The Credit Research Foundation. Disaster Recovery and Business Continuity. Of Your , Credit & A/R System. An Occasional Paper February 2003

Size: px
Start display at page:

Download "The Credit Research Foundation. Disaster Recovery and Business Continuity. Of Your E-mail, Credit & A/R System. An Occasional Paper February 2003"

Transcription

1 Disaster Recovery and Business Continuity Of Your , Credit & A/R System Executive Summary The Credit Research Foundation An Occasional Paper February 2003 Since September 11, 2001, 67% of the 229 companies responding to our survey have taken increased measures to ensure the security of their data and electronic systems. However, less then 10% of credit executives are concerned about a possible threat to their credit, A/R and customer information systems from a cyber attack. is most often used as a customer service tool, followed by its use in the collection area. Sixtyfive percent use in collections. Fifty-six percent of the respondents have a disaster recovery or business continuity plan in place for functionality in the event of a disaster. Seventeen percent of the credit executives responding said they have experienced an outage that caused a significant disruption to their business.

2 Background The Credit Research Foundation was interested in learning the degree of dependency that credit professionals place on electronic systems in their daily business routine; and the extent to which they feel they are vulnerable to an attack on their electronic systems, customer information and privacy. We queried the membership and received 229 responses in December Our sincere thanks to Lawrence Baye, Principal of the Management Consulting Services section of Grant Thornton LLP for providing the background information on a subject that frankly is not an area of expertise within the CRF staff. How concerned are you about the threat of a breach of your electronic systems? How serious an effect would that have on your credit and A/R organization? Is anything being done in your company to thwart an attack? While we asked several questions about e- mail systems in particular, these and other questions where the focus of this survey. E- mail is an important aspect of security due to its prevalence in the credit workplace and it s convenience for transmitting harmful viruses. Attacks are becoming more frequent and complex, and often go undetected, and business losses from security incidents are on the rise. Incidents and events are very separate terms that are often used interchangeably in error. Each month, nearly 10 million events occur in organizations of even moderate size. Sorting through this extremely high number of events on a day-to-day basis represents a big challenge for many enterprises. An event is any observable occurrence in a system and/or network. Events occur often, and when considered individually can seem isolated and disconnected. Incidents add context among a set of events that enable security administrators to gain understanding and take action if necessary. An incident is a set of one or more security events or conditions that requires action and closure in order to maintain an acceptable risk profile. Here are some examples of incidents, all of which are comprised of one or more events: 1 Large-scale infection by a virus or worm Disruption of service System misuse by an employee Computer intrusions attempts (either failed or successful) to gain unauthorized access to a system or its data Denial of Service attack Anonymous FTP abuse Changes to system hardware or software without the owner's knowledge, instruction, or consent Systems running software applications that are vulnerable to attack 1 Finding the Incident in a Haystack of Security Events, Dec 10, 2002 Symantec Enterprise Solutions 1

3 Business Continuity Grant Thornton defines business continuity risk as: The threat of any incident that may cause an extended disruption of business functions; or, impact the ongoing integrity of the firm. This definition is appropriate for our use in the context of this paper. GT further breaks down the risks of business continuity as Traditional Concerns: Fire Storm Flood Hurricane And less publicized but emerging trends: Intrusion (physical or logical) Control failures Sabotage Terrorist activity (also physical or logical) Here are some statistics: 2 out of 5 businesses that experience a major disaster will cease to exist within 2-5 years (Gartner, 2001) Some believe that as many as 80% of businesses suffering a major disaster will cease to exist as a direct or indirect result (BCC, 2001) Less than 50% of existing business continuity plans meet their firms recovery objectives (KPMG) The average bank robbery yields $2,500; average computer crime nets $500,000 (CSI/FBI 2001 Survey) What is at stake for your organization? Assets "at risk" Customer confidence Employee comfort and confidence Fiduciary responsibility Regulatory and other compliance Insurance 'out' clauses Trading partner relationships What are the consequences for your organization? Customers move to "more reliable" competitors Idle time of non-productive employees Loss of customer service satisfaction Cost of rebuilding lost data (errors/rework) Additional staff needed to resolve problems Fines and penalties imposed by regulatory agencies Fines and penalties associated with existing contracts Breakdown of internal controls 2

