Spring World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 27, Issue 4

Full Contents Now Available!

Jon Seals

As hacking attempts become more complex, governments continue to improve their cybersecurity presence through sophisticated firewalls and expanded procedures. But while high-profile data breaches have focused more state and municipal attention on cyberintrusions, a decidedly old-school problem continues to plague efforts to beef up security — communication.

With a variety of security options available, public-sector agencies often are deploying tools and using strategies that utilize different terminology and principles. These differences can lead to frustration when trying to compare cybersecurity programs and address the latest digital threats across agencies or jurisdictions. Without a standardized language, it’s difficult to gauge how strong another organization’s cybersecurity is.

To illustrate the concept, consider an advertisement for a new hotel. The hotel boasts that it has superior service, amenities and security. The only way to know that for sure, however, is for those claims to be verified. In the lodging industry, organizations like AAA visit hotels and rate them — five-star, four-star, etc. Customers then read those ratings and make a decision on where to stay based on the commonly understood vernacular.

...

http://www.emergencymgmt.com/safety/Creating-Common-Language-Cybersecurity.html

Introducing myCOOP™ 7 Major Release

 

HERNDON, Va. – The developer of myCOOP™, one of the most advanced Business Continuity Management System (BCMS) systems in the world, is sponsoring a usability and BC software automation webinar.

There is now an answer to the age-old question of making BC software as usable as possible. Join our webinar to explore a different way to automate BC programs. Click on one of the following times to register.

Complaints abound in the industry, with four basic themes.

"Why proprietary methods instead of open standards?"

"Why can't it feel more like mass market solutions?"

"Why not treat administrators and end-users differently?"

"Why can't we use our knowledge instead of vendor details?"

Instead, we'd rather SURF, using four basic principles.

 

Standards - - open methodologies

Usability - - mass market paradigms

Roles - - differing user-specific work flows

Flexibility - - embracing client knowledge

If you can't join us, you please register for a recording.

 

ABOUT COOP SYSTEMS - - Scalable, Flexible, Reliable, Proven

COOP Systems, headquartered in Herndon, VA, is a leading provider of myCOOP, the BCM solution used by a growing list of clients globally. With a proven reputation for reliability and ability to support clients' existing BCM practices, our clients believe myCOOP is simply one of the best BCM systems in the world.

CONTACT COOP

chrisalvord@coop-systems.com

703-464-8700

New Application Wrapping Feature Brings Increased Security and Ease of Use for Customers

LONDON — LANDESK, a global leader in delivering user-oriented IT solutions that solve systems, assets, security, mobility and IT service management challenges, today announced the release of new features and upgrades to its Enterprise Mobility Management platform, including an application wrapping feature. This new feature will allow IT departments to add another layer of security to the enterprise apps they supply to their users.

“We strive to provide users with the most intuitive and easy-to-understand products available,” said Stephen Brown, director of product management at LANDESK. “While most application wrapping software is quite cumbersome, our solution allows an IT administrator to wrap an application in one step and deploy it to users. We know this simplicity will improve the productivity of the IT managers and their user base to help them focus on the important tasks they need to accomplish.”

LANDESK application wrapping makes it easy to incorporate mobile application security into corporate bring-your-own-device (BYOD) policies. It uses single sign-on authentication to make access to the enterprise applications simple and to foster increased user productivity. It also encrypts data, preventing it from moving to applications not provided by the enterprise. This feature also makes it easy for IT to add security features and can be used for any Android app and enterprise iOS apps.

LANDESK® Mobility Manager helps IT managers balance users’ needs to be productive anywhere with IT’s charter to provide secure mobility. With the BYOD-friendly LANDESK approach, IT teams gain confidence that 1) security measures are in place to consistently safeguard corporate data enterprise-wide and 2) mobile users benefit from a solution that respects the personal nature of their devices.

About LANDESK Software

LANDESK, the global authority on user-oriented IT, enables users to be their most productive while helping IT embrace the speed of change. Through the integration and automation of IT systems management, endpoint security management, service management, IT asset management, and mobile device management, LANDESK empowers IT to balance rapidly evolving user requirements with the need to secure critical assets and data. With offices located across the globe, LANDESK is headquartered in Salt Lake City. For more information, visit www.landesk.com.

