What is Business Continuity?

quote-to-not-prepare-is-the-greatest-of-crimes-to-be-prepared-beforehand-for-any-contingency-sun-tzu-59-87-13

Business Continuity originally emerged from the military’s need to protect their operations from failure due to reliance on a single centralized system. If a particular facility were destroyed, the whole system would go down. To remedy this they created contingency plans in the case of an outage.

Here are some common industry definitions:

Gartner: “Business continuity…is a broad disaster recovery approach whereby enterprises plan for recovery of the entire business process. This includes a plan for work spaces, telephones, workstations, servers, applications, network connections and any other resources required in the business process.”

The International Organization of Standards: “Business Continuity is defined as the capability of the organization to continue delivery of products or services at acceptable predefined levels following a disruptive incident.”

Tech Target: “[Business Continuity]describes the processes and procedures an organization puts in place to ensure that essential functions can continue during and after a disaster. [Business Continuity] seeks to prevent interruption of mission-critical services, and to reestablish full functioning as swiftly and smoothly as possible.”

Cloud Security Alliance: “Business Continuity and Disaster Recovery (BC/DR) are the contingency plans and measures designed and implemented to ensure operational resiliency in the event of any service interruptions.”

National Fire and Protection Association (NFPA): An ongoing process to ensure that the necessary steps are taken to identify the impacts of potential losses and maintain viable continuity and recovery strategies and plans.

As you will learn, Business Continuity is a business process, set of procedures, methodologies and an overall management approach to making a business impervious to any form of disaster which would disrupt business operations.

012715_0023_BusinessCon1

The Problems and Pains of Modern Technology

According to the RSA, there were 173% more fraud attempts on mobile between 2013 and 2015. Today’s modern world comes with it’s challenges and one of the biggest to date is managing sensitive data securely.

Here are some staggering cyber-security statistics graciously put together on Barkly’s blog:

In Q3 2016 alone, 18 million new malware samples were captured.

More than 4,000 ransomware attacks have occurred every day since the beginning of 2016.

The amount of phishing emails containing a form of ransomware grew to 97.25% during Q3 2016, up from 92% in Q1 2016

78% of people claim to be aware of the risks of unknown links in emails. And yet they click anyway.

52% of organizations that suffered successful cyber attacks in 2016 aren’t making any changes to their security in 2017

Of organizations who suffered an attack in 2016, 45% expect budget to stay the same and 7% expect budget to decrease.

The Emergence of Ransomware

RansomwareVictimHeadline

Source: Business Insider, US Department of Justice and Department of Homeland Security

Ransomware combined with pre-existing threats have evolved is taking the world by storm along with their money on many occasions. (To 2015 this was to the tune of $24 million and included hospitals, universities and even sheriff’s departments)

Ransomware works by: (1) introducing an infected file (2) locking up your files and or computer (3) providing a timer window that gives you a deadline to pay the designated “ransom” (usually through Bitcoin) after which you get your files back. However in some cases, some or all of the files will not wok or will not be returned. Prevention is the best cure.

Public, Investor and Regulatory pressure to perform (+ The liability when things go wrong)

DataBreachNYP

Source: US Department of Health and Human Services

The public, investors and especially regulatory bodies are not always the most forgiving when things go wrong. This means a lot of pressure put on managers, executives and organizations as a whole to get it right. This is why proper assessment, management and ongoing implementation is critical.

How BC Prevents the Pains of Disasters

Business Continuity is one of those things that is extremely easy to lay out and thing through but is far more difficult to implement day to day. And that implementation is the critical final step to truly be as disaster-proof as possible.

Some steps to keep in mind to prevent ransomware and other disasters from hindering your business:

  • Network Fail-over – Having a secondary mode of internet in case the primary source fails. Typically we will recommend an air card on the PC or laptop which will activate in the event of a failure.
  • Data Backup – Protecting your data by creating copies daily in multiple geographically spaced out locations. We do this through our various data centers across the nation.
  • Operating System (OS) redundancy – Can the system be recovered and configured quickly? The key is to be able to not only recovering the data (through data backups) but rolling out the original OS with everyone’s settings in tact. Often people can access everything remotely which allows for a more location independent work vs limited to just the main office space.

The key to mastering business continuity is not only preparation but implementation of that preparation. Even small moves toward protecting your data and its users are better than dozens of year long document plans alone.

Best of luck with your Business Continuity planning!

 

The Cloud Episode 33: Building Cybersecurity Culture with Adam Brewer

giphy (2)

Hello Hello!

Thanks for joining us for another episode of The Cloud. In this episode we spoke with Adam Brewer of CyberWise IQ, a company dedicated to educating others on the tenets of Cybersecurity.

I think you will enjoy this very unique yet informative discussion on today’s episode of The Cloud.

