Is Your Data Recovery Solution a Data Security Problem? How to Protect Your Critical Data When Working With a Data Recovery Vendor
|
|
|
- Jason Park
- 10 years ago
- Views:
Transcription
1 Is Your Data Recovery Solutio a Data Security Problem? How to Protect Your Critical Data Whe Workig With a Data Recovery Vedor
2 Itroductio Today s IT security professioals eforce aggressive eterprise-wide security programs to miimize the risk of data leakage ad a security breach. The facility is protected with locks, alarms, access cotrols ad video cameras. The etwork is protected with firewalls, cotet filterig, ad 24/7 real-time moitorig. Drives are protected with full disk ecryptio, ad data files are password protected. But, what happes whe a hard drive fails they all do ad it must leave the cofies of the secure eterprise eviromet for data recovery? A 2007 survey of compaies by The Poema Istitute revealed this disturbig fact: 40 percet of the data security breaches the compaies experieced occurred while third-party vedors were i possessio of their data. How much do you kow about your data recovery provider? Does your provider adhere to idustry stadards for protectig sesitive data stored o your compay s failed drives? What are their protocols for securely shippig/receivig data storage devices? How secure is their etwork? Are they traied to maage ecryptio keys appropriately? Data breach must be a cosideratio ay where critical data ca be accessed. If your data recovery service provider s etwork is hacked, ad critical customer data is accessed, your compay could be liable. Vedors who hold or hadle sesitive iformatio must be able to prove they ca adhere to the same security stadards as corporatios ad govermet agecies. This white paper outlies treds ad facts behid digital data loss, ad examies the icreasig fiacial costs, regulatory pealties, productivity losses, ad customer loyalty risks associated with a breach i data security. It supports the eed for IT professioals to egage with qualified data recovery service providers who ca quickly ad cost-effectively restore busiess critical data while protectig that data from uwated ad costly breach. The documet cocludes with data security stadards ad protocols that should be adhered to by the data recovery provider. These guidelies will help IT professioals preserve the itegrity of critical data whe it must leave the cofies of their ow secure eviromet for recovery. 1
3 THE SITUATION: Digital data is the life force of every compay today. The amout of data beig created ad stored is icreasig expoetially A study coducted by Iteratioal Data Corporatio (IDC) estimates that the size of the digital uiverse, the total volume of digital iformatio that is created ad replicated globally, reached 281 billio gigabytes (281 exabytes) i 2007, which adds up to about 45GB of digital iformatio for each perso o earth. As drive desities icrease to keep up with storage demads, a sigle drive failure could wipe out a terabyte of data or more. THE PROBLEM: All hard drives fail... 2 Symptoms HARDWARE OR SYSTEM MALFUNCTIONS 80% Electrical failure. Head/media crash. Cotroller failure Error message statig the device is ot recogized Lose access to data Scrapig, clickig or gridig soud Hard drive stops spiig Symptoms Tips to Prevet Data Loss Avoid static electrical charges whe hadlig media Use computers i a dry, vetilated, dust-free area Coect system to a uiterruptible power supply (UPS) HUMAN ERROR 5% Accidetal file deletio. Reformattig of drive. Physical trauma to drive File Not Foud message Data is o loger accessible Tips to Prevet Data Loss Never upgrade ay system without a verified backup Power dow before movig computer SOFTWARE CORRUPTION 10% Corruptio by diagostic or repair tools. Failed backups. Cofiguratio complexity Symptoms System messages relatig to memory errors Software applicatio wo t load Error message statig data is corrupted or iaccessible Symptoms Blak scree Strage ad upredictable behavior File Not Foud message Symptoms MAIN CAUSES OF DATA LOSS (Source DriveSavers, Ic Jobs Received) Severe weather Natural ad ma-made catastrophes Tips to Prevet Data Loss COMPUTER VIRUSES 2% Boot sector. File ifectig. Polymorphic Back up data regularly Use diagostic utilities oly whe appropriate Tips to Prevet Data Loss NATURAL DISASTERS 3% Fires. Floods. Power Surges. Browouts Use up-to-date software for data security ad virus protectio Sca all icomig data ad packaged software for viruses Tips to Prevet Data Loss Ivest i redudat backup systems Establish a structured backup procedure Periodically test the backups Keep at least oe verified copy of backups off-site It is ot a matter of if, but whe. Hard disk drives are mechaical devices, vulerable to damage from a variety of sources, icludig a physical head crash, exteral trauma (droppig or collisio), power surges, temperature extremes, etc. I additio to physical failures, data loss ca also result from virus attacks, system malfuctio, or huma error. Eve storage maufacturers war users to protect their data with frequet backups, ad regular diagostics of the drives....ad data is still ot beig backed up Despite the widespread availability of stable backup hardware platforms ad software tools, may importat files cotiue to be stored i a sigle, vulerable locatio, ad all too ofte backups go uverified. Symatec sposored a survey by Rubicom Cosultig i December of 2008 to determie how effectively busiesses across the US protect their data, ad whether their data protectio practices have kept pace with data growth. The survey fidigs (see page 3) revealed that while the majority of compaies listed backup strategy as their #2 computig priority, may cotiue to rely o maual backup strategies that leave their data vulerable to huma error, breaches, theft, or atural disasters.
