28 December, 2015 | Richard Muniz

What To Do about Passwords in Your Disaster Recovery Plan

One post thread on Spiceworks caught my eye.  The Spicehead wanted to know what to do about passwords when it came to DR plans.  Was he supposed to put the passwords into it, or just what was he supposed to do with them.  Well, the first thing you don’t want to do is put them in the Disaster...
13 November, 2015 | Richard Muniz

The Actual Disaster Recovery Plan

Part two of a Disaster Recovery process is the actual plan. You have to look at what could go wrong and either eliminate the possibility it would, or at least lower the impacts. So, if you failed to avoid the problem, you have to have a plan to meet it and deal with it. There’s a lot of really...
30 September, 2015 | Richard Muniz

Security Issues in Disaster Recovery

There was a movie that came out a few years back with one line that has stuck with me, and the truth behind it is very evident. “There is opportunity in chaos!” And in recovery scenarios, opportunity abounds. One of the real problems when doing business recovery is that too often, our focus...
29 September, 2015 | Richard Muniz

Virtualization As a Part of Disaster Recovery Plan

Mitigation (eliminating or lowering the impact of an incident) is a crucial part of any Disaster Recovery plan, as well as planning itself. I’ve always wanted to underscore the need to have this sorted out in advance, and Hurricane Sandy is the ideal place to point. Some of you will remember...
18 March, 2015 | Richard Muniz

Key Points for Good Disaster Recovery Planning

In some of the previous articles we’ve looked at disaster recovery planning, and I pointed out that there are four distinct areas of planning: mitigation planning response recovery We took a decent look at mitigation, which we said was eliminating or minimizing the impact of a...
17 February, 2015 | Krishna Kumar

Ten Simple Ways to Prevent Security Breaches in VMware Server

VMware is one of the leading virtualization product developers. Virtualization helps make the best use of hardware resources. Implementing and managing VMware infrastructure is simple and provides great performance with high availability and business continuity through simplified disaster recovery...
24 December, 2014 | John O'Neill Sr.

5 Steps for Protection against Wiper Malware

Significant security threats emerged in 2014. Closing out this epic year with a bang is Destover, aka Wiper. Wiper, as far as security threats go, is significant. Significant enough that the FBI quietly sent a memo to businesses and government agencies advising vigilance against Wiper based...
19 September, 2014 | Richard Muniz

Patching Is Mitigation You Do on Daily Basis

Recently, Disaster Recovery was a topic of several blog posts.  So far we’ve identified the four pieces, and they are: • Mitigation: lessening or eliminating the impact of an event • Planning: putting together a document that will act as a script to help you get back up and...
5 August, 2014 | Richard Muniz

Why Disaster Recovery Plans Fail

Let’s pause for a sec and see what we’ve covered so far.  We know that there are 4 pieces to Disaster Recovery and they are Mitigation, Disaster Planning, Response, and Disaster Recovery itself.  We’ve also defined Mitigation as those steps you can take to eliminate or lessen the impact an...
24 July, 2014 | Richard Muniz

Disaster Recovery: Not Just Backups

Some folks blame General George Patton for the G6P Principal.  Others say it was none other than Alexander the Great.  Either way, they both certainly employed it. “What is it?” you ask. I’m so glad you did.  Otherwise there’s no point in going on with this article.  G6P stands...
Show more articles
...