“Five nines” up-time means more reliability than “four-nines” up-time.
Blog
All technology systems should come with redundancies to guar…
All technology systems should come with redundancies to guarantee 100% “up time”
Data privacy guidelines also include aspects of data integri…
Data privacy guidelines also include aspects of data integrity—keeping the information complete and accurate.
ACME, Inc. is considering migrating its technology infrastru…
ACME, Inc. is considering migrating its technology infrastructure to a Google-based cloud platform. Which of the following will NOT be a benefit?
You may remember that there are four phases when responding…
You may remember that there are four phases when responding to technology incidents—whether they were caused intentionally, or incompetently, or by the forces of nature.Describe each phase briefly and, in your words, describe also how each phase contributes to broader risk management. How does each phase connect directly to an organization’s broader ability to actively mitigate known risks?You may optionally apply these phases / risk management contributions to any organization that interests you. You are not required to use the same organization from the prior answer. If you use an organization, speculate as to the organization’s details however feasible.Use no more than 600 words in total.
There is an inverse relationship between Recovery Time Objec…
There is an inverse relationship between Recovery Time Objectives (RTOs) and recovery costs; the shorter the RTO, the more expensive its recovery solution is.
Regarding the preparation phase of responses to technology o…
Regarding the preparation phase of responses to technology outages, which is NOT an acceptable part of actually preparing?
The enterprise risk management frameworks can readily integr…
The enterprise risk management frameworks can readily integrate cyber-relevant risks and controls, as well as completely unrelated risks like natural disasters and physical sabotage.
Which of the following is NOT a fundamental principle for da…
Which of the following is NOT a fundamental principle for data privacy?
The outage of an endpoint device would probably trigger the…
The outage of an endpoint device would probably trigger the need for disaster recovery.