We offer decades of experience in technology solutions, combined with in-depth knowledge of the latest industry advances.
Article
What is a Business Continuity Management System? The next important step in building a mature Business Continuity Program is establishing a Business Continuity Management System (BCMS). If up to this point creating our Business Continuity Program has been like building a house,...
Article
If defining your Business Continuity Program is putting down its foundation and conducting a proper Business Impact Analysis is framing in the walls, then the process of creating your Recovery Workflows is like installing your mechanical, electrical, and plumbing. It’s...
Article
“You can't make an architect. But you can open the doors and windows toward the light as you see it.”Frank Lloyd Wright What is a Business Impact Analysis? If defining your business continuity program is putting down its foundation, then conducting...
Case Study
Overview A Regional P&C Insurance Company based in Harrisburg, Pennsylvania, is the niche property and casualty insurer that brings stability to multifamily housing. The carrier currently insures commercial establishments including apartment buildings, office buildings, and shopping centers in Pennsylvania, Delaware,...
Article
What is a Business Continuity Program? It’s difficult to think of starting any endeavor in business and thinking it would have a chance of success if you didn’t define what you were trying to do. Developing a successful business continuity...
Video
A #Curio Session Hosted By: Sayers Engineers & Special Guests Watch our Sayers Engineers lead an interactive panel discussing all things business continuity. https://youtu.be/l5dXVrifkXc
Video
A #Curio Session Hosted By: Kevin Finch, MBA MBCI Sr. Business Continuity Architect Kevin Finch relays the most important messages and tips from the Disaster Recovery Journal Spring Conference as well as giving his own input on business resiliency. https://youtu.be/2gDMzguha2g
Article
It’s very difficult to predict where the next cyber attack may come from, and in what form. A cyber threat to critical IT infrastructures, financial systems, and transportation channels can cause immense damage to a population. The current media coverage...
Article
Maturity is a term that is often brought up in the world of business. Bonds mature, markets mature, neighborhoods mature, and (hopefully) technologies mature as time goes on. Every time the word gets used, however, the context is critically important. Clearly when we’re...
Article
It’s no secret that hackers and data thieves are becoming more creative with their breaching efforts. Whether it’s a cleverly disguised phishing email or troublesome malware, data thieves constantly look for new ways to get sensitive information. Another technique that...