Mic shot- Podcast

Adam Brewer, VP of Client Relations at Shield Logic (formerly CyberWise)

In this episode you will learn:

  • How human error is the biggest threat of all
  • How Adam and his team approach Cybersecurity from a company culture standpoint
  • What Adam’s definition of The Cloud and Cybersecurity is
  • Some best practices, tips and fundamentals to protect yourself and your infrastructure

We hope you enjoy it!

Subscribe to The Cloud on iTunes     |   Download MP3       |     RSS

2000px-Download_on_iTunes.svg

iTunes-mp3-3

Additional Resources

P.S. Watch out for this guy!

Episode 32: Best of The Cloud – Part 1

giphy (1)

Welcome welcome! Glad to have you back. This show is part 1 of a two part series recapping of our show from last year with clips of our wonderful guests.

We have taken some particularly interesting clips and compiled them together. Let us know what you think.

In this episode you will hear from:

We have full interviews linked below if you wanted to hear the whole chat with any of our guests!

We hope you enjoy it.

Subscribe to The Cloud on iTunes     |   Download MP3       |     RSS

2000px-Download_on_iTunes.svg

iTunes-mp3-3

Additional Resources

  • The Cloud Episode 7: Open Gov Portal, Being a Chief Data Officer, and Re-imagining Our Cities (with Abhi Nemani)
  • The Cloud Episode 1: Why We’re Doing this Show (with Amon Prasad, CEO of Network Remedy)
  • The Cloud Episode 3: Cyber-crime, Hacking, The Legality of IT, and Evolution of Managed Service Providers (with Charles Weaver)
  • The Cloud Episode 13: Two Hosts and A Cloud, Ecosystems, and The Value of Software (with Brian Gracely)
  • The Cloud Episode 14: The Woz, Future Stack ’15 Awesomeness, Modern Software and Takeaways (with Sam Lambert)

Episode 31: Hyperconvergence, the LA Cloud Computing Meetup and We’re Speaking at MSP World 2016

The Cloud Show

Welcome to another episode of The Cloud!

We know it has been a little while since our last episode, but we’ve been busy growing and transforming the company and show. We have some new team members and a whole lot of new insights that we are excited to share with all of you.

You can expect the episodes to provide the most valuable timely content possible aimed at stimulating new ideas, thinking and directions for your organization on your Cloud and IT journey.

LA Cloud Computing Meetup

Our guests today include Matt Atkin of Sky Silk as well as Charles Weaver to explain how the MSP Alliance and MSP World began. We’ll also go over what we will be discussing at MSP World as well as a review of what exactly Managed Services are.

In this episode you will learn:

  • What Hyperconvergence is
  • What value Sky Silk provides in the Hyperconvergence space
  • What you can expect from the LA Cloud Meetup
  • What is MSP World and the MSP Alliance? (+ how they were formed in Berkley)
  • What are Managed Services
  • What topic we will be discussing at MSP World

Let us know what you think!

Subscribe to The Cloud on iTunes     |   Download MP3       |     RSS

2000px-Download_on_iTunes.svg

iTunes-mp3-3

Further Reading and Resources

Episode 30: Managed Break-Fix Services, IT Support and Dealing with Technical Problems

Paco Lebron, Founder of ProdigyTeks, Inc.

Paco Lebron, Founder of ProdigyTeks, Inc., an IT consulting firm specializing in both residential and small business. ProdigyTeks was founded July of 2011 and has been in business for the past 5 years. ProdigyTeks specializes in a wide range of services, including tailored computer services and solutions for residential customers and small to medium sized businesses.

Over the past 8 years, Mr. Lebron has excelled at leadership, analysis and operations. He works toward building Infrastructure support, SQL Database management, and serving others with their computer needs. His Bachelor’s on Computer Engineering Technology from DeVry University has helped pave a path of the success in the industry.

Mr. Lebron is currently a Co-Host of the Computer Business Podcast. Spreading the word on how to take your IT business to the next level. Mr. Lebron has shared tips and ideas on how he became successful with ProdigyTeks.

Subscribe to The Cloud on iTunes     |   Download MP3       |     RSS

2000px-Download_on_iTunes.svg

iTunes-mp3-3

Episode 29: The Viability of the Break-Fix Model, Troubleshooting and the Future of Tech Support

Matthew Rodela

Founder, Editor-in-chief, Host of YFNCG

Matthew owned and operated Jiffy-PC, a computer consulting company outside of Washington, DC, for 7 years. Now he runs a WordPress Consulting agency called Aledor, a Computer Business website builder service called Tech Site Builder, as well as the Your Friendly Neighborhood Computer Guy (YFNCG) website and podcast.

We’re excited to talk with Matthew about the viability of the Break-fix services and its interplay between Managed Service Providers (MSPs) and The Cloud.

