Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » What is Disaster Recovery?

What is Disaster Recovery?

Disaster recovery acts as a safety net for your computer systems. You can get back to work if something bad happens, like a big storm or computer hack. It employs policies, tools, and measures to mitigate the risks.

It is more like a backup place where all the important computer data is copied. So, if the main computers stop working, you can recover from this backup place. Also, not just the data but also the actual computer work can be shifted to the backup location so the company keeps running in a smooth way.

Different kinds of disasters are covered by disaster recovery, and they are:

NaturalEarthquakes and floods
Health-relatedPandemics and computer attacks like viruses or hackers trying to break in
PeopleTerrorism or dangerous chemicals are considered

Also, things like power cuts or accidents with machines are included too. This way, you can plan for all sorts of troubles to keep the business strong. 

Additional reading

cybersecurity monitoring

Cybersecurity Monitoring: Importance, Steps and Examples

According to a report by Forbes, data breaches have surged by over 72%. The issue? Threats are outpacing security measures in terms of evolution, and volume. In a landscape where each vulnerability can lead to an exploit, cyber security monitoring can help you assess your security posture in real-time, and help you plug gaps for…
ISO 27003

A Guide to ISO 27003 and the ISMS Implementation Process

The ISO 27000 family of standards is an internationally recognized set of guidelines to help organizations implement, improve, or certify their information security. ISO /IEC 27001 is the central standard on which a number of supporting standards are outlined – such as ISO 27003.  In this article, we discuss what ISO 27003 is, its importance,…
CMMC Compliance

Cybersecurity Maturity Model Certification (CMMC) Compliance Guide

Your organization’s data is perhaps your most valuable asset. Protecting its security, confidentiality, and integrity is key to keeping your organization safe. This need to preserve information gets even more pronounced when you work with the Department of Defense (DoD), the United States of America, which values Cybersecurity Maturity Model Certification (CMMC) Compliance. The CMMC…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.