4 Below is a summarization of the findings of our study: Since the attack of September 11, 2001, has your company increased its measures to ensure the security of its data and electronic systems? 66.8% Yes 33.2% No How would you rate your concern over a possible threat to your credit, A/R and customer information systems from a cyber attack? (e.g., virus, hacking, etc.) 29.6% Not concerned 61.4% Somewhat concerned 9.0% Very concerned has certainly become a major and indispensable tool for communication. When asked, if is used as an integral part of the process in the following six tasks, here are the responses: is used as an integral part of the process of administering credit and A/R in the following tasks Customer logistics / operations 17% Credit risk management 17% Customer Service 21% Collections 19% Deduction resolution & management 17% Cash Application 9% 3

5 What platform does your credit organization use? 50.9% Microsoft Exchange 26.3% Lotus Notes 5.3% Novell GroupWise 7.9% POP3/SMTP 0.0% IMAP4 0.9% Outsourced provider 8.8% I really don't know How many users are there in your area of responsibility? 34.1% < Than % % % % % % > Than 100 Examining the number of users in relation to the kind of system: Number of Users Within Your Area of Responsibility System Used < Than > Than 100 Microsoft Exchange Lotus Notes Novell GroupWise POP3/SMTP IMAP Outsourced provider I really don't know

6 Disaster Recovery Is there a disaster recovery or business continuity plan in place in the event of a disaster to make functional? 56.1% Yes 8.3% No 35.5% I don't know What would be the effect of getting the SERVICE back almost immediately, but losing all the historical messages? 17.0% Not a problem because I print all important s. 7.4% 59.4% Not a problem because I copy all critical s and attachments to a separate removable storage media (floppy, zip disk, etc.). Not a significant problem because our IT department backs-up incoming and outgoing s. 16.2% That would be a significant problem. Is considered a mission critical application to the areas you manage? 16.2% Very critical: crucial to the operation. 58.3% Important, but not mission critical. 25.4% Not critical to conducting business, it is more of a convenience, we can operate without it. If suddenly became unavailable, how long would it take before the service interruption began to adversely affect your areas of responsibility? 11.0% Almost immediately 7.9% Under 2 hours 9.7% 2-4 hours 7.0% 4-8 hours 15.4% 24 hours 16.3% 2 days 32.6% Never, business isn't dependent on . 5

7 Have you ever experienced an outage that caused a significant disruption in your operation? 16.7% Yes 83.3% No For those who replied YES to the above question, the following is an indication, by length of outage (the hours), the number of times the respondents experienced any substantial outages over the past 12 months regardless of the cause: internal or external, viruses, denial of service attacks, server failures, natural disasters, cut lines, etc. Lasting < than 1-5 hours 22.6% Happened One time 48.4% Happened 2-3 times 16.1% Happened 3-5 times 9.7% Happened 5-7 times 3.2% Happened 7-10 times Lasting 6-12 hours 50.0% Happened One time 50.0% Happened 2-3 times 0.0% Happened 3-5 times 0.0% Happened 5-7 times 0.0% Happened 7-10 times Lasting hours 62.5% Happened One time 37.5% Happened 2-3 times 0.0% Happened 3-5 times 0.0% Happened 5-7 times 0.0% Happened 7-10 times 6

8 Lasting > than 24 hours 50.0% Happened One time 16.7% Happened 2-3 times 16.7% Happened 3-5 times 0.0% Happened 5-7 times 16.7% Happened 7-10 times Lasting > than 48 hours 83.3% Happened One time 0.0% Happened 2-3 times 0.0% Happened 3-5 times 0.0% Happened 5-7 times 16.7% Happened 7-10 times In the event of a disaster, would the senior executives of your company feel that it would be critical to have services available within minutes following the disaster (rather than several hours or days) as a means of communicating with employees and customers? 43.4% Yes 56.6% No Are senior executives (CEO, CIO, CFO) currently pressing for a solution for continuity in the event of an outage or disaster? 13.8% Yes 23.6% No 62.7% I don't know Is your credit and A/R information 100% electronic rather than paper files? 24.8% Yes 75.2% No 7