4 Failure is ievitable About 2 percet coduct o server back up. Amog those who do back up their servers, about half back up weekly or less ofte. Most backups are stored o site. These local backups leave compaies vulerable to theft or disaster. Eve amog compaies that perform some sort of backup, oly 25 percet report always beig able to recover lost data. Very small compaies had the highest rate of permaet data loss. 15 percet of busiesses employig oe to four people say they have ever bee able to recover lost data. Data loss ca have a severe impact. 25 percet of the compaies surveyed report that data loss has caused severe disruptios to their busiess. The speed of recovery is critical. Regardless of size, compaies must recover importat iformatio quickly or face damage to their busiess. About oe-quarter of midsize compaies ( ) report that losig access to data for eve oe day would cause permaet busiess loss. The Rubicom study cocluded that may compaies follow risky backup practices, ragig from maual backups to storig critical backup data i the same locatio as the host computer, ad that half of the SMBs surveyed reported they had lost data. Eve compaies that do follow strict backup procedures, however, are still at risk of data loss. By some 3 Richard Sawyer, Director of Data Ceter Techology for America Power Coversio estimates, more tha half of all backups are usuccessful i whole or i part, due to media failure, huma error, software failure, hardware failure, or etwork failure. Lost data results i lost productio. Cosider the ivestmet of time ad moey required to recreate customer databases, accoutig records, source codes, test ad measuremet data, graphics ad video files, ad other itellectual property. The most critical data sets could take days, moths, or eve years to recreate. What would the impact o the busiess ad the brad be if that data were lost forever? Accordig to estimates published by the US govermet, eterprise data loss cost busiesses early $105 billio last year. THE RISKS: Icidets of data breach are o the rise, as are the fiacial costs ad productivity losses icurred from data leakage Sice Jauary 2005, the Privacy Rights Clearighouse has idetified more tha 250 millio records of U.S. residets that have bee exposed due to security breaches. Ask the Federal Bureau of Ivestigatio about idetity theft, ad the umbers will stagger you: Source: The Poemo Istitute, 2007 Every year, a estimated 10 millio Americas have their idetities stole. The costly aftermath totals about $50 billio aually. (Source: The Privacy Rights Clearighouse.)
5 Lost data results i lost productio Cosider the ivestmet of time ad moey required to recreate customer databases, accoutig records, source codes, test ad measuremet data, graphics ad video files, ad other itellectual property. The most critical data sets could take days, moths, or eve years to recreate. What would the impact o the busiess ad the brad be if that data were lost forever? Accordig to estimates published by the U.S. govermet, eterprise data loss cost busiesses early $105 billio last year. The cost of data leakage i the busiess eviromet is also icreasig. Accordig to a study coducted by Forrester Research i 2007, a iformatio security breach may cost from $90 to $305 per lost record, based o a survey of 28 compaies who suffered some type of data breach. Costs associated with data leakage icluded legal fees, call ceter costs, lost employee productivity, regulatory fies, loss of ivestor cofidece ad customer losses. Aother study o the cost of data breach was coducted i 2007 by The Poemo Istitute ad sposored by PGP Corporatio ad Votu, Ic. This study examied costs icurred by 35 orgaizatios from 15 differet idustry sectors that had experieced a data breach of records ragig from less tha 4,000 to more tha 125,000. Amog the study s key fidigs, the followig was ascertaied: 1. Third-party data breaches are icreasig, ad cost more: Breaches by third-party orgaizatios such as outsourcers, cotractors, cosultats, ad busiess parters were reported by 40 percet of respodets, up from 29 percet i 2006 ad 21 percet i Breaches by third parties were also more costly tha breaches by the eterprise itself, averagig $231 compared to $171 per record. 2. Cost of lost busiess is acceleratig: The cost of lost busiess cotiued to icrease at more tha 30 percet, averagig $4.1 millio or $128 per record compromised. Lost busiess ow accouts for 65 percet of data breach costs compared to 54 percet i the 2006 study. 3. Icreased customer chur rates help drive lost busiess costs higher: I 2007, the average resultig abormal customer chur rate was 2.67 percet, a icrease from 2.01 percet i Greater customer turover leads to lower reveues ad a higher cost of ew customer acquisitio resultig from icreased marketig to recover lost customer busiess. 4. Legal defese, public relatios costs are icreasig: Idicatig cotiued growig dissatisfactio ad actio over a data breach, the costs orgaizatios expeded for legal defese ad public relatios grew to 8 percet ad 3 percet of total breach costs, respectively. 5. Orgaizatios with high expectatios of trust ad privacy have more to lose from a data breach: For example, the cost of a data breach for fiacial services orgaizatios was $239 per compromised record, or more tha 21 percet higher tha the average. I spite of a orgaizatio s cocerted efforts to deploy security compliace iitiatives throughout the eterprise, data breaches cotiue to occur, uderscorig the eed for eterprise IT/IS maagers to proactively protect their data, their brad reputatio, ad their busiess. Cosiderig ew govermet regulatios that place the blame of data loss squarely o the shoulders of the eterprise, the rise i third-party icidets of data breach ad the icreased fiacial impact o a orgaizatio versus a i-house breach, data protectio policies ad systems used with ad by third-party outsourcers or cosultats should be closely evaluated. 4
