Steps to take before, during & after a cyber attack
As an IT manager you should assume only one certainty: at some point your organisation will experience some form of cyber attack. That said this report shows what steps you can take pre-, during and post-security incident to maintain regular business operations and reduce the risk of costly downtime.
What you'll learn
Managing incident response
Frameworks to build a multi-phased strategy
Drive effective approaches to support different departments
Ways to focus your attention & resource to critical areas
Presented with the challenges of an ageing spinning disk storage system, which included escalating maintenance costs and increasing failure rates, the University of Bath instigated a Proof of Concept (PoC) to make sure it found a best-fit storage solution