9 Is there a recovery plan in place for your credit and A/R data (ether electronic or paper data) in the event of a disaster? 75.8% Yes 24.2% No Business Impact Analysis Have you conducted a Business Impact Analysis specifically for the credit and A/R area in preparation for a loss of data? 22.0% Yes 78.0% No If yes, was it conducted internally or by an external organization? 88.5% Internally 11.5% How often do you or your IT people back up your electronic data? Externally * * Responses were primarily major accounting firms rather than disaster recovery specialty firms. Indicate only the most current backup frequency whether from IT or yourself. 20.2% Several times in 24 hours 73.2% Once in 24 hours 1.8% Every other day 1.3% Once a week 0.9% Several times a month 0.4% Once a month 0.4% Once a quarter 0.4% Once every 6 months 0.0% > Than every 6 months 1.3% Actually I have never backed up my data. 8

10 Where is the back-up data stored? 10.0% On site but not really in a protected area 36.8% On site but in a very secure area 28.6% Off site in a company owned location 38.2% Off site with a service company 6.4% Other What is your time objective for system recovery under your disaster recovery or business continuity plan? 4.0% < Than 1 hour 12.0% 1-2 hours 15.5% 2-4 hours 10.5% 4-8 hours 38.5% Under 1 day 13.0% Under 2 days 2.5% Under 4 days 4.0% < Than one week Do you have a contingency plan in place in the event that you can't recover the data? 52.9% Yes 47.1% No Is your data recovery absolutely assured? 35.7% Yes 15.2% No 49.1% I don't know 9

11 Consequences In a recent Grant Thornton analysis for a $200M catalog company, it was calculated that because 40% of their revenue is earned during the Thanksgiving to Christmas 5 week period, a single week of computer outage (assuming they could not catch-up and customers went elsewhere) would cost them $15-20M per week in sales, billings, receivables collection, etc. If the distribution/fulfillment center were impaired, the consequences would be more dramatic, especially if the company supplies mass merchants and department stores that now deem the supplier to be unreliable and look for permanent replacements. This is not limited to consumer industrial products companies: Recently an audit recognized a real estate firm would lose over $10M per month for failure to bill timely...and those tenants already delinquent and facing legal action would get an extension (and perhaps a free ride on their receivables) since required notices could not be issued timely. When the executives were shown the impact, they recognized the potential for disaster and requested a disaster recovery/business continuity plan be initiated immediately...they are also in a very high profile NYC building ("target"). What you should be doing now: The experts at Grant Thornton recommend the following course of action Develop a plan Do you have a comprehensive plan? If NO: Get management buy-in Form a team Perform a business impact analysis Determine your recovery objectives Cover the essentials Develop the plan Train your employees Test the plan Maintain and update the plan Review your plan Changes since last review: new systems, infrastructure changes Are responsible individuals still with your firm? Does it provide for restoration of core business functions? Are your critical resources centralized? Service contracts included? Get a 3rd party perspective Will your plan work in today's environment? 10

12 Test it - at least annually Maintain it Review important processes Are your critical processes paper intensive? Next to people, paper records are the most difficult component of any business to replace. What are my vital records? What are the retention requirements? What would happen if my vital paper records were destroyed? Consider document imaging and workflow automation. Re-think current processes Automate paper-intensive processes Provide an electronic record of important documents. Confirm legal admissibility ROI very high - usually pays for itself What else can you do? Review your outsourced services Does your service provider have a disaster recovery plan? Are they viable over the long term? Many recent ASP, ISP, and carrier failures What controls are in place to prevent unauthorized access to your data? Have these controls been tested by an independent third party? Form alliances Is there a subsidiary, business partner or even competitor that you would be willing to team with? Is there a company that has similar equipment to yours, whose technology resources (e.g. data center) can be made available to you if necessary? Copyright 2003 by the Credit Research Foundation. All rights in this paper are reserved. No part of the paper may be reproduced in any manner whatsoever without written permission. Printed in the United States of America Credit Research Foundation 8840 Columbia 100 Parkway Columbia MD

