Essential guide to business continuity and disaster recovery plans
A comprehensive collection of articles, videos and more, hand-picked by our editors
What are some commonly overlooked vulnerabilities in VoIP systems?
The following table lists examples of frequent VoIP system vulnerabilities, with recommended actions to address them.
Related Q&A from Paul Kirvan
From mainframes to the cloud, the business continuity profession has seen a lot over the decades. How did we get to the business continuity process ...continue reading
Has your organization created a disaster recovery plan and left it on the shelf? You're not alone. Explore what you can do to improve your plan's ...continue reading
In conducting an IT risk assessment, are you asking the right questions to your staff? Are you talking to the right people? These elements are ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.