6 Govermets respod with more regulatios o data security compliace Compaies that do t deal with data security issues proactively could face potetially sigificat liability. All three braches of the US Govermet, at the state ad federal levels, are focused o idetity theft, leadig ultimately to icreased statutory, regulatory, ad legal pressure o corporatios to protect persoal data, as well as protect their busiesses from subsequet fiacial ad productivity losses. As of 2007, at least 35 states i the US have passed laws requirig orgaizatios ad govermet agecies to otify customers, employees, ad other affected idividuals whe a breach of protected persoal iformatio occurs due to huma error, techology problems, or malicious acts. I additio, both the US Seate ad House of Represetatives cotiue to evaluate federal laws regardig data privacy ad breach otificatio. A ew law i Massachusetts, effective May 1, 2009, outlies striget requiremets for the hadlig of their residets' persoal iformatio with proposed pealties of $5,000 to $50,000 per data breach violatio. This law requires compaies to develop, implemet, maitai, ad moitor a comprehesive, writte program with heighteed procedures i place. Compliace will likely require major chages to admiistrative, techical, ad physical policies. Similar to the Califoria Seate Bill 1386, the law applies to ay perso or busiess that coducts busiess i the state. Your compay could be headquartered i Achorage, Alaska, 5 REGULATORY AND DATA LEAKAGE LANDSCAPE (Source: A SANS Whitepaper, April Sposored by Utimaco ad Tred Micro) Regulatio PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI/DSS) (Iteratioal) GRAMM-LEACH-BLILEY ACT (GLBA) (Uited States) SARBANES-OXLEY ACT (SOX) (Uited States) EURO-SOX (Europea Uio) HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) (Uited States) CALIFORNIA SENATE BILL 1386 (SB 1386) (Uited States) DATA PROTECTION ACT (DPA) OF 1984 (Ameded 1998) (Uited Kigdom) Focus but if you hadle the persoal iformatio of oe sigle MA residet you must comply with the ew rules. The rules of this law also exted to service providers who will have to be certified as compliat by the hirig orgaizatios o later tha Ja. 1, (Source: James Irio, Risk Maagemet Cosultat) Protectio of paymet card data ad related cosumer/busiess details durig processig, trasmissio ad storage Protectio of cosumer opublic persoal iformatio (NPPI) data i fiacial services idustry Protectio of sesitive data related to fiacial reportig i public compaies Protectio of sesitive data related to fiacial reportig i public Protectio of electroic patiet healthcare data ad iformatio (Note: Works with HIPAA Privacy) Geeral protectio of idividual's private iformatio Hadlig of persoal iformatio for all UK idustries ad busiesses Data Leakage Protectio Implicatios A widely-adopted set of specific techical ad policy cotrols aroud implemetatio, assessmet ad audit of systems trasactig fiacial data Admiistrative ad cryptographic processes for protectig data at rest ad i motio, icludig physical safeguards Provides guidace for public compaies i desigig ad reportig o the cotrols i place for protectig fiacial iformatio Requires madatory ecryptio for fiacial reportig data ad other related sesitive iformatio at rest, i trasit, ad durig processig Specific recommedatios for access cotrol, risk aalysis, data disposal, ad re-use, data ecryptio (addressable), policy ad documetatio requiremets Foudatio data breach legislatio that has prompted similar legislatio at all levels. Uecrypted electroic, sesitive data is subject to the disclosure provisios Deals with proper disclosure, rights of access to iformatio, trasmissio ad processig, ad proper protective measures. No specific techical measures metioed Cosiderig ew govermet regulatios that place the blame of data loss squarely o the shoulders of the eterprise, the rise i thirdparty icidets of data breach, ad the icreased fiacial impact o a orgaizatio versus a i-house breach, data protectio policies ad systems used with ad by third-party outsourcers or cosultats should be closely evaluated.
7 THE SOLUTION: Data security stadards ad protocols for the data recovery facility that will protect the itegrity of critical data durig the data recovery process The data recovery idustry has grow i tadem with the data storage idustry. A search today o Google uder the term data recovery will geerate over 50 millio results. Most data recovery compaies appear to offer the same level of services ad security. But, data recovery is a delicate busiess, ad ruig utilities software is ot always a appropriate solutio. The first attempt to spi up a drive ad perform recovery could be the last ad oly chace to access critical data stored o it. Who amog the 50 millio are truly qualified to recover it successfully? Who ca you trust with your data? How do you choose? The followig stadards for all data recovery service providers were published to help those who have lost critical data cofidetly select a reputable data recovery firm. Bottom lie? Ask your service provider for proof that they ca meet ad uphold these stadards before releasig a data storage device to their facility. 1. Cofirm that the facility s iformatio techology cotrols ad processes have bee audited by accoutig, auditig ad iformatio security professioals, ad verified to be operatig effectively to provide maximum data security. Compliace with auditig stadards, such as the Statemet o Auditig Stadards (SAS) 70, assures that every aspect of the facility ad etwork is secure ad will protect persoal ad cofidetial data from beig compromised. Certified, cotrolorieted professioals, who have experiece i accoutig, auditig ad iformatio security, coduct a audit of a service provider s data hostig cotrol objectives, activities ad related processes over a period of time (typically 6-12 moths). The audit focuses o idetifyig ad validatig cotrol stadards that are deemed most critical to existig ad prospective cliets of the service provider, ad covers all aspects of security i the facility; both etwork ad physical. Sice the itroductio of the 2002 Sarbaes Oxley Act (Sectio 404), followig the Ero debacle, the SAS 70 audit has become the Corporate Idustry Stadard for a overall cotrol structure. While a SAS 70 Type I audit verifies the descriptio of cotrols ad safeguards that a service orgaizatio claims to have i place, the SAS 70 Type II audit verifies that all data hostig cotrols ad objectives are actually i place, suitably desiged, eforced, ad operatig effectively to achieve all desired security cotrol objectives.. 