Essential guide to business continuity and disaster recovery plans
A comprehensive collection of articles, videos and more, hand-picked by our editors
What are some commonly overlooked vulnerabilities in VoIP systems?
The following table lists examples of frequent VoIP system vulnerabilities, with recommended actions to address them.
Related Q&A from Paul Kirvan
In this Expert Answer, Paul Kirvan discusses why a social media policy for DR communication is an important part of a disaster recovery plan.continue reading
Paul Kirvan of Kirvan Associates discusses how mobile device apps are easing disaster recovery management.continue reading
Paul Kirvan lists five disaster-preparedness things you must do in the days leading up to a hurricane to protect your business.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.