL INFRASTRUCTURE PROTECTION IS ALL ABOUT OPERATIONAL RESILIENCE AND CONTINUITY By Dr. Jim Kennedy, MRP, MBCI, CBRM It has always been the policy of the United States to ensure the continuity and security of the critical infrastructures that are essential to the minimum operations of our economy and government. This critical infrastructure includes essential government services, public health, law enforcement,
blog image

Developing Seamless Business Continuity and Disaster Recovery Plans

DEVELOPING SEAMLESS BUSINESS CONTINUITY AND DISASTER RECOVERY PLANS By Dr. Jim Kennedy. IntroductionThe development of recovery times for both the business organization’s business continuity plan and the IT department’s disaster recovery plan need to be developed through the collaboration of both parties for either plan to provide the proper protection. However in my thirty-five years in the business continuity and
blog image

Disaster Recovery Planning & Cloud Computing

DISASTER RECOVERY PLANNING & CLOUD COMPUTING Dr. Jim Kennedy, MRP, MBCI, CBRM, CHS-IV January 2011 If you asked a group of IT practitioners or business people what cloud computing is they would probably answer in a manner consistent with blind men trying to describe an elephant with only the sense of touch. Each would have an answer consistent with their
blog image

Implementing a Good Information Security Program

IMPLEMENTING A GOOD INFORMATION SECURITY PROGRAM The frequency and potential impacts of information security breaches are increasing. Dr. Jim Kennedy explains why and looks at what organizations can do about it. Computer, network, and information security is based on three pillars: confidentiality, integrity, and availability. In my business as an information & cyber security, business continuity and disaster recovery consultant,