Risk management

Risk management is the identification, evaluation, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities. Risk management’s objective is to assure uncertainty does not deflect the endeavor from the business goals  Within this key management focus area,

Why IT Disaster Recovery

IT is the backbone of every business. An IT disaster can cause a companywide disruption. Per Gartner, 2 out of 5 organizations that experience a severe disaster go out of business within five years. Most organizations are now critically dependent on IT. The fact is that no business is immune to disasters, which can strike at any time, often without prior notice, and at the worst possible time. And when the IT fails down, most organizations are unable to function. At best, a severe disaster could merely incapacitate a business, allowing it to crawl back to normalcy over a period of time. At worst, the business can be permanently crippled, or may even shut down.

Information Security

Currently information security is crucial to all organization to protect their information and conducts their business. Information security is defined as the protection of information and the system, and hardware that use, store and transmit that information. Information security performs four important for an organization which is protect the organization’s ability to function, enable the safe operation of applications implemented on the organization’s IT systems, protect the data the organization collect and uses, and lastly is safeguards the technology assets in use at the organization. Information is one of the most important organization assets. For an organization, information is valuable and should be appropriately protected. Security is to combine systems, operations and internal controls to ensure integrity and confidentiality of data and operation procedures in an organization. Information security history begins with the history of computer security.

Core focusses on the following:

  • Risk Culture Assessments
  • Enterprise Risk Management
  • Operational Risk Management
  • Compliance Management
  • Internal Audit Services
  • Risk & Compliance Training and Solutions
  • Value add Projects

Why It Disaster Recovery

Even loss of the data can bring the organization to a standstill – not to mention other implications such as fines, regulatory sanction etc. IT Disaster Recovery is all the more critical for any organization, due to regulations and corporate governance implications that exist now in most professionally managed organizations. In most organizations, the processes that deliver products and services depend on information and communication technology (ICT). ICT continuity management supports the overall business continuity management (BCM) process of an organization. BCM ensures that your organization’s processes are protected from disruption and is able to respond positively and effectively when disruption occurs.

Green IT & Energy Management

Sustainability ensures living today comfortably and leaving enough for tomorrow as well. CORE believes Information Security, Energy Security, Physical Security, Environmental Security, Business Security (continuity) – all go together to ensure Sustainability. We use their business skills to provide objective advice and expertise, and help an organization to develop any specialist skills that it may be lacking.

IT Disaster Recovery

IT Disaster Recovery (IT DR) refers to the processes, policies and procedures related to preparing for recovery or continuation of technology infrastructure after a disruption or disaster. Most IT DR plans look to ensure that core, high-priority operations continue or at least resume within an acceptable time after a disaster Implementation of IT Disaster Recovery involves resilience of the entire Technology chain that supports critical applications, including:

  • Servers and routers
  • Networks and Telecom infrastructure
  • Data and other information
  • Data Centers, Workstations, Desktops, Laptops and other computing equipment

Information Security

It started around year 1980. In 1980, the use of computers has concentrated on computer centres, where the implementation of a computer security focuses on securing physical computing infrastructure that is highly effective organization. Although the openness of the Internet enabled businesses to quickly adopt its technology ecosystem, it also proved to be a great weakness from an information security perspective. The system’s original purpose as a means of collaboration between groups of trusted colleagues is no longer practical because the usage has expanded into millions of frequently anonymous users


  • The standard aims to achieve the following.
  • Provides a basis for understanding business continuity management
  • Provides a means of measurement that is consistent and recognized
  • Provides a system based on established good practice
  • Your company’s value is its data
  • Protecting your data means protecting its confidentiality, integrity, and availability. The consequences of a failure to protect all three of these aspects include business losses, legal liability, and loss of company goodwill. Information security, as a recognized business activity, has come a long way in the past decade. Various factors have caused the discipline to mature and it has now attained its “license to operate” within the corporate and public sector environments, becoming one of the core business and organizational enablers.