Disaster recovery specialist SERVPRO offers insight into the complexities of dealing with disaster

GALLATIN, Tenn. – When disaster strikes, property owners need to make a lot of decisions quickly and under pressure. Effective disaster remediation involves a lot of moving parts: remediation specialists, insurance companies, local codes, state codes, documentation and more—and all of this has to happen in an atmosphere charged with emotion and stress.
 
Servpro Industries, Inc. Chief Executive Officer Sue Steen says, “Efficiency is key when you are dealing with disaster remediation; it saves our customers money and it makes our work more effective. SERVPRO is an industry leader in work efficiency technology—continually innovating to help both our customers and our business control costs.” 
 
SERVPRO’s proprietary DryBook™ tool is one example of the company’s focus on efficiency and cost control. Remediation projects must be managed to both industry and insurance company standards, and Steen says that tools like DryBook™  helps SERVPRO Franchise technicians track and document progress on restoration, cleanup and repair services.  “The DryBook™ tool helps our disaster recovery professionals deliver on every detail of every water damage job, every time,” says Steen.
 
To help avoid regulatory headaches and paperwork pitfalls, Steen suggests property owners consider the following criteria when choosing a remediation company to deal with the aftermath of a disaster.
 
1. Industry standards: Does your remediation company deliver a product that meets the standards set by
  • The Institute of Inspection, Cleaning and Restoration Certification (IICRC)?
  • Most major insurance companies, including cycle times and deadline requirements?
2. Recordkeeping: Does your remediation company have a system in place to ensure accurate, complete and convenient benchmarking of each step of the remediation process, including
  • Capturing and updating data, including job diary notes, electronically real-time on the jobsite, with simultaneous updates saved at the central office?
  • Using e-signatures to help eliminate lost paperwork and the need to scan documents?
  • Providing a complete record of the damage and remediation efforts in images, with descriptions, start-to-finish?
  3. Equipment selection: Does your contractor have the ability, on-the-spot, to
  • Identify the right equipment for the job, based on the damage description?
  • Validate the use of each piece of equipment, automatically, as part of the remediation records?
 
SERVPRO® professionals specialize in disaster restoration, cleanup and repair services, helping to remediate damage, making it “Like it never even happened,” for both commercial and residential customers. For more information about SERVPRO®, please visit www.servpro.com.
 
About SERVPRO®
Founded in 1967, the SERVPRO® Franchise System is a national leader and provider of fire and water cleanup and restoration services and mold mitigation and remediation. SERVPRO’s professional services network of nearly 1,700 individually owned and operated Franchises responds to property damage emergencies ranging from small individual disasters to multi-million dollar losses. Providing coverage in the United States and Canada, the SERVPRO System has established relationships with major insurance companies and commercial clients, as well as individual homeowners.

Insightful Discussion Articulates How Microsoft Lync and SMART Room Systems Technologies, With Systems Integration Expertise from Carousel, Can Make Companies More Efficient

EXETER, RI — Carousel Industries, a leader in unified communications, managed services, data solutions and visual communications, invited experts from Microsoft and SMART Technologies to contribute to a roundtable discussion with Carousel on 'The Future of Collaboration' last week. The webinar, which was open to Carousel partners and customers, took place on October 2nd and discussed how companies of all sizes can significantly improve business communications across a broad range of end user devices and multiple vendor environments.

 
According to Carousel, companies that integrate a sound unified communications platform have the potential to raise the value of every business interaction. New communication technologies such as Microsoft's Lync 2013 and SMART Room systems enable employees to remain active contributors throughout the entire day, no matter what their location is or which devices they are using.
 
The event was hosted by Ed Wadbrook, VP Applications and Collaboration, Carousel Industries, and also included Jason Moortgat, Business Development Manager, Partner Practice Recruit Team, Microsoft; and Jeff Lowe, VP Sales & Marketing, SMART Technologies.
 
