RBS had a Major IT glitch After DDoS Attack

By   ISBuzz Team
Writer , Information Security Buzz | Aug 13, 2015 06:00 pm PST

The RBS has had a major IT glitch, which has left many of its customers unable to access there accounts after a DDoS attack. David Fisk, EMEA, Sales Director at Quorum commented on the RBS websites temporarily brought down by DDoS attack.

David Fisk, EMEA Sales Director at Quorum :

“The recent RBS, DDoS attack poses the question of how can companies quickly recover from technical glitches? An organisation of this size has multiple redundant systems and a huge amount of experience in business continuity (BC) and disaster recovery (DR). Yet the fact remains disasters such as this will occur. Today’s IT leaders need to be on guard for even the most modest threats to their infrastructure.

Companies need to be able to minimise the amount of damage during a time of crisis and a strong BC and DR plan go a long way in helping to do this. Organisations have struggled with DR because traditional methods are either too complicated or too costly to implement and manage except for the largest companies. However, by adopting emerging technologies such as DR as a service (DRaaS) organisations can ensure their IT staff are trained and ready to instantly recover operations and keep their business viable. The reality is that neither humans nor computers are infallible and IT glitches will happen so it’s about contingency planning and minimising the impact this will have on the company.”[su_box title=”About Quorum” style=”noise” box_color=”#336588″]quorum provides mid-size businesses with fool-proof disaster recovery plans, all without the complexity or high cost of data center replication. With the Quorum Hybrid Cloud Service, clients’ recovery solutions are tested daily! And if disaster strikes, up-to-date VM clones of their protected servers take over. With just one click.[/su_box]

Subscribe
Notify of
guest
0 Expert Comments
Inline Feedbacks
View all comments

Recent Posts

0
Would love your thoughts, please comment.x
()
x