article thumbnail

Report: SMEs Are Prime Targets and Must Plan for Disaster Recovery

SecureWorld News

This is the gist of a new report titled " A New Age of Disaster Recovery Planning for SMEs " (download required) produced by MIT Technology Review Insights and sponsored by OVHcloud. The pandemic, geopolitical factors, and the new hybrid/work-from-home landscape put midsize companies at 500% more risk of being targeted in 2021.

article thumbnail

8 big IT failures of 2023

CIO Business Intelligence

Turn off the lights, the party’s over This next story is, technically, an IT fail that dates back to 2021, but we’ll include it this year’s roundup because it was in 2023 when it was finally resolved. But in August 2021, teachers and students noticed that the lights were staying on at full brightness continuously.

Backup 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Should You Have a Business Email Compromise Incident Response Plan?

SecureWorld News

You have a Disaster Recovery Plan and a Cyber Incident Response Plan. The basics of the BEC scam are explained in a July 2021 SecureWorld article that interviewed Stephen Dougherty of the U.S. Weaponization - While most BEC attacks don't involve malware, it isn't completely unheard of. You have a Business Continuity Plan.

article thumbnail

EPA Issues Urgent Alert for Water Utilities to Enhance Cyber Defenses

SecureWorld News

It cites cyber incidents such as the 2021 Oldsmar water treatment facility hack as examples of real-world risks. Critical lymph structure preventative measures must include cyber threat intelligence and disaster preparedness planning.

System 98
article thumbnail

Cyber Resilient Storage: An Essential Component of a Corporate Cybersecurity Strategy

CIO Business Intelligence

Keeping storage separate, as if in a silo, from your company’s comprehensive cybersecurity strategy is not only a lost opportunity, but, more importantly, it is also a trigger for increasing the risk of a cyber attack infiltrating, disrupting, costing, and making your company’s data a target for ransomware or malware. Cyberattacks

Storage 140