OpsCentre - Gold partners with Continuity Forum

Find us on LinkedIn

Find us on Facebook

Follow us on Twitter

News

Does ‘Fail Faster’ Make Sense for Business Continuity?

May 21st, 2015

The ‘fail faster’ mantra in business has polarised opinion. Some people swear by it, saying that by trying many new ideas rapidly, businesses are more likely to find a good one faster to help them be successful. Other people swear at it. They say that ‘fail faster’ is a hollow fad, irrelevant or worse still dangerous to the way business is done today. Yet others claim that it’s a problem of terminology: the word ‘fail’ is being used in a situation where the real goal is ‘succeed’. With high profile companies like Amazon apparently using a ‘fail faster’ approach to increase market share, business continuity managers need to know whether this approach is good or bad for their own organisations.

Read the rest of this entry »

Bad Ideas, Groupthink and Business Continuity Antidotes

May 19th, 2015

No enterprise is immune to bad ideas. Some of them can be spectacularly bad, like deserting loyal customers in order to chase new markets that never materialise, or betting the company on a technology that never actually works. A company can have everything going for it and still get it wrong. The case of Webvan with its e-tailing advantages of lower costs and better services targeting the wrong customer group is just one example. However, this kind of failure is not caused by one bad idea alone, but by one bad idea being accepted and pursued by the organisation overall. In other words, it’s groupthink, a frequent enemy of business continuity.

Read the rest of this entry »

How Would You Hire an Emergency Manager?

May 14th, 2015

Let’s suppose you want to fill a position in your organisation by hiring an emergency manager. The role of this person is to coordinate the actions of different services responding to a sizable disaster, to translate strategy into tactics, and to keep senior officials or management informed of the situation and progress towards resolution. So far, so good – except this kind of person, or experience, doesn’t grow on trees. However, it is a role that is needed in many public sector areas, including utilities, health, education, airports and port authorities. You could place an ad asking for candidates, but what do you then need to know to evaluate applications?

Read the rest of this entry »

Put Some Fat Back in Your Lean Supply Chain Diet

May 12th, 2015

Building a lean, mean supply chain machine is the dream of many organisations. On the face of it, lean sounds like a good idea. By streamlining and simplifying processes, and by cutting out flab and wastage, enterprises can boost productivity and profitability, and of course end-customer satisfaction. Just the muscle without the adipose layers is the goal. Companies aim for ever fewer suppliers, fewer product touch points and faster operations. Yet there comes a point where a supply chain starts to look more like a skeleton than a living, evolving business organism. It is at this point that the slightest shock to the system can break it. In other words, the fragility of your supply chain becomes a major risk for your business continuity.

Read the rest of this entry »

The Critical Importance of the Spokesperson in Crisis Management

May 7th, 2015

Try this simple test, made possible thanks to the ubiquity of the smartphone and its on-board camera. First, imagine a crisis that would put your organisation in a difficult posture with the public. A generally applicable example is breach of your confidential business data, including your customer records. Now take your smartphone and record a selfie video of you making a supposedly public statement about the incident. Stop the recording and play it back. Give yourself a score for each of the following aspects: clarity of speech, clarity of statements made, credibility, and level of positive appeal to an angry public looking to lynch a suspect. Scores rather lower than you’d like? You’re on the way to discovering the crucial role of the spokesperson in a crisis.

Read the rest of this entry »

Can You See the Forest for the Attack Trees?

May 5th, 2015

Our world may be turning more digital by the day, but that doesn’t necessarily make things any more certain. Such is the situation with threats against computer systems. The attack tree is an invention designed to help assess the possibility of an attack occurring, and from that the probability of one attack compared with another. The intriguing feature of the attack tree is the possibility to assign money values to different attack paths and thence to gauge your organisation’s vulnerability to one or the other.

Read the rest of this entry »

So They Cut Your Business Continuity Budget – Now What Do You Do?

April 30th, 2015

You could leap onto your desk, wave both fists in the air, and scream ‘Why, why, why?’ You could organise a whip-round in your company and invite colleagues to give generously to ‘help save our business continuity’. You could even just accept the cut. After all, whose budget isn’t being cut nowadays? Tempting as these options may seem, they do however suffer from (at least) one major drawback. They are unlikely to get your business continuity budget reinstated in full afterwards. You need a better plan. One that can see you through a rough period, help you get your budget back to where it should be, and even prevent a cut in the first place. Read on for further details.