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four Data Handling in University Business Impact Analysis ( BIA ) Agenda Overview Terminologies Performing

More information

Operational Risk Management Policy

Operational Risk Management Policy Operational Risk Management Policy Operational Risk Definition A bank, including a development bank, is influenced by the developments of the external environment in which it is called to operate, as well

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

THE NEXT GENERATION OF DATA INSURANCE

THE NEXT GENERATION OF DATA INSURANCE THE NEXT GENERATION OF DATA INSURANCE High Indemnity and Broad Coverage Against Permanent Loss A Data Insurance Licensing Ltd. White Paper Version 2013.4.4 Data Insurance Licensing Ltd. THE NEXT GENERATION

More information

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2001 LETTER NO.: 01-CU-21 TO: SUBJ: ENCL: All Federally Insured Credit Unions Disaster

More information

How To Back Up A Virtual Machine

How To Back Up A Virtual Machine 2010 Symantec Disaster Recovery Study Global Results Methodology Applied Research performed survey 1,700 enterprises worldwide 5,000 employees or more Cross-industry 2 Key Findings Virtualization and Cloud

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

Interactive-Network Disaster Recovery

Interactive-Network Disaster Recovery Interactive-Network Disaster Recovery BACKGROUND IT systems are vulnerable to a variety of disruptions, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., terrorism,

More information

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

How To Understand Cloud Computing

How To Understand Cloud Computing CLOUD COMPUTING Jillian Raw Partner, Kennedys http://www.kennedys-law.com/jraw/ Cloud Computing- what they say about it the cloud will transform the information technology industry profoundly change the

More information

Continuity of Operations Planning. A step by step guide for business

Continuity of Operations Planning. A step by step guide for business What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures

More information

Business Continuity Planning in IT

Business Continuity Planning in IT Introduction: Business Continuity Planning in IT The more your business relies on its IT systems, the more you need to consider how unexpected disruptions might affect your business. These disruptions

More information

Clinic Business Continuity Plan Guidelines

Clinic Business Continuity Plan Guidelines Clinic Business Continuity Plan Guidelines Published: January 2015 Table of Contents Emergency Notification Contacts Primary... 2 Emergency Notification Contacts Backups (in case primary is unavailable)...

More information

Disaster Recovery and Business Continuity Plan

Disaster Recovery and Business Continuity Plan Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES A CONSULTATION REPORT OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS STANDING COMMITTEE 3 ON MARKET INTERMEDIARIES

More information

ICASAS505A Review and update disaster recovery and contingency plans

ICASAS505A Review and update disaster recovery and contingency plans ICASAS505A Review and update disaster recovery and contingency plans Release: 1 ICASAS505A Review and update disaster recovery and contingency plans Modification History Release Release 1 Comments This

More information

A guide from Chiltern Business Computing Ltd

A guide from Chiltern Business Computing Ltd Backing IT Up A guide from Chiltern Business Computing Ltd Every business depends on its computer systems to some degree or other. For many, systems are vital to business survival and success. This brief

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

Best Practices in Disaster Recovery Planning and Testing

Best Practices in Disaster Recovery Planning and Testing Best Practices in Disaster Recovery Planning and Testing axcient.com 2015. Axcient, Inc. All Rights Reserved. 1 Best Practices in Disaster Recovery Planning and Testing Disaster Recovery plans are widely

More information

IT Disaster Recovery and Business Resumption Planning Standards

IT Disaster Recovery and Business Resumption Planning Standards Information Technology Disaster Recovery and Business IT Disaster Recovery and Business Adopted by the Information Services Board (ISB) on May 28, 1992 Policy No: Also see: 500-P1, 502-G1 Supersedes No:

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

Birkenhead Sixth Form College IT Disaster Recovery Plan

Birkenhead Sixth Form College IT Disaster Recovery Plan Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning 4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

Why cloud backup? Top 10 reasons

Why cloud backup? Top 10 reasons Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

Clinic Business Continuity Plan Guidelines

Clinic Business Continuity Plan Guidelines Clinic Business Continuity Plan Guidelines Emergency notification contacts: Primary Role Name Address Home phone Mobile/Cell phone Business Continuity Plan Coordinator QSP Business Continuity Plan Coordinator

More information

Why Should Companies Take a Closer Look at Business Continuity Planning?

