(Mike Talon) In previous columns, I laid out a classification system for the most common types of disaster recovery (DR) situations, and last time I focused primarily on what to do when there is proof of a network intruder. Now let’s deal with what happens in more traditional DR situations: –Lev
Read More - Register for Free Membership