Business Continuity Blog
Book A Demo Today

Stay up to date with
the latest resources
from Continuity2

Articles from our team and words from our clients

Continuity2 CRISIS COMMUNICATIONS TRAINING EXERCISES TO IMPLEMENT

Crisis Communications Training Exercises to Implement

Crisis management training is crucial for ensuring the organisation's survival regardless of the industry in which it operates.

READ MORE ❯

Third party risk management

Third-Party Risk Management

If you run a business, it's more than likely that you rely on other people, companies and organisations to operate smoothly.

READ MORE ❯

Continuity2 WHY YOU NEED TO KEEP YOUR BCM PLANS UP TO DATE

Why You Need to Keep Your BCM Plans Up to Date

Determining critical functions, recognising potential threats, and meeting regulatory requirements are only a few examples of factors firms need to consider during this process.

READ MORE ❯

Continuity2 CYBER THREATS HOW TO PROTECT CONSUMER DATA

Cyber Threats: How to Protect Consumer Data

In today's day and age, the threat of a cyber-attack looms over every company.

READ MORE ❯

Placeholder Image

Can Business Continuity Be a Tool to Minimise the Impact of Political Unrest?

How can business continuity help companies during political unrest? Find out how a good continuity plan can minimise potential impact here.

READ MORE ❯

Continuity2 PREPARE FOR PLANNED AND UNPLANNED DOWNTIME

How to Plan for the Cost of Unplanned Downtime

According to the report created by the General Electric Company, offshore oil and gas organisations suffer financial losses from unplanned downtime every year.

READ MORE ❯

IT disaster recovery

IT Disaster Recovery Management

We don't often think of the worst-case scenario, but inevitably it is bound to actually happen to some businesses

READ MORE ❯

Placeholder Image

BoE / FCA / PRA - Operational Resilience Within C2's Meridian BCMS

The BoE, FCA, and PRA published their final policy for Operational Resilience on the 29th of March 2021 centred around analysing and protecting the Important Business Services.

READ MORE ❯

Continuity2 PREPARE FOR PLANNED AND UNPLANNED DOWNTIME

Prepare for Planned and Unplanned Downtime

Many organisations are unsure of the best way to handle planned and unplanned downtime. This article discusses the key elements to consider.

READ MORE ❯

Continuity2 HOW TO IDENTIFY SINGLE POINTS OF FAILURE AND ENSURE CONTINUITY

How to Identify Single Point of Failure and Ensure Continuity

Single points of failure can bring your whole system to a standstill, or at best - bring it to "limp mode". If you have ever worked on a car, you know what this means.

READ MORE ❯

Continuity2 5 APPROACHES TO RISK BASED INTERNAL AUDITS

5 Approaches to Risk-Based Internal Audits

In this article we discuss the five most common approaches Risk-Based Internal Audits. Read on to see which one would be most suitable for your current business model.

READ MORE ❯

Continuity2 POST INCIDENT ANALYSIS

Post-Incident Analysis

In this article, we're going to take a look at the key elements of Post-Incident Analysis, as well as why it is important to carry them out after major disruptions.

READ MORE ❯