Why Should Companies Take a Closer Look at Business Continuity Planning? whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Service Availability Metrics

Service Availability Metrics 2014 Service Availability Benchmark Survey Published by Executive Summary This benchmark survey presents service availability metrics that allow IT infrastructure, business continuity, and disaster recovery

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee

More information

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster WHITE PAPER: DON'T WAIT UNTIL IT'S TOO LATE: CHOOSE NEXT-GENERATION................. BACKUP........ TO... PROTECT............ Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your

More information

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards Westpac Merchant A guide to meeting the new Payment Card Industry Security Standards Contents Introduction 01 What is PCIDSS? 02 Why does it concern you? 02 What benefits will you receive from PCIDSS?

More information

AUTOMATED PENETRATION TESTING PRODUCTS

AUTOMATED PENETRATION TESTING PRODUCTS AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for an automated penetration testing product and demonstrate

More information

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department

More information

SAAS MADE EASY: SERVICE LEVEL AGREEMENT

SAAS MADE EASY: SERVICE LEVEL AGREEMENT SAAS MADE EASY: SERVICE LEVEL AGREEMENT THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( SaaS Made Easy ). Capitalized terms used herein but not otherwise defined

More information

ELECTRONIC INFORMATION SECURITY A.R.

ELECTRONIC INFORMATION SECURITY A.R. A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy

More information

Data Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks

Data Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks Data Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks November 12, 2008 How safe is small business data? As the power of computers continues to grow, more and more of the

More information

Information Security Management: Business Continuity Planning. Presentation by Stanislav Nurilov March 9th, 2005 CS 996: Info. Sec. Mgmt.

Information Security Management: Business Continuity Planning. Presentation by Stanislav Nurilov March 9th, 2005 CS 996: Info. Sec. Mgmt. Information Security Management: Business Continuity Planning Presentation by Stanislav Nurilov March 9th, 2005 CS 996: Info. Sec. Mgmt. Overview BCP: Definition BCP: Need for (Why?) BCP: When BCP: Who

More information

2008-2009 2008-2009 TRENDS IN BUSINESS CONTINUITY AND CRISIS COMMUNICATIONS SURVEY

2008-2009 2008-2009 TRENDS IN BUSINESS CONTINUITY AND CRISIS COMMUNICATIONS SURVEY 2008-2009 The Second Annual Trends in Business Continuity and Crisis Communications Survey has been completed with over 700 participants from a wide range of industries and organizational sizes. The Disaster

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

Assessment of natural hazards, man made hazards, technical and societal related risks and associated impact.

Assessment of natural hazards, man made hazards, technical and societal related risks and associated impact. Aon Business Continuity Planning The Aon Business Continuity Planning practice provides consulting services that allow Aon clients to measure and manage their strategic and tactical risks through Crisis

More information

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11 Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2

More information

Business Continuity Planning for Schools, Departments & Support Units

Business Continuity Planning for Schools, Departments & Support Units Business Continuity Planning for Schools, Departments & Support Units 1 What is Business Continuity Planning? Examples Planning for an adverse, major or catastrophic event that would cause a disruption

More information

SYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY. Symantec 2010 SMB Information Protection Survey. Global Data

SYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY. Symantec 2010 SMB Information Protection Survey. Global Data SYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY Symantec 2010 SMB Information Protection Survey Global Data June 2010 CONTENTS Executive Summary...3 Methodology...4 Finding 1: SMBs serious about information

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ).

