IT Downloads Results for Topic : Business Continuity

All
All
 
 
Showing 1-10 of 29 Results    
 
 
DataCtr5

Colocation Checklist

  ITDownload  
  |   CHECKLISTS   |   Oct 06, 2016
 

This checklist will help make sure you ask the important questions that will affect your colocation services and your eventual purchase decisions.

...  More >>

 
Disaster5

Emergency Response Plan

  ITDownload  
  |   TEMPLATES   |   Aug 27, 2015
 

From irate customers and/or employees to severe weather to fire and medical emergencies, it's critical that organizations have a plan in place to ensure staff know what to do, who to contact and where critical infrastructure resides.

...  More >>

 
Disaster3

Business Continuity Plan

  ITDownload  
  |   TEMPLATE   |   Jul 22, 2015
 

This Business Continuity Plan form provides organizations an opportunity to prepare for unexpected disasters and ensure the business can continue.

...  More >>

 
DataM10

High Availability IT Services

  ITDownload  
  |   BOOK EXCERPTS   |   May 14, 2015
 

This chapter excerpt provides an availability primer and details the reasons why you need to be concerned with high availability.

...  More >>

 
BusContin4

Passing the Torch Without Getting Scorched

  ITDownload  
  |   BOOK EXCERPTS   |   Nov 07, 2013
 

This book is designed to help you navigate the process of developing an effective succession plan for your business.

...  More >>

 
BCDRTN1

Business Continuity: Considerations, Risks, Tips and More

  ITDownload  
  |   TUTORIALS   |   Aug 07, 2013
 

This guide pulls together several resources to help you identify the essential components involved in developing a strong disaster recovery plan.

...  More >>

 
Password Security, Protection and Management

Password Security, Protection and Management

  ITDownload  
  |   TUTORIALS   |   Mar 23, 2012
 

Get sound recommendations for protecting your information by selecting strong passwords and storing and managing them safely....  More >>

 
Protecting DNS Servers from Denial of Service Threats

Protecting DNS Servers from Denial of Service Threats

  ITDownload  
  |   TUTORIALS   |   Mar 21, 2012
 

Get US-CERT guidance on mitigating DoS threats to your DNS servers.

...  More >>

 
Five Steps to Identify Phishing Messages

Five Steps to Identify Phishing Messages

  ITDownload  
  |   TUTORIALS   |   Feb 13, 2012
 

Recognizing the need for employee awareness and training, ITBE's Paul Mah created this simple checklist to help organizations identify phishing messages.

...  More >>

 
Mitigating SQL Injection Attack Threats

Mitigating SQL Injection Attack Threats

  ITDownload  
  |   TUTORIALS   |   Jan 30, 2012
 

The following mitigation strategies and best practices can be used to minimize the risks associated with this attack vector....  More >>

 
 
 
Pages:   1 2Next » 
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.