cyber_security:cyber_recovery_strategy
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
cyber_security:cyber_recovery_strategy [2022/06/15 15:41] – peter | cyber_security:cyber_recovery_strategy [2022/06/15 15:43] (current) – peter | ||
---|---|---|---|
Line 4: | Line 4: | ||
**IMPORTANT**: | **IMPORTANT**: | ||
- | * It is a common misconception that disaster recovery and cybersecurity recovery are one in the same. | + | * It is a common misconception that disaster recovery and cybersecurity recovery are one and the same. |
* Although they are similar and have some overlap, disaster recovery’s primary objective is to provide business continuity after disruption from man-made or natural causes. | * Although they are similar and have some overlap, disaster recovery’s primary objective is to provide business continuity after disruption from man-made or natural causes. | ||
* Security recovery, on the other hand, protects data assets after a data breach. | * Security recovery, on the other hand, protects data assets after a data breach. | ||
</ | </ | ||
- | + | ||
---- | ---- | ||
cyber_security/cyber_recovery_strategy.1655307670.txt.gz · Last modified: 2022/06/15 15:41 by peter