Read the rest of this entry »

The Internet of Things and the Two Faces of Risk Management

April 28th, 2015

Within the next five years, the number of people connected to the Internet is forecast to rise to over 7 billion. The number of things hooked up to the web is projected to be around 50 billion. While the Internet of Things (IoT) still has to fulfil certain promises, the base is already there. From wearable fitness trackers to office building intrusion detection, the range of items being linked to the web is already wide. The natural and growing reflex is to consider the risk involved and appropriate risk management. But which kind of risk are we talking about?

Read the rest of this entry »

Have You Checked Out Your Business Continuity Kill Chain?

April 23rd, 2015

If you are familiar with IT security testing for organisations, you have probably heard of the concept of a kill chain. This is a route by which an attacker can achieve a given goal (steal data or sabotage an IT installation, for instance). Kill chains as their name suggests are composed of several links or stages through which an attacker moves to home in on the target result. As efficiency as well as effectiveness is part of business continuity, why reinvent the wheel? The kill chain could provide insights here as well.

Read the rest of this entry »

When the Best Response to a Pandemic is… Don’t!

April 21st, 2015

The Ebola crisis, also a pandemic because of cases in different countries, has hit the nation of Sierra Leone the hardest. National and international health teams have worked round the clock to contain the disease and prevent new outbreaks. Pharmaceuticals companies have ramped up efforts to develop new vaccines. Sierra Leone counts almost 12,000 people infected with the increases in both city and travelling populations major contributing factors. Recently, the Ebola response team in Sierra Leone tried a new tactic that was in stark contrast with previous measures. The tactic could be summed up in one word – Don’t!

Read the rest of this entry »

I know What You’re Doing in My IT System from these Tell-tale Signs

April 21st, 2015

IT security managers and IT teams can install the latest antivirus software and firewall appliances to protect their computers and networks. However, there are also other signs to look out for, which software and hardware products are not always smart enough to see. Human beings on the other hand are naturally gifted in spotting strange behaviour. When patterns change or get disrupted, we notice. Here’s a checklist of ‘indicators of compromise’ to look out for, where changes might indicate an IT security attack in progress.

Read the rest of this entry »

The Growth of User Behaviour Analysis in Business Continuity

April 14th, 2015

There is an old joke in sales that things would be great if it wasn’t for the customers. Of course, it is the customers that buy and that keep salespeople in a job. More generally, people accomplish tasks, do projects, have ideas and help to run businesses. Business continuity is inextricably bound up with people. They may be unpredictable as individuals, but display rather more predictable behaviour when grouped together. Predictive analytics has already been growing as a method of forecasting market conditions, economic trends and environmental developments. Increasingly, these techniques are also being applied in cases where people have a direct impact on business continuity.

Read the rest of this entry »

It is with Regret that the Demise of RAID 6 is Announced – for 2019 Precisely

April 9th, 2015

Information technology has certain features that make it possible to calculate probable dates of demise. It’s all digital, with a finite number of bits and bytes, and calculable error rates. As disk storage capacities increase, technologies viable today may run out of steam tomorrow. They cannot scale forever. Unlike vinyl records in the music industry or Polaroid cameras (a bit of cheat) that were written off, but then experienced resurgence in their markets, when a disk drive is dead, it’s dead. Here is the thinking behind the disturbingly precise estimate that by 2019, RAID 6 drives should no longer be part of the IT landscape or the disaster recovery scene.

Read the rest of this entry »

DevOps and the Swing of the Business Continuity Pendulum

April 7th, 2015

Concepts and fashions in business come and go. And sometimes they come back again with a new look or a different name. The origin of the DevOps name is simple to guess. It’s a combination of development and operations. The advantages cited of using a DevOps approach include a lower failure rate of software releases, a faster time to fix, and a faster time to recover if a new release crashes your server. DevOps is currently a buzzword in IT circles, but despite an inception date of 2008, just how new is it?

Read the rest of this entry »

Active/Active IT Configurations and How HA and DR Work Together

April 2nd, 2015

If the title of this post makes you go cross-eyed, don’t worry. All will become clear. Let’s explain. Active/active IT configurations consist of computer servers that are connected in a network and that share a common database. The ‘active/active’ part refers to the capability to handle server failure. First, if one server fails, it does not affect the other servers. Second, users on a server that fails are then rapidly switched to another server that works. The database that the servers use is also replicated so that there is always one copy available. Now for the other two acronyms: HA stands for high availability; DR (of course) for disaster recovery. It is DR that is more affected in this case.

Read the rest of this entry »