2. Ask for proof that etwork security testig ad moitorig are itegrated ito the provider s security program, ad that critical systems, (e.g., firewalls, routers, servers) are cofigured, maitaied, ad certified to be operatig accordig to the orgaizatio s security policy. A professioal data recovery provider should temporarily archive recovered data o their etwork util the customer has received it, ad verified its itegrity. The eed for strog, verifiable security measures is ecessary to protect etwork assets, employee edpoits, ad sesitive customer data, such as servers, databases, ad proprietary iformatio. Every elemet of the provider s etwork should act as a poit of defese. It must feature iovative behavioral methods that will automatically recogize ad adapt to ew types of threats as they arise. Best i breed solutios allow for rapid respose to emergig threats such as malware propagatio spread by , SPAM, ad botets; phishig attacks hosted o websites; attacks targetig icreasig extesible markup laguage (XML) traffic; service-orieted architecture (SOA); web services; ad zeroday attacks that occur before ativirus compaies have developed ew virus sigatures to combat them. A comprehesive defese-i-depth approach to etwork security should, at miimum, iclude the followig: Regular vulerability assessmets, peetratio testig, ad related reports Maagemet of the etwork firewall, icludig moitorig, maitaiig the firewall's traffic routig rules, ad geeratig regular traffic ad maagemet reports Itrusio detectio maagemet, either at the etwork level or at the idividual host level, itrusio alerts, keepig up-to-date with ew defeses agaist itrusio, ad regular reports o itrusio attempts ad activity Providig mitigatio support after a itrusio has occurred, icludig emergecy respose ad foresic aalysis Cotet filterig services, for electroic mail (i.e. filterig) ad other traffic. Data archival 6 (cotiued o Page 7)
8 Stadards ad Protocols, cotiued 3. Make sure that the service provider is cleared to offer High Security Service, ad ca demostrate chai-of-custody protocols that meet US Govermet stadards. Govermet agecies, law eforcemet bureaus, ad other legal etities i the US ad abroad require third-party service providers to comply with the most striget security stadards ad chai-of-custody protocols. The data recovery service provider should offer documetatio that will demostrate how their customer s data will be protected while i trasit, at poit of receipt at the facility, ad to poit of departure. Chai-of-custody protocols should iclude: Use of a govermet approved courier service The hardware to be recovered should be packed i a tamper proof/resistat shippig cotaier All service providers employees have udergoe backgroud checks Scaig of bar code o storage device upo receipt. Serial umber is checked agaist cliet iformatio i the database. Date/time ad who received the device is logged ito customer record Customer is provided with otificatio that the device has bee received, ad data recovery process has begu Dates/times/ad persoel hadlig the device are logged ito the customer record as the device moves through the data recovery process Protocols for High Security Service iclude all of the above protocols, i additio to the followig: No-disclosure agreemets are siged ad chai-of-custody documetatio is provided The recovery is performed i a secure area, o a stad-aloe system that is ot etworked, ad oly ruig whe a authorized egieer is preset ad moitorig the job Oly approved persoel with proper access cards are allowed access to the area where the recovery is performed Data set is ever archived o the etwork Data set is always stored i a DOD-approved safe Secure, ecrypted electroic data trasfer service is available, if required 4. Ask to see certificatios that data recovery egieers are traied to properly recover data from ecrypted files ad drives. Sophisticated etworks ad device protectio wo t keep sesitive busiess data secure oce it s o the move. Whether lost or stole, ecrypted data is useless to ayoe but a authorized user, eve if someoe violates access cotrols. Accordig to a recet study coducted by Forrester Research Ic., 22 percet of respodets said they pla to pilot or adopt full disk ecryptio or file-level ecryptio i the ext 12 moths. I Jue of 2006, a Presidetial madate required all federal agecies ad departmets to ecrypt data stored o their mobile computers ad devices. The US Geeral Services Admiistratio (GSA) the awarded Data at Rest ecryptio cotracts to various software compaies. Data at Rest refers to ay data residig o hard drives, thumb drives, laptops, etc. The purpose of this madate was to mitigate the impact of lost or stole data that could be used to distiguish or trace a idividual s idetity. 7 (cotiued o Page 8)
9 Stadards ad Protocols, cotiued There are hudreds of ecryptio tools out there ad each oe is uique. If the itegrity of ecrypted data is a cocer, make sure your recovery service provider has techicias who are certified experts i multiple ecryptio recovery techiques ad processes, ad are capable of providig customized data recovery solutios that will meet your most striget data security requiremets whe hadlig ecrypted files ad drives: Egieers should be familiar with all versios of ecryptio software ad ca provide custom security solutios for returig recovered data or hadlig ecryptio keys Provider ca offer ecryptio recovery optios: Egieers ca create sector-by-sector images of the source drive durig the recovery process to protect the origial data from beig compromised Sector-by-sector image ca be trasferred to a target drive ad retured with origial ecryptio still itact Data ca be restored ad decrypted at the service provider s facility to verify the itegrity of data ad retured to the customer ecrypted or fully decrypted. The ecryptio userame, password ad/or key must be provided to the service provider, if this method is chose A secure, ecrypted electroic data trasfer service should be available upo request 5. Uwated hard disk drives ca be recycled properly, ad classified or sesitive data ca be erased permaetly, whe required. You caot completely erase files from your computer by deletig them, emptyig the