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). I. Service Definition. Exchange My Mail will provide Hosted Exchange and other Application Services

More information

The Art of High Availability

The Art of High Availability The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical

More information

Disaster Recovery Planning Save Your Business

Disaster Recovery Planning Save Your Business Disaster Recovery Planning Save Your Business Your business at risk! Your company is at risk for failure in the event of disaster Your data is at risk for costly loss Your revenue is at risk with lack

More information

Constructing a successful business continuity plan

Constructing a successful business continuity plan Constructing a successful business continuity plan By Alan Berman Alan Berman Being prepared is the cornerstone of having a business continuity plan regardless of the size of a company. Ultimately, getting

More information

Unit Guide to Business Continuity/Resumption Planning

Unit Guide to Business Continuity/Resumption Planning Unit Guide to Business Continuity/Resumption Planning (February 2009) Revised June 2011 Executive Summary... 3 Purpose and Scope for a Unit Business Continuity Plan(BCP)... 3 Resumption Planning... 4 Assumptions

More information

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification

More information

ISMS Implementation Guide

ISMS Implementation Guide atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation

More information

Disaster Recovery and Business Continuity What Every Executive Needs to Know

Disaster Recovery and Business Continuity What Every Executive Needs to Know Disaster Recovery and Business Continuity What Every Executive Needs to Know Bruce Campbell & Sandra Evans Contents Why you need DR and BC What constitutes a Disaster? The difference between disaster recovery

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

IT Security Incident Management Policies and Practices

IT Security Incident Management Policies and Practices IT Security Incident Management Policies and Practices Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Feb 6, 2015 i Document Control Document

More information

Service Description: Dell Backup and Recovery Cloud Storage

Service Description: Dell Backup and Recovery Cloud Storage Service Description: Dell Backup and Recovery Cloud Storage Service Providers: Dell Marketing L.P. ( Dell ), One Dell Way, Round Rock, Texas 78682, and it s worldwide subsidiaries, and authorized third

More information

Management of IT Risks

Management of IT Risks 10 number 39 // 2-2006 Management of IT Risks Esther Cerdeño Deputy Director of IT MAPFRE REASEGUROS (Spain) The market needs insurers to study the feasibility of insuring costs relating to loss of information;

More information

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity INFORMATION RISK MANAGEMENT KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity ADVISORY Contents Agenda: Global trends and BCM

More information

A Best Practices Point of View from. Data Backup and Disaster Recovery Planning

A Best Practices Point of View from. Data Backup and Disaster Recovery Planning A Best Practices Point of View from Data Backup and Disaster Recovery Planning Security Protect Your Data Expertise Support Patient Privacy Business Continuity Plan and Restore Peace of Mind Backup and

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

Cisco Disaster Recovery: Best Practices White Paper

Cisco Disaster Recovery: Best Practices White Paper Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

Why. Your business. Needs. a Disaster RecoveryPlan. www.iconz-webvisions.com

Why. Your business. Needs. a Disaster RecoveryPlan. www.iconz-webvisions.com Why Your business Needs a Disaster RecoveryPlan 1 Disaster recovery is something that every business must plan for, but not many think about. A Disaster Preparedness Survey among 900 SMEs in the Asia-Pacific

More information

10 Hidden IT Risks That Threaten Your Practice

10 Hidden IT Risks That Threaten Your Practice (Plus 1 Fast Way to Find Them) Your practice depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1 Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4

More information

The Importance of a Data Backup and Disaster Recovery Plan

The Importance of a Data Backup and Disaster Recovery Plan A The Importance of a Data Backup and Disaster Recovery Plan 1 There s just one thing as sickening to a business owner as experiencing a loss of data, which is knowing that loss was completely avoidable

More information

SCADA Business Continuity and Disaster Recovery. Presented By: William Biehl, P.E. 913-601-0104 (mobile) Bill.Biehl@we-inc.com

SCADA Business Continuity and Disaster Recovery. Presented By: William Biehl, P.E. 913-601-0104 (mobile) Bill.Biehl@we-inc.com SCADA Business Continuity and Disaster Recovery Presented By: William Biehl, P.E. 913-601-0104 (mobile) Bill.Biehl@we-inc.com Business Continuity Planning, a Sound Process A Business Continuity Plan: "A

