Password Reset

Please enter your e-mail address. You will receive a new password via e-mail.

Menu

Skip to primary content
  • Home
  • About Rick
  • Members Area
  • Contact
  • Login

Rick Mark and Integrated Systems & Methods, Inc. IT Advisory and Business Technology Management

Not sure which way to go? I have the answers…

Tagged with EVERY

2015 Planning: BCP – Phase 1 – Getting started

I know I wrote that 'Recover or Resume' was the question....but the what's the question that supports the need to begin with? WHAT CONSTITUTES A DISASTER in the first place? This is what Phase 1 is all about in this process.  Now remember what I said, EVERY business needs to plan for this.  … Continue reading →
December 15, 2014 Leave a reply

2015 Planning: Recover or Resume? That is the question! BCP Primer

Business Continuity Planning (BCP) is a process of identifying a company’s threat exposure from a multitude of angles, processes, including hard and soft asset availability during an incident.  These angles all fit into two separate overlying categories:  Internal threats and External … Continue reading →
December 15, 2014 Leave a reply

BCP – Phase 1 – Getting started

I know I wrote that 'Recover or Resume' was the question....but the what's the question that supports the need to begin with? WHAT CONSTITUTES A DISASTER in the first place? This is what Phase 1 is all about in this process.  Now remember what I said, EVERY business needs to plan for this.  … Continue reading →
August 30, 2012 Leave a reply

Recover or Resume? That is the question! BCP Primer

Business Continuity Planning (BCP) is a process of identifying a company’s threat exposure from a multitude of angles, processes, including hard and soft asset availability during an incident.  These angles all fit into two separate overlying categories:  Internal threats and External … Continue reading →
August 25, 2012 Leave a reply

Recover or Resume? That is the question! BCP Primer

Business Continuity Planning (BCP) is a process of identifying a company’s threat exposure from a multitude of angles, processes, including hard and soft asset availability during an incident.  These angles all fit into two separate overlying categories:  Internal threats and External … Continue reading →
August 25, 2012 Leave a reply

Post navigation

« Older
View Full Site
Proudly powered by WordPress