recycle bi, or quick formattig your hard drive. These processes just remove the iformatio the hard drive eeds to fid the data, ot the data itself, allowig it to be recovered. A study by Simso L. Garfikel, author of Database Natio, foud that drives purchased o lie routiely cotai sesitive or cofidetial data. To prove his poit, Garfikel purchased a old ATM machie hard drive that cotaied 827 uique PIN umbers, ad a secod drive previously owed by a medical ceter, which cotaied 31,000 credit card umbers. To remove data beyod all practical ability to recover it, a wipig or erasig utility ca be used to overwrite every sector of the hard drive with a patter of biary 1 s ad 0 s. If you wish to permaetly destroy a hard disk drive that cotais sesitive data, however, a degausser is the best method to reder the classified or sesitive data stored o magetic media completely uusable. Those that meet govermet security stadards are ideal tools for compliace with DoD ad Federal requiremets or privacy legislatio. With the itroductio of the Sarbaes-Oxley Act (SOX), SAS 70 took o icreased importace. SOX heighteed the focus placed o uderstadig the cotrols over fiacial reportig ad idetified a Type II SAS 70 report as the oly acceptable method for a third party to assure a service orgaizatio's cotrols. Security certificatios are excluded as acceptable substitutes for a Type II SAS 70 audit report. 8
10 Coclusio Icidets of data breach amog third party vedors are o the rise, ad corporate ad fiacial orgaizatios are ow demadig detailed iformatio about their service provider s ability to meet madated security requiremets. Professioal data recovery service providers must prove their ability to uphold the same security stadards as corporatios ad govermet agecies. To avoid the legal ad fiacial ramificatios of a uwated breach i security, choose a data recovery service provider that has udergoe security audits by accoutig, auditig ad iformatio security professioals, ad is verified to provide maximum data security from poit of receipt to poit of departure. About DriveSavers DriveSavers is the worldwide leader i data recovery, with a solid reputatio built o outstadig customer service, cosistetly high success rates, ad the fastest stadard turaroud time i the busiess. I 2008, DriveSavers ivested millios of dollars i clearoom ad etwork techology, as well as traiig ad certificatio, to provide our customers with the highest degree of security available i the data recovery idustry today. DriveSavers is the premiere provider of fast, reliable ad certified secure data recovery. We are the oly data recovery service provider i the world that has received SAS Type II certificatio. At the heart of our certified secure eviromet is a Cisco Self-Defedig Network, protected by a alliclusive defese-i-depth architecture. All data recoveries are performed i our ISO 5 certified clearoom eviromet, the most techologically advaced data recovery clearoom i the idustry. Our data recovery egieers have udergoe extesive traiig ad are certified by all leadig ecryptio software vedors. You ca view all our authorizatios ad certificatios o our website, at About the Author Michael Hall is the Chief Iformatio Security Officer for High Security Programs ad Director of PC Egieerig at DriveSavers Data Recovery With over 13 years experiece i data recovery techology, focusig o high-ed arrays, he has successfully recovered data from over 12,000 failed storage devices. Hall supports corporate ad govermet accouts with security protocols desiged to meet their specific criteria. He was istrumetal i DriveSavers SAS 70 Type II certificatio, the deploymet of our Cisco Self-Defedig Network ad the istallatio ad certificatio of our ISO 5 (Class 100) clearoom. Michael also was the drivig force behid the traiig of our data recovery egieers, who received ecrypted data recovery traiig ad certificatio from PGP, GuardiaEdge, PoitSec/Checkpoit, Utimaco ad ECase DriveSavers, Ic. All Rights Reserved. DriveSavers Data Recovery, the DriveSavers logo, ad We ca save it! are registered trademarks of DriveSavers, Ic. All other trademarks are the property of their respective owers. 9
Information Security Compliance
T A Uified Approach to Iformatio Security Compliace By M. Peter Adler he iformatio age has led to a heighteed cocer that persoal iformatio is ot beig protected. The high speed at which private iformatio
Flood Emergency Response Plan
Flood Emergecy Respose Pla This reprit is made available for iformatioal purposes oly i support of the isurace relatioship betwee FM Global ad its cliets. This iformatio does ot chage or supplemet policy
FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS
STRATEGIC OUTCOMES PRACTICE TECHNICAL ADVISORY BULLETIN February 2011 FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS www.willis.com Natioal Fire Protectio Associatio (NFPA) #25 a mai
Domain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
Wells Fargo Insurance Services Claim Consulting Capabilities
Wells Fargo Isurace Services Claim Cosultig Capabilities Claim Cosultig Claims are a uwelcome part of America busiess. I a recet survey coducted by Fulbright & Jaworski L.L.P., large U.S. compaies face
ODBC. Getting Started With Sage Timberline Office ODBC
ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.
Configuring Additional Active Directory Server Roles
Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio
Safeguarding Taxpayer Data A GUIDE FOR YOUR BUSINESS
Safeguardig Taxpayer Data A GUIDE FOR YOUR BUSINESS 1 Cotets The Need to Safeguard Taxpayer Data...3 Gettig Started...5 Puttig Safeguards i Place...6 Checklists 1 Admiistrative Activities...7 2 Facilities
IT Support. 020 8269 6878 n www.premierchoiceinternet.com n [email protected]. 30 Day FREE Trial. IT Support from 8p/user
IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our
Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues
Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio
Ideate, Inc. Training Solutions to Give you the Leading Edge
Ideate, Ic. Traiig News 2014v1 Ideate, Ic. Traiig Solutios to Give you the Leadig Edge New Packages For All Your Traiig Needs! Bill Johso Seior MEP - Applicatio Specialist Revit MEP Fudametals Ad More!