More information

E-Sign Disclosure & E-Statements Terms and Conditions

E-Sign Disclosure & E-Statements Terms and Conditions (888) 734-4567 info@allianceassociationbank.com www.allianceassociationbank.com E-Sign Disclosure & E-Statements Terms and Conditions E-Sign Disclosure Alliance Association Bank is a division of Western

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Business Continuity and Disaster Recovery Planning

Business Continuity and Disaster Recovery Planning Business Continuity and Disaster Recovery Planning Jennifer Brandt, CISA A p r i l 16, 2015 HISTORY OF STINNETT & ASSOCIATES Stinnett & Associates (Stinnett) is a professional advisory firm offering services

More information

Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan

Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Revision History REVISION DATE NAME DESCRIPTION Draft 1.0 Eric Wimbish IT Backup Disaster Table of Contents Information

More information

TERMS OF SERVICE TELEPORT REQUEST RECEIVERS

TERMS OF SERVICE TELEPORT REQUEST RECEIVERS TERMS OF SERVICE These terms of service and the documents referred to in them ( Terms ) govern your access to and use of our services, including our website teleportapp.co ( our site ), applications, buttons,

More information

Information Security Management System. Business Continuity and Disaster Recovery Plan Policy. The Smart Cube. Description Change

Information Security Management System. Business Continuity and Disaster Recovery Plan Policy. The Smart Cube. Description Change The Smart Cube Document Release History Version Review Date Effective Date Description Change of Chapter/ Section/ Page Prepared By Reviewed by 1.0 30-Apr- 1-May-2010 ISO CISO MD 2010 1.1 19-Jul-2011 19-Jul-2011

More information

BEST PRACTICE GUIDE TO SMALL BUSINESS PROTECTION: BACKUP YOUR SMALL BUSINESS INFORMATION

BEST PRACTICE GUIDE TO SMALL BUSINESS PROTECTION: BACKUP YOUR SMALL BUSINESS INFORMATION BEST PRACTICE GUIDE TO SMALL BUSINESS PROTECTION: BACKUP YOUR SMALL BUSINESS INFORMATION ENTER YOUR BUSINESS depends on electronic customer lists, confidential information and business records. Protecting

More information

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")

More information

Virtual Private Cloud. Service Level Agreement. Terms and Abbreviations

Virtual Private Cloud. Service Level Agreement. Terms and Abbreviations Virtual Private Cloud. Service Level Agreement Terms and Abbreviations Customer's Control Panel the web page intended for managing the Services rendered by the Executor, retaining the Customer's actual

More information

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

Business Continuity and Disaster Planning

Business Continuity and Disaster Planning WHITE PAPER Business Continuity and Disaster Planning A guide to preparing for the unexpected Robert Drewniak Director, Strategic & Advisory Services Disasters are not always the result of high winds and

More information

Our Business Continuity Solutions Ensure Long-Term Success

Our Business Continuity Solutions Ensure Long-Term Success Hill Country Our Business Continuity Solutions Ensure Long-Term Success Hill Country Our Business Continuity Solutions Ensure Long-Term Success Why Business Continuity Planning Matters Whether you own

More information

The 10 Disaster Planning Essentials For A Small Business Network

The 10 Disaster Planning Essentials For A Small Business Network The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

Business Case. for an. Information Security Awareness Program

Business Case. for an. Information Security Awareness Program Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security

More information

Business Continuity and Capacity Building

Business Continuity and Capacity Building Business Continuity and Capacity Building April 10, 2015 Business Continuity and Capacity Building April 10, 2015 1 / 14 Developing Institutional Business Continuity Plans and Implications for Capacity

More information

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA 1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand

More information

How to Build a Comprehensive Business Continuity Plan

How to Build a Comprehensive Business Continuity Plan How to Build a Comprehensive Business Continuity Plan Business continuity planning is essential for any business. A business continuity plan carried out effectively will enable any business to continue

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End

More information

IT Service Management

IT Service Management IT Service Management VNUG Conference 2013-09-04 Anders Stenmark Business Critical Consultant, HP Agenda Introduction Reliable service delivery ITSM ITSM Assessments 2 Introduction Anders Stenmark Business

More information