"We are entering a 'golden age' of collaboration in which videoconferencing technology, along with continually evolving unified communication applications and platforms, is having a measurable impact on how employees and partners can engage to achieve optimal business results," said Ed Wadbrook. "Microsoft's Lync Room Systems and SMART Technologies' SMART Room solutions, combined with Carousel's unmatched systems integration, training and maintenance expertise, represent a paradigm shift in how companies are able to leverage video — not just as a measure to lower travel expenses but as a means to create more intimate face-to-face communications among stakeholders."
 
A New Vision for Collaboration Among Small and Large Businesses
Launched in 2011, Microsoft Lync has evolved to become an industry standard communications solution for enterprises of all sizes, connecting users and groups across a wide variety of locations and disciplines. Through its traditional office applications, chat capabilities, videoconferencing and other technologies, Lync helps businesses remove traditional communication barriers while empowering individuals and groups to become more proactive contributors.
 
During the webinar last week, presenters from each company explained how Lync Room Systems and SMART Technologies' SMART Room are revolutionizing the archteypal concept of the meeting room with powerful new capabilities, and in a range of sizes and package levels to suit just about any budget and business need. The technology for each conference room, which Carousel handles implementation and maintenance support, enables reliable Lync-based communication in a desktop-like environment that is likely to be familiar to most users. Meanwhile, SMART Room makes meeting set up and management much easier with its 'one-touch' functionality and powerful collaboration and whiteboarding features. 
 
During the webinar, Carousel announced that it is able to deliver complete Lync Room Systems in a range of six possible sizes:

  • X small (up to four people, one 55" display)
  • Small (up to six people, one 70" display)
  • Medium (up to 12 people, one 84" display)
  • Medium Dual (up to 12 people, two 55" displays)
  • Large (up to 16 people, two 70" displays)
  • X-Large (up to 20 people, two 84" displays)


The Future of Collaboration Among the Fortune 100 and Beyond
Among the companies Carousel has worked with to install several Lync Room Systems is one of the nation's oldest and most prominent insurance companies. Since the installation was completed this year, the company has increased the productivity of its workers while significantly reducing its audio conferencing costs — which were based on using more than 40 million minutes per year. Additionally, since the technology enables meeting attendees to participate over just about any device and anywhere in the world, the company can more easily comply with regulatory requirements requiring board members to be present during certain meetings.
 
Ed Wadbrook of Carousel neatly summarized how an effective collaboration strategy can 'move the dial' in just about any business: "Now, true collaboration has no boundaries, yet is secure. Companies that deploy effective Lync-based video conferencing solutions will not only make their own workforces more productive, but can create more intimate and loyal relationships with partners and customers." 

To learn more about Carousel's collaboration solutions, please visit www.carouselindustries.com/solutions/collaboration
 
 
About Carousel
Carousel Industries consults, integrates, and manages technology solutions that solve business problems and contribute to your organizations’ growth. This includes unified communications, managed services, virtualization, Voice over IP (VoIP), video conferencing and collaboration and data infrastructure solutions.

By Geary Sikich

Our concept of risk management needs to change. I’m not saying that the current practice is wrong; it just provides us with too much static risk assessment and the creation of many false positives in risk reports. One may ask why I chose the use the example of commodities traders for a new risk mindset. The answer is rather simple; commodities traders view risk as a rapid change agent. That is to say, risk changes in likelihood, velocity, impact and exposure over time.

If one refocuses to look at the consequences or potential consequences of the ‘near miss’ event instead of trying to determine the cause (which is often masked by opacity) preventative measures can be undertaken. Controls often times are reactive and not sufficiently proactive. Once we have changed the mindset, we can create a more proactive culture.

...

http://www.continuitycentral.com/feature1234.html

Businesses which respond to supply chain scandals with additional rules and regulations leave workers even more vulnerable, according to a new report published by the Institute of Risk Management (IRM).

‘Extended Enterprise: managing risk in complex 21st century organisations’ argues that the modern commercial obsession with systems and processes obscures the real problem: failure to understand and predict human behaviour and build trust. It urges companies to prioritise behavioural risk over ‘tick box compliance’ to tackle the ethical uncertainties in today’s complex delivery networks.

IRM states that the report marks the transition from risk management of a single organization to a coherent programme which meets the global and interdependent challenges of today’s joint endeavours. The report’s project group, made up of IRM practitioners together with academic experts, provides developed models, tools and techniques to help risk practitioners understand and manage risk across extended enterprises.