Investing in Stocks WHAT ARE THE DIFFERENT CLASSIFICATIONS OF STOCKS? WHY INVEST IN STOCKS? CAN YOU LOSE MONEY?
Ivestig i Stocks Ivestig i Stocks Busiesses sell shares of stock to ivestors as a way to raise moey to fiace expasio, pay off debt ad provide operatig capital. Ecoomic coditios: Employmet, iflatio, ivetory
(VCP-310) 1-800-418-6789
Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.
CCH Accountants Starter Pack
CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice
leasing Solutions We make your Business our Business
if you d like to discover how Bp paribas leasig Solutios Ca help you to achieve your goals please get i touch leasig Solutios We make your Busiess our Busiess We look forward to hearig from you you ca
FortiGuard Fortinet s Global Security Research and Protection
SOLUTION BRIEF FortiGuard Fortiet s Global Research ad Protectio itelligece represets kowledge of the idetity, capabilities, ad itetios of idividuals ad orgaizatios egaged i espioage, sabotage, or theft
France caters to innovative companies and offers the best research tax credit in Europe
1/5 The Frech Govermet has three objectives : > improve Frace s fiscal competitiveess > cosolidate R&D activities > make Frace a attractive coutry for iovatio Tax icetives have become a key elemet of public
client communication
CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.
Diploma in Secretarial Administration
Istitute of Fiace Diploma i Secretarial Admiistratio Awarded by the Lodo Chamber of Commerce ad Idustry (LCCI) Startig October 2007 ope for erollmet from July 2007 Be smart start right eroll ow! Eglish
Viswanathan Ganapathy Daniel Logan
Healthcare White Paper The Heart of Healthcare Data SecurityDe-Riskig Test ad Productio Eviromets About the Authors Viswaatha Gaapathy Solutios Director, Healthcare Techology Excellece Viswaatha Gaapathy
RISK TRANSFER FOR DESIGN-BUILD TEAMS
WILLIS CONSTRUCTION PRACTICE I-BEAM Jauary 2010 www.willis.com RISK TRANSFER FOR DESIGN-BUILD TEAMS Desig-builD work is icreasig each quarter. cosequetly, we are fieldig more iquiries from cliets regardig
Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out
FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles
CREATIVE MARKETING PROJECT 2016
CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members
AGC s SUPERVISORY TRAINING PROGRAM
AGC s SUPERVISORY TRAINING PROGRAM Learig Today...Leadig Tomorrow The Kowledge ad Skills Every Costructio Supervisor Must Have to be Effective The Associated Geeral Cotractors of America s Supervisory
INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology
Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology
Enterprise Security & Risk Management. White Paper. Securing the Future with Next-Generation Data Center Security
Eterprise Security & Risk Maagemet White Paper Securig the Future with Next-Geeratio Data Ceter Security About the Author Prikshit Goel Prikshit Goel heads the Ceter of Excellece (CoE) for Maaged Security
QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot
QUADRO tech PST Flightdeck Put your PST Migratio o autopilot Put your PST Migratio o Autopilot A moder aircraft hardly remids its pilots of the early days of air traffic. It is desiged to eable flyig as
How To Find FINANCING For Your Business
How To Fid FINANCING For Your Busiess Oe of the most difficult tasks faced by the maagemet team of small busiesses today is fidig adequate fiacig for curret operatios i order to support ew ad ogoig cotracts.
InventoryControl. The Complete Inventory Tracking Solution for Small Businesses
IvetoryCotrol The Complete Ivetory Trackig Solutio for Small Busiesses Regular Logo 4C Productivity Solutios for Small Busiesses Logo Outlie Get i cotrol of your ivetory with Wasp Ivetory Cotrol the complete
To c o m p e t e in t o d a y s r e t a i l e n v i r o n m e n t, y o u n e e d a s i n g l e,
Busiess Itelligece Software for Retail To c o m p e t e i t o d a y s r e t a i l e v i r o m e t, y o u e e d a s i g l e, comprehesive view of your busiess. You have to tur the decisio-makig of your
Document Control Solutions
Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS
LEASE-PURCHASE DECISION
Public Procuremet Practice STANDARD The decisio to lease or purchase should be cosidered o a case-by case evaluatio of comparative costs ad other factors. 1 Procuremet should coduct a cost/ beefit aalysis
Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1
Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig
Saudi Aramco Suppliers Safety Management System
Saudi Aramco Suppliers Safety Maagemet System SAFETY is Protectio (if oly we follow the rules) ''To live each day ijury ad violatio free, o ad off the job'' Foreword Foreword Saudi Aramco has developed
Consider these sobering statistics
Idetity Theft is a form of fraud or Idetity theft cotiues to icrease every year ad has impacted millios of Americas. cheatig of aother perso s idetity i which someoe preteds to be someoe else by assumig
Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks
Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.
FPO. A global telecom s strategy. for Canada
FPO A global telecom s strategy for Caada A global telecom s strategy for Caada Global telecommuicatios compaies that support multi-atioal corporatios (MNC) are tasked with providig a cosistet cliet experiece
I apply to subscribe for a Stocks & Shares NISA for the tax year 2015/2016 and each subsequent year until further notice.
