@ AndyF: #0-Day vulnerabilities in #Apache #Struts: a plague for companies? https://t.co/gg9UbIbOVD #vulnerability #security #cybersecurity
19 Apr 2017
@AndyF PowerShell has a cmdlet to search text files, even on UNC paths. Findstr is limited to drives. See an example https://t.co/kECqIz2UvJ
06 Apr 2017
Great read: Virtualize Active Directory Domain Services Domain Controllers on Hyper-V or VMware https://t.co/AWYRdQXRKg
04 Apr 2017
Running an IIS 6 website (Windows 2003)? Upgrade now! Zero day found that @Microsoft will not fix. Read more on And… https://t.co/AVy0XNPO6r
30 Mar 2017
Get the free six Business Continuity Awareness Week posters themed "Cyber security is everyone’s responsibility".… https://t.co/yv7q8AsoJJ
23 Mar 2017
Business Continuity Management: an introduction.
What is the purpose of Business Continuity Management?The goal of a Business Continuity Manager is, within the limits and conditions formulated by company management, to take care that the normal activities of the company, organization or institution can (re-)start, within a stipulated time frame, when a calamity or disaster occurs. Governments pay special attention to information/data and ICT systems that receive, save, edit, view and send data as these are the most important resources for the contemporary business operations.
Business Continuity Management: some calamities we all can recognize.
Consequences of a calamityThe abruptness and the often large impact on the normal functioning of an organization can result in, among other things, the following:
What to do?Awareness that a fire, power failure or other disaster not only affects your neighbour is the first step. Start with the questions "what am I going to do about it?" and "who is going to do it?". These articles may help getting you started:
Deming Cycle of Continuous Improvement (Plan, Do, Check and Act) with consolidation.
You may vote your opinion about this article:
Scripts and programming examples disclaimerUnless stated otherwise, the script sources and programming examples provided are copyrighted freeware. You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation. However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data. Make sure you have verified full backups and the associated restore software available before running any script or programming example. Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
Generated by WebHalla™ Version 0.1.e.0 : Saturday 29-4-2017
© Copyright 1995-2017 Johan van Soest