Subscribe to The Cloud on iTunes     |   Download MP3       |     RSS

2000px-Download_on_iTunes.svg

iTunes-mp3-3

After listening to this episode you’ll learn:

  • Matthew’s story of how he got started in break-fix work
  • The origins of break-fix and what it is
  • The long term viability and interplay of break-fix with Managed Services
  • How solo IT consultants will utilize a hybridized billing approach

Further Reading and Resources

Your Friendly Neighborhood Computer Guy

ComputerBusinessPodcast.com

Tech Target Break Fix Model Definition

Episode 28: Legal Cloud, Risk Management, Bitcoin (again) and Data Security

Pamela Morgan, attorney, educator, entrepreneur and public speaker

Pamela Morgan has spent much of her career working in and advising small businesses. She began focusing her law practice on bitcoin and digital currencies in early 2014. Much of her practice involves advising clients on how to use Blockchain technology to reduce risk and uncertainty in business and legal settings.

She is a widely respected authority on multi-signature governance and legal innovation using digital currencies. Pamela is one of the few attorneys whose knowledge and understanding goes beyond legal theory; she actually uses these technologies everyday. She’s authored numerous “how-to” articles and is known for delivering engaging, practical presentations about her work to audiences around the world.

In addition to her law practice, Pamela is the CEO of Third Key Solutions LLC. Third Key is the culmination of her work advising bitcoin startups in multi-signature governance processes, key management, and disaster recovery. She is also a board member of the CryptoCurrency Certification Consortium (C4) a non-profit industry standards organization, where she serves as the Director of Education

We’re excited to talk to Pamela about The Cloud, Risk Management for Businesses and Best Practices from a Legal Perspective.

Subscribe to The Cloud on iTunes     |   Download MP3       |     RSS

2000px-Download_on_iTunes.svg

iTunes-mp3-3

 

Episode 27: Cyber Security, The FBI-Apple Encryption Debate and Best Practices to Protect Yourself

unnamed (1)

Morgan Wright, expert on Cyber-security Strategy and Cyber-terrorism

Our guest this week is Morgan Wright, an internationally recognized expert on Cyber-security Strategy, Cyber-terrorism, Identity, Theft and Privacy. His landmark testimony before Congress on Healthcare.gov changed how the government collected personally identifiable information.

He has made hundreds of appearances on national news, radio, print and web, including Fox News, Fox Business, CNBC, ABC, Fox News Radio, Sirius XM, PBS and CNN.

Previously Morgan was a Senior Advisor for the U.S. State Department Anti-terrorism Assistance Program and Senior Law Enforcement Advisor for the 2012 Republican National Convention. In addition to 18 years in state and local law enforcement, Morgan has developed solutions in defense, justice and intelligence for the largest technology companies in the world.

We’re excited to chat with Morgan about Cyber-security, its significance and the most important aspects we need to focus on for the future.

Subscribe to The Cloud on iTunes     |   Download MP3       |     RSS

2000px-Download_on_iTunes.svg

iTunes-mp3-3

Episode 26: Design Thinking, Cloud Apps, and The Sharing Economy

PekPongpaek

Pek Pongpaet, Founder of Impekable

Pek Pongpaet is from Thailand, raised in a Foreign Service family. He studied at two international schools in Thailand and Malaysia as well as Computer Engineering at the University of Illinois in Chicago.

He has worked with companies such as Accenture, Accenture Labs, Sears Holdings, Roundarch and SpotOn befor founding his own UX/UI design firm Impekable.

Impekable crafts mobile and web products for super high-profile clients including Google, HP, Motorola, Discovery, Accenture, Cognizant, Aruba, Twilio, Constant Contact, Zebra, Invensense and more. Pek can be reached at pek(at)impekable.com

We are excited to chat with Pek about Design, The Cloud and beyond.

 

Subscribe to The Cloud on iTunes     |   Download MP3       |     RSS

2000px-Download_on_iTunes.svg

iTunes-mp3-3

Further Reading and Resources:

  • https://www.invisionapp.com/
  • http://www.adobe.com/creativecloud.html
  • http://impekable.com/
  • https://www.facebook.com/impekable
  • https://www.linkedin.com/in/pekpongpaet

Episode 25: Bitcoins, Blockchains, The Cloud and Beyond!

Marshall Swatt, Serial Entrepreneur, C-level Technologist

Marshall has over twenty years of startup experience as founder, COO, CTO, with extensive strategy, operations and technology experience. Several successful startup exits. Experience with acquisitions and business development.

Technology design and development work for several corporations including: Citigroup, Deutsche Bank, Deutsche Financial, Condé Nast, MoMA, National Geographic.

Marshall is the former co-founder and CTO for Coinsetter, Inc.Blockchain and security advocate, which raised $2M in angel funding over 2 1/2 years. He also, led the acquisition of Canada’s largest bitcoin firm, Cavirtex in April of 2015.

Check out the interview links below to learn more about Bitcoin, Blockchains and The Cloud!

Subscribe to The Cloud on iTunes     |   Download MP3       |     RSS

2000px-Download_on_iTunes.svg

iTunes-mp3-3