IFSL Brooks Macdoald Fud Stocks & Shares NISA trasfer applicatio form IFSL Brooks Macdoald Fud Stocks & Shares NISA trasfer applicatio form Please complete usig BLOCK CAPITALS ad retur the completed form
Securing your business
Iteratioal Chamber of Commerce The world busiess orgaizatio Securig your busiess A compaio for small or etrepreeurial compaies to the 2002 OECD Guidelies for the security of etworks ad iformatio systems:
BaanERP. BaanERP Windows Client Installation Guide
BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to
TIAA-CREF Wealth Management. Personalized, objective financial advice for every stage of life
TIAA-CREF Wealth Maagemet Persoalized, objective fiacial advice for every stage of life A persoalized team approach for a trusted lifelog relatioship No matter who you are, you ca t be a expert i all aspects
Domain 1: Configuring Domain Name System (DNS) for Active Directory
Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more
Baan Service Master Data Management
Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :
A guide to School Employees' Well-Being
A guide to School Employees' Well-Beig Backgroud The public school systems i the Uited States employ more tha 6.7 millio people. This large workforce is charged with oe of the atio s critical tasks to
The future of global data management is here: modular, scalable and integrated. MasterCard smartdata.gen2
The future of global data maagemet is here: modular, scalable ad itegrated MasterCard smartdata.ge2 Revolutioize your data. Trasform your busiess. MasterCard smartdata.ge2 is a revolutioary web-based
Making training work for your business
Makig traiig work for your busiess Itegratig core skills of laguage, literacy ad umeracy ito geeral workplace traiig makes sese. The iformatio i this pamphlet will help you pla for ad build a successful
Information about Bankruptcy
Iformatio about Bakruptcy Isolvecy Service of Irelad Seirbhís Dócmhaieachta a héirea Isolvecy Service of Irelad Seirbhís Dócmhaieachta a héirea What is the? The Isolvecy Service of Irelad () is a idepedet
I apply to subscribe for a Stocks & Shares ISA for the tax year 20 /20 and each subsequent year until further notice.
IFSL Brooks Macdoald Fud Stocks & Shares ISA Trasfer Applicatio Form IFSL Brooks Macdoald Fud Stocks & Shares ISA Trasfer Applicatio Form Please complete usig BLOCK CAPITALS ad retur the completed form
Professional Networking
Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market
Skytron Asset Manager
Skytro Asset Maager Meet Asset Maager Skytro Asset Maager is a wireless, pateted RFID asset trackig techology specifically desiged for hospital facilities to deliver istat ROI withi a easy to istall, fully
Domain 1 Components of the Cisco Unified Communications Architecture
Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate
Xantaro Maintenance Services & Operations. XTAC User Guide. UK Edition
Xataro Maiteace Services & Operatios XTAC User Guide UK Editio XTAC WORKFLOW The Xataro Techical Assistace Cetre (XTAC) is the cetral iterface for all techical questios ad topics for products ad services
summary of cover CONTRACT WORKS INSURANCE
1 SUMMARY OF COVER CONTRACT WORKS summary of cover CONTRACT WORKS INSURANCE This documet details the cover we ca provide for our commercial or church policyholders whe udertakig buildig or reovatio works.
Packages: Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y N Y Y N Y Y N Y Y N Y Y N Y Y N Y Y N Y Y N Y Y
Packages: Pro Master Geius Customer Portal Access Telephoe Helpdesk Support Microsoft - Active Directory, Direct Access, Exchage Server, Forefrot Edpoit Protectio, Hyper-V, IIS, Remote Desktop Services,
Agricultural & Agri-Business Grant Opportunities. Presented By: Connie Miner Grant Consultant
Agricultural & Agri-Busiess Grat Opportuities Preseted By: Coie Mier Grat Cosultat NYS Dept. of Agriculture & Markets: Overview of eligibility requiremets: Agricultural & Farmlad Protectio Boards Erie
Health and dental coverage that begins when your group health benefits end
Health ad detal coverage that begis whe your group health beefits ed Uderwritte by The Maufacturers Life Isurace Compay Page 1 of 5 FollowMeTM Health ca be your solutio. Life is full of chages. Some are
Best of security and convenience
Get More with Additioal Cardholders. Importat iformatio. Add a co-applicat or authorized user to your accout ad you ca take advatage of the followig beefits: RBC Royal Bak Visa Customer Service Cosolidate
Handling. Collection Calls
Hadlig the Collectio Calls We do everythig we ca to stop collectio calls; however, i the early part of our represetatio, you ca expect some of these calls to cotiue. We uderstad that the first few moths
Revised Special Terms & Conditions
Call: 0191 505 0033* Lies are ope betwee 9am to 6pm Moday to Friday (excludig UK bak holidays) Email us: [email protected]** Write to us: High Yield Vaquis Bak, Freepost RSGY-CKJA-BKCS,
Advancement FORUM. www.acmaweb.org/advancement CULTIVATING LEADERS IN CASE MANAGEMENT
H E A L T H C A R E D E L I V E R Y S Y S T E M C A S E M A N A G E M E N T E D U C A T I O N Advacemet FORUM CULTIVATING LEADERS IN CASE MANAGEMENT DATES AND LOCATIONS LOS ANGELES, CA DECEMBER 11 DALLAS,
Advanced Protection for Web Services
RealSetry TM SSL overview Advaced Protectio for Web Services SSL Accelerator Itrusio Detectio System Reverse Proxy Applicatio-Firewall Web services deploymet The pricipal reasos which delay the deploymet
How To Write A Privacy Policy For A Busiess
Office of the Privacy Commissioer of Caada PIPEDA Privacy Guide for Small Busiesses: The Basics Privacy is the best policy Hadlig privacy cocers correctly ca help improve your orgaizatio s reputatio. Whe
PENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place.
