background preloader

How to Create an Effective Business Continuity Plan

How to Create an Effective Business Continuity Plan
We rarely get a head's up that a disaster is ready to strike. Even with some lead time, though, multiple things can go wrong; every incident is unique and unfolds in unexpected ways. This is where a business continuity plan comes into play. How Business Continuity, Disaster Recovery Plans Differ Business continuity (BC) refers to maintaining business functions or quickly resuming them in the event of a major disruption, whether caused by a fire, flood, epidemic illness or a malicious attack across the Internet. Many people think a disaster recovery plan is the same as a business continuity plan, but a DR plan focuses mainly on restoring IT infrastructure and operations after a crisis. For example, if the building that houses your customer service representatives is flattened by a tornado, do you know how those reps can handle customer calls? Tutorial: How to Start a Business Continuity Program Note that a business impact analysis (BIA) is another part of a BC plan. Next, develop a plan. Related:  Fundamentals of Information SecuritymydyzSecurity + Articles

OVAL - Open Vulnerability and Assessment Language Business continuity and disaster recovery planning: The basics Disaster recovery and business continuity planning are processes that help organizations prepare for disruptive events—whether those event might include a hurricane or simply a power outage caused by a backhoe in the parking lot. The CSO's involvement in this process can range from overseeing the plan, to providing input and support, to putting the plan into action during an emergency. This primer (compiled from articles on CSOonline) explains the basic concepts of business continuity planning and also directs you to more resources on the topic. Last update: 4/2/2012. Q: "Disaster recovery" seems pretty self-explanatory. Is there any difference between that and "business continuity planning"? A: Disaster recovery is the process by which you resume business after a disruptive event. Given the human tendency to look on the bright side, many business executives are prone to ignoring "disaster recovery" because disaster seems an unlikely event. What do these plans include? Where do I start?

Public-key cryptography An unpredictable (typically large and random) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm. In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of the private key. In the Diffie–Hellman key exchange scheme, each party generates a public/private key pair and distributes the public key. Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public. Public-key algorithms are based on mathematical problems which currently admit no efficient solution that are inherent in certain integer factorization, discrete logarithm, and elliptic curve relationships. Message authentication involves processing a message with a private key to produce a digital signature.

Information Technologies & Services - 15.5 - Information Technology Disaster Recovery Policy Policy Statement This policy defines acceptable methods for disaster recovery planning, preparedness, management and mitigation of IT systems and services at Weill Cornell Medical College. Entities Affected By This Policy The Weill Cornell Medical College and Graduate School of Medical Sciences Responsible Executives: WCMC Chief Information OfficerResponsible Department: Information Technologies and Services (ITS)Dates: Issued: Interim, July, 1st 2010. Reason for Policy The disaster recovery standards in this policy provide a systematic approach for safeguarding the vital technology and data managed by the Information Technologies and Services Department. Document Conventions To assist in the usage of this policy document, the Appendix Section below contains a summary of all the DR Timeline deliverables plus a DR glossary. Principles Disaster Recovery planning is a program that has a continuous lifecycle.

101 Google Tips, Tricks & Hacks Looking for the ultimate tips for Google searching? You've just found the only guide to Google you need. Let's get started: 1. The best way to begin searching harder with Google is by clicking the Advanced Search link. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23, In fact, you can combine any Boolean search operators, as long as your syntax is correct. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. Sandboxie - Sandbox software for application isolation and secure Web browsing What is Business Continuity? Business Continuity is often described as ‘just common sense’. It is about taking responsibility for your business and enabling it to stay on course whatever storms it is forced to weather. It is about “keeping calm and carrying on”! BC is about building and improving resilience in your business; it’s about identifying your key products and services and the most urgent activities that underpin them and then, once that ‘analysis’ is complete, it is about devising plans and strategies that will enable you to continue your business operations and enable you to recover quickly and effectively from any type disruption whatever its size or cause. Business Continuity (BC) is defined as the capability of the organization to continue delivery of products or services at acceptable predefined levels following a disruptive incident. At the heart of good BC practice, sits the BCM Lifecycle. To get a copy of the BCI’s Good Practice Guidelines click here.

How to view and manage event logs in Event Viewer in Windows XP This article describes how to use Event Viewer to view and manage event logs in Microsoft Windows XP. Event Viewer In Windows XP, an event is any significant occurrence in the system or in a program that requires users to be notified, or an entry added to a log. The Event Log Service records application, security, and system events in Event Viewer. Event Log Types A Windows XP-based computer records events in the following three logs: Application log The application log contains events logged by programs. How to View Event Logs To open Event Viewer, follow these steps: Click Start, and then click Control Panel. How to View Event Details To view the details of an event, follow these steps: Click Start, and then click Control Panel. How to Interpret an Event Each log entry is classified by type, and contains header information, and a description of the event. Event Header The event header contains the following information about the event: Date The date the event occurred. Event Types Applies to

IT Disaster Recovery Plan Businesses use information technology to quickly and effectively process information. Employees use electronic mail and Voice Over Internet Protocol (VOIP) telephone systems to communicate. Electronic data interchange (EDI) is used to transmit data including orders and payments from one company to another. Servers process information and store large amounts of data. Desktop computers, laptops and wireless devices are used by employees to create, process, manage and communicate information. What do you when your information technology stops working? An information technology disaster recovery plan (IT DRP) should be developed in conjunction with the business continuity plan. Businesses large and small create and manage large volumes of electronic information or data. Recovery strategies should be developed for Information technology (IT) systems, applications and data. Information technology systems require hardware, software, data and connectivity. Internal Recovery Strategies