dcsimg
 

IT Downloads Results for Topic : Business Continuity

All
All
 
 
Showing 1-10 of 29 Results    
 
 
DataCtr5

Colocation Checklist

  ITDownload  
  |   CHECKLISTS   |   Oct 06, 2016
 

This checklist will help make sure you ask the important questions that will affect your colocation services and your eventual purchase decisions.

...  More >>

 
Disaster5

Emergency Response Plan

  ITDownload  
  |   TEMPLATES   |   Aug 27, 2015
 

From irate customers and/or employees to severe weather to fire and medical emergencies, it's critical that organizations have a plan in place to ensure staff know what to do, who to contact and where critical infrastructure resides.

...  More >>

 
Disaster3

Business Continuity Plan

  ITDownload  
  |   TEMPLATE   |   Jul 22, 2015
 

This Business Continuity Plan form provides organizations an opportunity to prepare for unexpected disasters and ensure the business can continue.

...  More >>

 
DataM10

High Availability IT Services

  ITDownload  
  |   BOOK EXCERPTS   |   May 14, 2015
 

This chapter excerpt provides an availability primer and details the reasons why you need to be concerned with high availability.

...  More >>

 
BusContin4

Passing the Torch Without Getting Scorched

  ITDownload  
  |   BOOK EXCERPTS   |   Nov 07, 2013
 

This book is designed to help you navigate the process of developing an effective succession plan for your business.

...  More >>

 
BCDRTN1

Business Continuity: Considerations, Risks, Tips and More

  ITDownload  
  |   TUTORIALS   |   Aug 07, 2013
 

This guide pulls together several resources to help you identify the essential components involved in developing a strong disaster recovery plan.

...  More >>

 
Password Security, Protection and Management

Password Security, Protection and Management

  ITDownload  
  |   TUTORIALS   |   Mar 23, 2012
 

Get sound recommendations for protecting your information by selecting strong passwords and storing and managing them safely....  More >>

 
Protecting DNS Servers from Denial of Service Threats

Protecting DNS Servers from Denial of Service Threats

  ITDownload  
  |   TUTORIALS   |   Mar 21, 2012
 

Get US-CERT guidance on mitigating DoS threats to your DNS servers.

...  More >>

 
Five Steps to Identify Phishing Messages

Five Steps to Identify Phishing Messages

  ITDownload  
  |   TUTORIALS   |   Feb 13, 2012
 

Recognizing the need for employee awareness and training, ITBE's Paul Mah created this simple checklist to help organizations identify phishing messages.

...  More >>

 
Mitigating SQL Injection Attack Threats

Mitigating SQL Injection Attack Threats

  ITDownload  
  |   TUTORIALS   |   Jan 30, 2012
 

The following mitigation strategies and best practices can be used to minimize the risks associated with this attack vector....  More >>

 
 
 
Pages:   1 2Next » 
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.