As well as supporting organizational performance, the report claims that a better understanding of risk across the extended enterprise is also vital in tackling wider problems including slavery, abuse, environmental damage and dangerous working conditions. The report argues that wilful blindness by organizations to these issues within their broader networks is unacceptable. Firms must ask themselves whether any claims that they make about their values hold true across their extended enterprise.

www.theirm.org

A recent announcement explained that cyber-security ‘big names’ McAfee and Symantec have agreed to share their threat data. It’s a development that should benefit customers of both vendors. Historically, IT vendors have swung back and forth between the multi-vendor approach (“we’ll handle the other vendor’s stuff for you”) and so-called coopetition, where two or more providers joined forces by agreeing to operate to a common standard for instance. The McAfee-Symantec pact ranges over sharing malware signatures to information on real-time attacks. Who else might follow this apparently enlightened example?

...

http://www.opscentre.com.au/blog/the-impact-on-business-continuity-when-data-and-security-vendors-work-together/

As the Internet of Things comes online, it will almost certainly require changes to how IT manages data, according to Gartner analyst Joe Skorupa.

"The enormous number of devices, coupled with the sheer volume, velocity and structure of IoT data, creates challenges, particularly in the areas of security, data, storage management, servers and the data center network, as real-time business processes are at stake," Skorupa, vice president and distinguished analyst at Gartner, states. "Data center managers will need to deploy more forward-looking capacity management in these areas to be able to proactively meet the business priorities associated with IoT."

The highly distributed nature of the IoT will make it impractical to move all of the data to a central location for processing, Skorupa theorizes. Instead, data will be aggregated in “distributed mini data centers where initial processing can occur.” Only the business-relevant data would be sent to a central location for further processing, he added.

...

http://www.itbusinessedge.com/blogs/integration/internet-of-things-data-poises-new-challenges-for-cloud-based-predictive-analytics.html

Businesses Require Advanced Tools And Techniques To Combat New And Complex Threats

MOUNTAIN VIEW, Calif. – New research from Frost & Sullivan shows many companies are struggling to keep their networks secure against rapidly evolving cyber threats. Despite increasingly sophisticated attacks and rising complexity in the technological and regulatory landscapes, companies still typically rely on outdated methods to keep data secure.

New Threats and Complications

Emerging technologies and practices such as Bring-Your-Own-Device (BYOD), social media, smartphones, virtualization, and cloud services have significantly complicated the process of securing enterprise networks and sensitive data. Many companies have failed to adjust their security approaches accordingly. For instance, the 2013 Global Information Security Workforce Study conducted by Frost & Sullivan and (ISC)² revealed that out of 12,396 respondents, 42 percent ranked social media as a top security concern. However, 25 percent of organizations admitted they were not addressing this threat vector.

Cyber crime today is big business and threat actors are more motivated, skilled, coordinated, and well-funded than ever before. Yet many companies continue to rely on outdated detection methods that only protect against known threats or provide information about attacks after they happen. Many organizations also use discrete solutions to manage each new threat vector, emerging technology and regulatory requirement. However, by investing in several point products, businesses are finding the process to maintain these solutions to be unmanageable. In addition, those systems are often unable to share data with each other, which reduces their effectiveness.

Recommendations and Best Practices

To combat today’s new threats and manage the ever-increasing complexity, organizations require advanced protection technologies that can integrate and correlate security event data from multiple security systems. Frost & Sullivan recommends advanced managed security services such as the Masergy Security as a Service. Masergy addresses today’s rapidly evolving threat landscape with a fully-integrated, managed security solution built on the company’s patented Unified Enterprise Security (UES) platform. UES is unique in its use of adaptive behavioral analytics and machine learning to monitor network activity and continuously adapt to changing threat conditions. This technology is combined with continuous monitoring performed by Masergy security experts to efficiently anticipate and detect malicious activities. Frost & Sullivan believes that Masergy offers a solution that is well positioned to address the growing security needs of IT organizations.

Frost & Sullivan’s analysis of the current security landscape and recommendations for businesses are collected in a new white paper entitled, An Advanced Approach to Enterprise Network Security. To learn more about this topic, download a complimentary copy of the paper.