PENSION ANNUITY Policy Coditios Documet referece: PPAS1(7) This is a importat documet. Please keep it i a safe place. Pesio Auity Policy Coditios Welcome to LV=, ad thak you for choosig our Pesio Auity.
The Canadian Council of Professional Engineers
The Caadia Coucil of Professioal Egieers Providig leadership which advaces the quality of life through the creative, resposible ad progressive applicatio of egieerig priciples i a global cotext Egieerig
The Forgotten Middle. research readiness results. Executive Summary
The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school
Bajaj Allianz General Insurance Company Limited
Bajaj Alliaz Geeral Isurace Compay Limited Regd. Office & Head Office : GE Plaza, Airport Road, Yerawada, Pue - 411 006. PROPOSAL FORM FOR OFFICE COVER Importat : This proposal for isurace will be the
*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
WITH INDUSTRY COMPLIANCY AND INFORMATION SECURITY laws and mandates
3 Why Risk Assessmet WITH INDUSTRY COMPLIANCY AND INFORMATION SECURITY laws ad madates beig itroduced i the past four years, the eed for coductig a vulerability ad risk assessmet is ow paramout.these recet
E-Plex Enterprise Access Control System
Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet
Agency Relationship Optimizer
Decideware Developmet Agecy Relatioship Optimizer The Leadig Software Solutio for Cliet-Agecy Relatioship Maagemet supplier performace experts scorecards.deploymet.service decide ware Sa Fracisco Sydey
e-trader user guide Introduction
User guide e-trader user guide Itroductio At UK Geeral our aim is to provide you with the best possible propositio for you ad your customers. We believe i offerig brokers a choice of how they trade with
On-Premise CRM to Salesforce Migration - Benefits, Challenges and Best Practices
White Paper O-Premise CRM to Salesforce Migratio - Beefits, Challeges ad Best Practices With the advet of cloud computig, orgaizatios are lookig to move their Customer Relatioship Maagemet (CRM) applicatios
Amendments to employer debt Regulations
March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios
How Asigra Cloud Backup Protects Your Network
Recovery is Everythig How Asigra Cloud Backup Protects Your Network Cloud Backup for Healthcare Asigra Advatages Key Asigra Cloud Backup Features Protectio for your Whole Network The 3 Levels of Backup
Prescribing costs in primary care
Prescribig costs i primary care LONDON: The Statioery Office 13.50 Ordered by the House of Commos to be prited o 14 May 2007 REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 454 Sessio 2006-2007 18 May
Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)
Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02
INVESTING IN SOCIAL CHANGE TOOLS FOR SOCIAL INNOVATION
INVESTING IN SOCIAL CHANGE TOOLS FOR SOCIAL INNOVATION At Tides, we have bee workig for more tha 30 years with people like you to make the world a better place. Our missio is to parter with activists,
ELearning courses Competition / Antitrust
ELearig courses Competitio / Atitrust Clifford Chace ad Thomso Reuters elearig Regulators are takig a icreasigly tough stace o competitio / atitrust compliace. Failure to comply with the relevat legislatio
Engineering Data Management
BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package
A Balanced Scorecard
A Balaced Scorecard with VISION A Visio Iteratioal White Paper Visio Iteratioal A/S Aarhusgade 88, DK-2100 Copehage, Demark Phoe +45 35430086 Fax +45 35434646 www.balaced-scorecard.com 1 1. Itroductio
3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions
3G Security VoIP Wi-Fi IP Telephoy Routig/Switchig Uified Commuicatios NetVata Busiess Networkig Solutios Opportuity to lower Total Cost of Owership ad improve Retur o Ivestmet The ADTRAN Advatage ADTRAN
Introducing Your New Wells Fargo Trust and Investment Statement. Your Account Information Simply Stated.
Itroducig Your New Wells Fargo Trust ad Ivestmet Statemet. Your Accout Iformatio Simply Stated. We are pleased to itroduce your ew easy-to-read statemet. It provides a overview of your accout ad a complete
Comparing Credit Card Finance Charges
Comparig Credit Card Fiace Charges Comparig Credit Card Fiace Charges Decidig if a particular credit card is right for you ivolves uderstadig what it costs ad what it offers you i retur. To determie how
Silver Lining of Cloud Computing
White Paper Silver Liig of Cloud Computig - Key Priciples ad Best Practices CXOs eed to evaluate differet deploymet models, service models ad key characteristics of the cloud to implemet the precise spectrum
QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy
QUADRO tech FSA Migrator 2.6 File Server Migratios - Made Easy FSA Migrator Cosolidate your archived ad o-archived File Server data - with ease! May orgaisatios struggle with the cotiuous growth of their
Pre-Suit Collection Strategies
Pre-Suit Collectio Strategies Writte by Charles PT Phoeix How to Decide Whether to Pursue Collectio Calculatig the Value of Collectio As with ay busiess litigatio, all factors associated with the process
For customers Key features of the Guaranteed Pension Annuity
For customers Key features of the Guarateed Pesio Auity The Fiacial Coduct Authority is a fiacial services regulator. It requires us, Aego, to give you this importat iformatio to help you to decide whether
