
To-Do’s for Creating a DR Strategy
The 12-Point DR Planning To-Do List will take you through some of the critical decisions that need to be made and help you determine your next steps.
At the Cyber Fraud of West Michigan - Out Smart the Hackers seminar, Jorel Van Os gave an eye-opening presentation. He demonstrated how easily phishing can be engineered, and followed up with real-life examples to further express how frequent and common these threats are. As Jorel points out with a few key stats, account take overs are on the rise in the first two quarters of 2019.
See Jorel's slides to learn more about the threats, as well as some practical tips and recommended tools for increasing your email defenses.
Presentation Overview:
The 12-Point DR Planning To-Do List will take you through some of the critical decisions that need to be made and help you determine your next steps.
Use this checklist to assess your disaster readiness and determine what you need to create an effective DR plan or enhance an existing DR plan.
Learn how to leverage the benefits of edge computing, including moving latency-sensitive apps to the edge, using hybrid IT, and implementing next-level networking.